{"id":293,"date":"2015-10-26T21:46:08","date_gmt":"2015-10-26T12:46:08","guid":{"rendered":"http:\/\/pel.sejong.ac.kr\/wordpress\/?page_id=293"},"modified":"2026-02-11T07:25:26","modified_gmt":"2026-02-10T22:25:26","slug":"conference-proceedings","status":"publish","type":"page","link":"https:\/\/pel.sejong.ac.kr\/wordpress\/?page_id=293","title":{"rendered":"Int. Conference Proceedings"},"content":{"rendered":"<h2><strong>Accepted Paper<\/strong><\/h2>\n<ol>\n<li>Soonhong Kwon, Wooyoung Son, Victoria Lemieux, Nam-Gyu Kang, and Jong-Hyouk Lee, &#8220;Hybrid PII Masking and RAG-based LLM Inference for Privacy-Preserving QA on Clio-X&#8221;, <em>ACM 2025 International Conference on Intelligent Computing and Its Emerging Application<\/em> (<em>ACM ICEA 2025)<\/em>.<\/li>\n<li>Wooyoung Son, Soonhong Kwon, Mi-Nyeong Hwang, and Jong-Hyouk Lee, &#8220;An AI-based Risk-Adaptive MFA Framework for Keycloak Using Behavioral Login Analysis&#8221;, <em>ACM 2025 International Conference on Intelligent Computing and Its Emerging Application<\/em> (<em>ACM ICEA 2025)<\/em>.<\/li>\n<\/ol>\n<h2><strong>2025<\/strong><\/h2>\n<ol>\n<li>Soonhong Kwon, Wooyoung Son, and Jong-Hyouk Lee, &#8220;Anomaly Detection in Containerized Tactical Systems Using Temporal Graph Neural Networks&#8221;, <em>IEEE Military Communications Conference 2025 (IEEE MILCOM 2025)<\/em><em>,<\/em>\u00a0<span class=\"notion-enable-hover\" data-token-index=\"1\">pp.1566-1571, October 2025.<\/span><\/li>\n<li>Wooyoung Son, Soonhong Kwon, and Jong-Hyouk Lee, \u201cGNN-Based Predictive Model for Adversarial Cyber Behavior Using the MITRE ATT&amp;CK\u201d, <!-- notionvc: b9d05342-e6ca-4090-ab69-7d0bc66e9aa6 --><em>IEEE Military Communications Conference 2025 (IEEE MILCOM 2025),<\/em>\u00a0<span class=\"notion-enable-hover\" data-token-index=\"1\">pp.968-973, October 2025.<\/span><\/li>\n<li>Jaehyoung Park, Jihye Kim, Jong-Hyouk Lee, \u201cDesigning Secure Network Functions for UE Threat Detection in Network Slicing\u201d, <span class=\"notion-enable-hover\" data-token-index=\"1\"><em>IEEE Vehicular Technology Conference 2025-Fall (IEEE VTC 2025-Fall), <\/em>pp.1-5, October 2025.<\/span><\/li>\n<li>Jihye Kim, Jaehyoung Park, and Jong-Hyouk Lee, &#8220;PUF-Driven DAG-Based Lightweight UE Authentication for Scalable Open RAN Environments&#8221;, <span class=\"notion-enable-hover\" data-token-index=\"1\"><em>IEEE Vehicular Technology Conference 2025-Fall (IEEE VTC 2025-Fall), <\/em>pp.1-5, October 2025.<\/span><\/li>\n<\/ol>\n<h2><strong>2024<\/strong><\/h2>\n<ol>\n<li>Soonhong Kwon, Wooyoung Son, Jong-Hyouk Lee, \u201cSmart Contract Kill Switch for Security in a Private Blockchain-based Software Transaction System\u201d, <em>IEEE International Workshop on Information Forensics and Security (IEEE WIFS) 2024, <\/em>pp.1-6, December 2024.<\/li>\n<li>Soonhong Kwon, Wooyoung Son, and Jong-Hyouk Lee, &#8220;OAuth 2.0 Authentication Framework with Context-based Risk Assessment for AI Chatbot-based RPA&#8221;, <em>ACM <\/em><em>2024 International Conference on Intelligent Computing and its Emerging Application (ACM ICEA 2024),<\/em> pp. 33-38, November 2024.<\/li>\n<li>Wooyoung Son, Soonhong Kwon, and Jong-Hyouk Lee, &#8220;Secure User-to-Chatbot Authentication Using One-Time Session Keys Based on DID&#8221;, <em>ACM 2024 International Conference on Intelligent Computing and its Emerging Application (ACM ICEA 2024),<\/em> pp. 39-44, November 2024.<\/li>\n<li>Taeyang Lee, &#8220;Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid&#8221;,<em> The 25th World Conference on Information Security Applications (WISA 2024), <\/em>pp.339-351, August 2024.<\/li>\n<li>Jaehyoung Park, Jihye Kim, Jong-Hyouk Lee, &#8220;Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing&#8221;, <em> The 25th World Conference on Information Security Applications (WISA 2024), <\/em>pp.111-122, August 2024.<\/li>\n<li>Jihye Kim, Jaehyoung Park, Jong-Hyouk Lee, &#8220;ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach&#8221;, <em> The 25th World Conference on Information Security Applications (WISA 2024), <\/em>pp.31-43, August 2024.<\/li>\n<li>Jaehyoung Park, Jihye Kim, Seungchan Woo, Kyungmin Park, Jonghyun Kim, Jong-Hyouk Lee, &#8220;Experimental Approach to Internal Security Threats for 5G-Advanced Core Networks&#8221;, <em>2024 IEEE 35th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE PIMRC)<\/em><em>, <\/em>pp.1-6, September 2024.<\/li>\n<li>Jihye Kim, Jaehyoung Park, Jong-Hyouk Lee, &#8220;Simulation of an ARP Spoofing Attack on the E2 Interface in Open RAN&#8221;, <em>2024 IEEE 35th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE PIMRC), <\/em>pp.1-6, September 2024.<\/li>\n<\/ol>\n<h2><strong>2023<\/strong><\/h2>\n<ol>\n<li>Wooyoung Son, Soonhong Kwon, SungHeun Oh and Jong-Hyouk Lee, &#8220;OTT Service Copyright Management Framework Using ODRL Based on Hyperledger Fabric&#8221;, <em>2023 ACM International Conference on Intelligent Computing and Its Emerging Application (ACM ICEA 2023), <\/em>pp.84-89, December 2023.<\/li>\n<li>Soonhong Kwon, Wooyoung Son and Jong-Hyouk Lee, &#8220;VDIRS: Vulnerable Docker Image Response System&#8221;, <em>2023 ACM International Conference on Intelligent Computing and Its Emerging Application (ACM ICEA 2023),<\/em> pp.78-83, December 2023.<\/li>\n<li>Dong-Jie Liu and Jong-Hyouk Lee, &#8220;The Design and Evaluation of an Online Interactive Anti-phishing Training Method&#8221;, <em>2023 ACM International Conference on Intelligent Computing and Its Emerging Application (ACM ICEA 2023),<\/em> pp.59-65, December 2023.<\/li>\n<li>Seungchan Woo, Jaehyoung Park, Soonhong Kwon, Kyungmin Park, Jonghyun Kim and Jong-Hyouk Lee, &#8220;Simulation of Data Hijacking Attacks for a 5G-Advanced Core Network&#8221;, <em>2023 Joint European Conference on Networks and Communications &amp; 6G Summit (EuCNC\/6G Summit)<\/em>, pp. 538-542, June 2023.<\/li>\n<li>Seungchan Woo, Taeyang Lee and Jong-Hyouk Lee, &#8220;Decentralized Identifier System for Software Copyright Transfer and License Management&#8221;, <em>2023 IEEE International Conference on Metaverse Computing, Networking and Applications (IEEE <\/em><em>MetaCom)<\/em>, pp. 692-693, June 2023<em>.<\/em><\/li>\n<li>Taeyang Lee, Jinsue Lee, Seungchan Woo and Jong-Hyouk Lee, &#8220;Copyright and License Agreement History Management Framework for Outsourced Software&#8221;, <em>2023 IEEE International Conference on Metaverse Computing, Networking and Applications (IEEE MetaCom)<\/em>, pp.690-691, June 2023.<\/li>\n<li>Soonhong Kwon, Wooyoung Son and Jong-Hyouk Lee, &#8220;UCI and EICN Integrated Model for Copyright Distribution Management&#8221;, <em>2023 IEEE International Conference on Metaverse Computing, Networking and Applications (IEEE MetaCom)<\/em>, pp.688-689, June 2023.<\/li>\n<li>Soonhong Kwon, Wooyoung Son and Jong-Hyouk Lee, &#8220;Holographic Multi-Channel QR Code based Copyright Distribution Management System&#8221;, <em>2023 IEEE International Conference on Metaverse Computing, Networking and Applications (IEEE MetaCom)<\/em>, pp.684-685 June 2023.<\/li>\n<li>Jihye Kim, Jaehyoung Park and Jong-Hyouk Lee, &#8220;Analysis of Recent IIoT Security Technology Trends in a Smart Factory Environment&#8221;, <em>2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)<\/em>, pp. 840-845, February 2023.<\/li>\n<li>Seungchan Woo and Jong-Hyouk Lee, &#8220;Proposal of Docker and Kubernetes Direction through the Event Timeline of Kubernetes&#8221;, <em style=\"color: initial;\">2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)<\/em>, pp. 815-820, February 2023.<\/li>\n<li>Jaehyoung Park, Jihye Kim, Jiyou Seo, Sangpil Kim and Jong-Hyouk Lee, &#8220;Illegal 3D Content Distribution Tracking System based on DNN Forensic Watermarking&#8221;, <em style=\"color: initial;\">2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)<\/em>, pp. 777-781, February 2023.<\/li>\n<\/ol>\n<h2><strong>2020<\/strong><\/h2>\n<ol>\n<li>Soonhong Kwon, Heedong Yang, Manhee Lee, Jong-Hyouk Lee, &#8220;Machine Learning based Malware Detection with the 2019 KISA Data Challenge Dataset&#8221;, <em>In Proc. of 2020 ACM International Conference on Intelligent Computing and its Emerging Applications(ICEA), <\/em>no. 49, pp. 1-4, December 2020.<\/li>\n<li>Soonhong Kwon, Yangseo Choi, Jong-Hyouk Lee, &#8220;Automatic Seed Generation based Hybrid Fuzzing for Code Coverage Efficiency&#8221;,<em> In Proc. of 2020 ACM International Conference on Intelligent Computing and its Emerging Applications(ICEA), <\/em>no. 48, pp. 1-6, December 2020.<\/li>\n<\/ol>\n<h2><strong>2019<\/strong><\/h2>\n<ol>\n<li>Shijie Zhang, Jong-Hyouk Lee, &#8220;Eclipse-based Stake-Bleeding Attacks in PoS Blockchain Systems&#8221;, <em> In Proc. of 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure<\/em>, pp. 67-72, July 2019.<\/li>\n<li>Myoungsu Kim, Soonhong Kwon, Donald Elmazi, Jong-Hyouk Lee, Leonard Barolli, Kangbin Yim, &#8220;A technical Survey on Methods for Detecting Rogue Access Points&#8221;, <em>International Conference on Innovation Mobile and Internet Services in Ubiquitous Computing(IMIS) 2019<\/em>, pp. 215-226, July 2019.<\/li>\n<\/ol>\n<h2><strong>2017<\/strong><\/h2>\n<ol>\n<li>Sungbum Lee, Boohyung Lee, Sein Myung, and Jong-Hyouk Lee, \u201cSurvey of Attacks and Countermeasures in Blockchain Consensus Algorithms\u201d,\u00a0 <em>International Symposium on Advanced &amp; Applied Convergence(ISAAC)\u00a02017<\/em>, pp. -, November 2017.<\/li>\n<\/ol>\n<h2><strong>2016<\/strong><\/h2>\n<ol>\n<li>Boohyung Lee, Sehrish Malik, Sa-rang Wi, and Jong-Hyouk Lee, \u201cFirmware verification of embedded devices based on blockchain\u201d, <em>In Proc. of International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE) 2016<\/em>, pp. 52-61, July 2016<\/li>\n<li>Sa-Rang Wi, Ki-Woon Moon, Boohyung Lee, and Jong-Hyouk Lee, &#8220;Group Key Based Session Key Establishment Protocol for Vehicle Diagnostic&#8221;, <em>In Proc. of International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE) 2016<\/em>, pp. 62-71, July 2016.<\/li>\n<\/ol>\n<h2><strong>2015<\/strong><\/h2>\n<ol>\n<li>Sehrish Malik, BooHyung Lee, and Jong-Hyouk Lee, \u201cLoad control scheme to preserve processing capacity for emergency biometric data\u201d, In Proc. of <em>International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE) 2015<\/em>, pp. 251-254, August 2015.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Accepted Paper Soonhong Kwon, Wooyoung Son, Victoria Lemieux, Nam-Gyu Kang, and Jong-Hyouk Lee, &#8220;Hybrid PII Masking and RAG-based LLM Inference for Privacy-Preserving QA on Clio-X&#8221;, ACM 2025 International Conference on Intelligent Computing and Its Emerging Application (ACM ICEA 2025). Wooyoung Son, Soonhong Kwon, Mi-Nyeong Hwang, and Jong-Hyouk Lee, &#8220;An AI-based Risk-Adaptive MFA Framework for Keycloak [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/293"}],"collection":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=293"}],"version-history":[{"count":60,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/293\/revisions"}],"predecessor-version":[{"id":4239,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/293\/revisions\/4239"}],"wp:attachment":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}