Volgen
Seong-je Cho
Seong-je Cho
Professor of Computer Science & Engineering, Dankook University
Geverifieerd e-mailadres voor dankook.ac.kr - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Efficient Real-Time Scheduling Algorithms for Multiprocessor Systems
CHO Seongje, LEE Suk-Kyoon, AHN Sang, LIN Kwei-Jay
IEICE Transactions on Communications 85 (12), 2859-2867, 2002
1072002
Android malware detection based on useful API calls and machine learning
J Jung, H Kim, D Shin, M Lee, H Lee, S Cho, K Suh
2018 IEEE First International Conference on Artificial Intelligence and …, 2018
522018
Comparison of deadline-based scheduling algorithms for periodic real-time tasks on multiprocessor
PARK Minkyu, HAN Sangchul, KIM Heeheon, CHO Seongje, ...
IEICE transactions on information and systems 88 (3), 658-661, 2005
452005
Enhanced android malware detection: An svm-based machine learning approach
H Han, SJ Lim, K Suh, S Park, S Cho, M Park
2020 IEEE International Conference on Big Data and Smart Computing (BigComp …, 2020
432020
Android malware detection using convolutional neural networks and data section images
J Jung, J Choi, S Cho, S Han, M Park, Y Hwang
Proceedings of the 2018 conference on research in adaptive and convergent …, 2018
382018
Security threat on wearable services: Empirical study using a commercial smartband
M Lee, K Lee, J Shim, S Cho, J Choi
2016 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia), 1-5, 2016
382016
Predictability of earliest deadline zero laxity algorithm for multiprocessor real-time systems
X Piao, S Han, H Kim, M Park, Y Cho, S Cho
Ninth IEEE International Symposium on Object and Component-Oriented Real …, 2006
382006
Design and performance evaluation of binary code packing for protecting embedded software against reverse engineering
MJ Kim, JY Lee, HY Chang, SJ Cho, Y Park, M Park, PA Wilsey
2010 13th IEEE International Symposium on Object/Component/Service-Oriented …, 2010
362010
A kernel-based monitoring approach for analyzing malicious behavior on android
Y Jeong, H Lee, S Cho, S Han, M Park
Proceedings of the 29th Annual ACM Symposium on Applied Computing, 1737-1738, 2014
352014
{RGBDroid}: A Novel {Response-Based} Approach to Android Privilege Escalation Attacks
Y Park, CH Lee, C Lee, JH Lim, S Han, M Park, SJ Cho
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12), 2012
322012
An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks.
K Lim, Y Jeong, S Cho, M Park, S Han
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7 (3), 40-52, 2016
302016
Effects of Code Obfuscation on Android App Similarity Analysis.
J Park, H Kim, Y Jeong, S Cho, S Han, M Park
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6 (4), 86-98, 2015
302015
A static birthmark for MS windows applications using import address table
JC Choi, YM Han, S Cho, HY Yoo, J Woo, M Park, Y Song, L Chung
2013 Seventh International Conference on Innovative Mobile and Internet …, 2013
292013
Efficient identification of bad signatures in RSA-type batch signature
LEE Seungwon, CHO Seongje, CHO Yookun
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2006
272006
Android Application Protection against Static Reverse Engineering based on Multidexing.
NY Kim, J Shim, S Cho, M Park, S Han
J. Internet Serv. Inf. Secur. 6 (4), 54-64, 2016
262016
Protecting data on android platform against privilege escalation attack
HT Lee, D Kim, M Park, S Cho
International Journal of Computer Mathematics 93 (2), 401-414, 2016
252016
Classifying malicious web pages by using an adaptive support vector machine
YS Hwang, JB Kwon, JC Moon, SJ Cho
Journal of Information Processing Systems 9 (3), 395-404, 2013
222013
An anti-reverse engineering technique using native code and obfuscator-LLVM for Android applications
K Lim, J Jeong, S Cho, J Choi, M Park, S Han, S Jhang
Proceedings of the International Conference on Research in Adaptive and …, 2017
212017
Open Source Software Detection using Function-level Static Software Birthmark.
D Kim, S Cho, S Han, M Park, I You
J. Internet Serv. Inf. Secur. 4 (4), 25-37, 2014
202014
An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices
HG Kim, JK Han, S Cho
Proceedings of the 2007 ACM symposium on Applied computing, 1171-1175, 2007
202007
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20