Yeonjoon Lee
Yeonjoon Lee
Assistant Professor of College of Computing, Hanyang University
Zweryfikowany adres z hanyang.ac.kr - Strona główna
Cytowane przez
Cytowane przez
What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources
S Demetriou, X Zhou, M Naveed, Y Lee, X Yuan, W Kan, C Gunter
NDSS, 2015
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th USENIX Security Symposium (USENIX Security 15), 2015
The peril of fragmentation: Security hazards in android device driver customizations
X Zhou, Y Lee, N Zhang, M Naveed, XF Wang
2014 IEEE Symposium on Security and Privacy, 409-423, 2014
Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios
K Chen, X Wang, Y Chen, P Wang, Y Lee, XF Wang, B Ma, A Wang, ...
2016 IEEE Symposium on Security and Privacy (SP), 357-376, 2016
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps
S Demetriou, N Zhang, Y Lee, XF Wang, CA Gunter, X Zhou, M Grace
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
Mayhem in the push clouds: Understanding and mitigating security hazards in mobile push-messaging services
T Li, X Zhou, L Xing, Y Lee, M Naveed, XF Wang, X Han
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Mass discovery of android traffic imprints through instantiated partial execution
Y Chen, W You, Y Lee, K Chen, XF Wang, W Zou
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Using sonar for liveness detection to protect smart speakers against remote attackers
Y Lee, Y Zhao, J Zeng, K Lee, N Zhang, FH Shezan, Y Tian, K Chen, ...
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020
Understanding {iOS-based} Crowdturfing Through Hidden {UI} Analysis
Y Lee, X Wang, K Lee, X Liao, XF Wang, T Li, X Mi
28th USENIX Security Symposium (USENIX Security 19), 765-781, 2019
Ghost installer in the shadow: Security analysis of app installation on android
Y Lee, T Li, N Zhang, S Demetriou, M Zha, XF Wang, K Chen, X Zhou, ...
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
Echo-guard: Acoustic-based anomaly detection system for smart manufacturing environments
CB Seo, G Lee, Y Lee, SH Seo
International Conference on Information Security Applications, 64-75, 2021
Understanding illicit UI in iOS apps through hidden UI analysis
Y Lee, X Wang, X Liao, XF Wang
IEEE Transactions on Dependable and Secure Computing 18 (5), 2390-2402, 2019
Image-Based Artificial Intelligence Technology for Diagnosing Middle Ear Diseases: A Systematic Review
D Song, T Kim, Y Lee, J Kim
Journal of Clinical Medicine 12 (18), 5831, 2023
Aliasing Backdoor Attacks on Pre-trained Models
C Wei, Y Lee, K Chen, G Meng, P Lv
32nd USENIX Security Symposium (USENIX Security 23), 2707-2724, 2023
Semantic Decomposition and Anomaly Detection of Tympanic Membrane Endoscopic Images
D Song, IS Song, J Kim, J Choi, Y Lee
Applied Sciences 12 (22), 11677, 2022
Toward better ear disease diagnosis: A multi-modal multi-fusion model using endoscopic images of the tympanic membrane and pure-tone audiometry
T Kim, S Kim, J Kim, Y Lee, J Choi
IEEE Access, 2023
Development of ResNet152 UNet++-based segmentation algorithm for the tympanic membrane and affected areas
T Kim, KH Oh, J Kim, Y Lee, J Choi
IEEE Access, 2023
Detection Techniques for Chinese Jargon: A Survey
L Zhang, Y Lee
한국통신학회 학술대회논문집, 1348-1349, 2023
Automatic Diagnosis of Chronic Otitis Media with a Dual Neural Network Using Pure-Tone Audiometry and Tympanic Membrane Images
T Kim, S Kim, J Kim, Y Lee, J Choi
Available at SSRN 4390612, 0
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–19