default search action
Jehyun Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c13]Yongwoo Oh, Michael Yiqing Hu, Xin Zhe Khooi, Jehyun Lee, Dinil Mon Divakaran, Min Suk Kang:
IoTell: A Privacy-Preserving Protocol for Large-scale Monitoring of IoT Security Status. CCGridW 2024: 9-17 - [i4]Jehyun Lee, Peiyuan Lim, Bryan Hooi, Dinil Mon Divakaran:
Multimodal Large Language Models for Phishing Webpage Detection and Identification. CoRR abs/2408.05941 (2024) - 2023
- [c12]Jehyun Lee, Zhe Xin, Melanie Ng Pei See, Kanav Sabharwal, Giovanni Apruzzese, Dinil Mon Divakaran:
Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations. ESORICS (3) 2023: 162-182 - [i3]Jehyun Lee, Zhe Xin, Melanie Ng Pei See, Kanav Sabharwal, Giovanni Apruzzese, Dinil Mon Divakaran:
Attacking logo-based phishing website detectors with adversarial perturbations. CoRR abs/2308.09392 (2023) - 2022
- [c11]Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran:
SIERRA: Ranking Anomalous Activities in Enterprise Networks. EuroS&P 2022: 44-59 - [c10]Jehyun Lee, Min Suk Kang, Dinil Mon Divakaran, Phyo May Thet, Videet Singhai, Jun Seung You:
A Step Towards On-Path Security Function Outsourcing. ICDCN 2022: 175-187 - [i2]Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran:
SIERRA: Ranking Anomalous Activities in Enterprise Networks. CoRR abs/2203.16802 (2022) - 2021
- [c9]Jehyun Lee, Farren Tang, Pingxiao Ye, Fahim Abbasi, Phil Hay, Dinil Mon Divakaran:
D-Fence: A Flexible, Efficient, and Comprehensive Phishing Email Detection System. EuroS&P 2021: 578-597 - [i1]Jehyun Lee, Min Suk Kang, Dinil Mon Divakaran, Phyo May Thet, Videet Singhai, Jun Seung You:
A Step Towards On-Path Security Function Outsourcing. CoRR abs/2110.00250 (2021) - 2020
- [j5]Dalibor Froncek, Jehyun Lee:
Decomposition of complete graphs into bi-cyclic graphs with eight edges. Bull. ICA 88: 30-49 (2020)
2010 – 2019
- 2019
- [c8]Jehyun Lee, Akshaya Venkateswara Raja, Debin Gao:
SplitSecond: Flexible Privilege Separation of Android Apps. PST 2019: 1-10 - 2017
- [c7]Akshaya Venkateswara Raja, Jehyun Lee, Debin Gao:
On Return Oriented Programming Threats in Android Runtime. PST 2017: 259-267 - 2016
- [j4]Jonghoon Kwon, Jehyun Lee, Heejo Lee, Adrian Perrig:
PsyBoG: A scalable botnet detection method for large-scale DNS traffic. Comput. Networks 97: 48-73 (2016) - [j3]Choong In Lee, Jehyun Lee, Youngbin Pyo, Heejo Lee:
Broken Integrity Detection of Video Files in Video Event Data Recorders. KSII Trans. Internet Inf. Syst. 10(8): 3943-3957 (2016) - 2015
- [j2]Jehyun Lee, Suyeon Lee, Heejo Lee:
Screening smartphone applications using malware family signatures. Comput. Secur. 52: 234-249 (2015) - 2014
- [j1]Jehyun Lee, Heejo Lee:
GMAD: Graph-based Malware Activity Detection by DNS traffic analysis. Comput. Commun. 49: 33-47 (2014) - [c6]Jonghoon Kwon, Jihwan Jeong, Jehyun Lee, Heejo Lee:
DroidGraph: discovering Android malware by analyzing semantic behavior. CNS 2014: 498-499 - [c5]Jonghoon Kwon, Jeongsik Kim, Jehyun Lee, Heejo Lee, Adrian Perrig:
PsyBoG: Power spectral density analysis for detecting botnet groups. MALWARE 2014: 85-92 - 2013
- [c4]Suyeon Lee, Jehyun Lee, Heejo Lee:
Screening Smartphone Applications Using Behavioral Signatures. SEC 2013: 14-27 - 2011
- [c3]Jonghoon Kwon, Jehyun Lee, Heejo Lee:
Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Host. ISPEC 2011: 343-361
2000 – 2009
- 2009
- [c2]Jehyun Lee, Heejo Lee, Hoh Peter In:
Scalable attack graph for risk assessment. ICOIN 2009: 1-5 - 2007
- [c1]Euijin Choo, Jehyun Lee, Heejo Lee, Giwon Nam:
SRMT: A Lightweight Encryption Scheme for Secure Real-time Multimedia Transmission. MUE 2007: 60-65
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint