Int. Conference Proceedings

2020

  1. Soonhong Kwon, Heedong Yang, Manhee Lee, Jong-Hyouk Lee, “Machine Learning based Malware Detection with the 2019 KISA Data Challenge Dataset”, In Proc. of 2020 ACM International Conference on Intelligent Computing and its Emerging Applications(ICEA), pp. -, December 2020.
  2. Soonhong Kwon, Yangseo Choi, Jong-Hyouk Lee, “Automatic Seed Generation based Hybrid Fuzzing for Code Coverage Efficiency”, In Proc. of 2020 ACM International Conference on Intelligent Computing and its Emerging Applications(ICEA), pp. -, December 2020.

2019

  1. Shijie Zhang, Jong-Hyouk Lee, “Eclipse-based Stake-Bleeding Attacks in PoS Blockchain Systems”, In Proc. of 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, pp. 67-72, July 2019.
  2. Myoungsu Kim, Soonhong Kwon, Donald Elmazi, Jong-Hyouk Lee, Leonard Barolli, Kangbin Yim, “A technical Survey on Methods for Detecting Rogue Access Points”, International Conference on Innovation Mobile and Internet Services in Ubiquitous Computing(IMIS) 2019, pp. 215-226, July 2019.

2017

  1. Sungbum Lee, Boohyung Lee, Sein Myung, and Jong-Hyouk Lee, “Survey of Attacks and Countermeasures in Blockchain Consensus Algorithms”,  International Symposium on Advanced & Applied Convergence(ISAAC) 2017, pp. -, November 2017.

2016

  1. Boohyung Lee, Sehrish Malik, Sa-rang Wi, and Jong-Hyouk Lee, “Firmware verification of embedded devices based on blockchain”, In Proc. of International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE) 2016, pp. -, July 2016
  2. Sa-Rang Wi, Ki-Woon Moon, Boohyung Lee, and Jong-Hyouk Lee, “Group Key Based Session Key Establishment Protocol for Vehicle Diagnostic”, In Proc. of International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE) 2016, pp. -, July 2016.

2015

  1. Sehrish Malik, BooHyung Lee, and Jong-Hyouk Lee, “Load control scheme to preserve processing capacity for emergency biometric data”, In Proc. of International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE) 2015, pp. 251-254, August 2015.