default search action
Seong-je Cho
Person information
- affiliation: Dankook University, Yongin, Department of Computer Science & Engineering
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Jiheon Jung, Sangchul Han, Minkyu Park, Seong-je Cho:
Automotive digital forensics through data and log analysis of vehicle diagnosis Android apps. Forensic Sci. Int. Digit. Investig. 49: 301752 (2024) - [c55]Yejin Yoon, Jeehun Jung, Seong-je Cho, Jongmoo Choi, Minkyu Park, Sangchul Han:
Forensic Investigation of An Android Jellybean-based Car Audio Video Navigation System. ARES 2024: 98:1-98:8 - [c54]Guangxun Zhao, Hojin Shin, Seehwan Yoo, Seong-je Cho, Jongmoo Choi:
ThanosKV: A Holistic Approach to Utilize NVM for LSM-tree based Key- Value Stores. BigComp 2024: 143-150 - [c53]Charles Jaranilla, Hojin Shin, Seehwan Yoo, Seong-je Cho, Jongmoo Choi:
Tiered Storage in Modern Key-Value Stores: Performance, Storage-Efficiency, and Cost-Efficiency Considerations. BigComp 2024: 151-158 - 2023
- [j30]Ghulam Mustafa, Seong-je Cho, Youngsup Hwang:
TrafficNet: A Hybrid CNN-FNN Model for Analysis of Traffic Accidents in Seoul. J. Comput. Sci. Eng. 17(4): 182-194 (2023) - [c52]Ghulam Mustafa, Seong-Je Cho, Youngsup Hwang:
Hybrid ConvLSTM with Attention for Precise Driver Behavior Classification. AIKE 2023: 1-8 - [c51]Minsu Park, Seong-Je Cho, HongGeun Kim:
A Study on Asset Identification in Smart Buildings Automation Systems. ICUFN 2023: 923-925 - 2022
- [j29]Hyun-Il Kim, Moonyoung Kang, Seong-Je Cho, Sang-Il Choi:
Efficient Deep Learning Network With Multi-Streams for Android Malware Family Classification. IEEE Access 10: 5518-5532 (2022) - [j28]Geunha You, Gyoosik Kim, Sangchul Han, Minkyu Park, Seong-Je Cho:
Deoptfuscator: Defeating Advanced Control-Flow Obfuscation Using Android Runtime (ART). IEEE Access 10: 61426-61440 (2022) - [c50]Woosang Cho, Hojun Lee, Sangchul Han, Young-Sup Hwang, Seong-je Cho:
Sustainability of Machine Learning-based Android Malware Detection Using API calls and Permissions. AIKE 2022: 18-25 - [c49]Hojun Lee, Seong-je Cho, Hyoil Han, Woosang Cho, Kyoungwon Suh:
Enhancing Sustainability in Machine Learning-based Android Malware Detection using API calls. AIKE 2022: 131-134 - 2021
- [j27]Geunha You, Gyoosik Kim, Seong-je Cho, Hyoil Han:
A Comparative Study on Optimization, Obfuscation, and Deobfuscation tools in Android. J. Internet Serv. Inf. Secur. 11(1): 2-15 (2021) - [c48]Junsu Lee, Juwon Kim, Hojun Seong, Keonyong Lee, Seong-je Cho, Younjai Park, Minkyu Park:
Forensic Analysis of Apple CarPlay: A Case Study. MobiSec 2021: 289-300 - 2020
- [c47]Jihyeon Park, Munyeong Kang, Seong-je Cho, Hyoil Han, Kyoungwon Suh:
Analysis of Permission Selection Techniques in Machine Learning-based Malicious App Detection. AIKE 2020: 92-99 - [c46]Hyoil Han, SeungJin Lim, Kyoungwon Suh, Seonghyun Park, Seong-je Cho, Minkyu Park:
Enhanced Android Malware Detection: An SVM-Based Machine Learning Approach. BigComp 2020: 75-81 - [c45]Munyeong Kang, Jihyeon Park, Seonghyun Park, Seong-je Cho, Minkyu Park:
Android Malware Family Classification using Images from Dex Files. SMA 2020: 181-186 - [c44]Geunha You, Gyoosik Kim, Jihyeon Park, Seong-Je Cho, Minkyu Park:
Reversing Obfuscated Control Flow Structures in Android Apps using ReDex Optimizer. SMA 2020: 272-276
2010 – 2019
- 2019
- [j26]Byoung-chir Kim, Kyeonghwan Lim, Seong-je Cho, Minkyu Park:
RomaDroid: A Robust and Efficient Technique for Detecting Android App Clones Using a Tree Structure and Components of Each App's Manifest File. IEEE Access 7: 72182-72196 (2019) - [j25]Jaemin Jung, Hyun-Jin Kim, Seong-je Cho, Sangchul Han, Kyoungwon Suh:
Efficient Android Malware Detection Using API Rank and Machine Learning. J. Internet Serv. Inf. Secur. 9(1): 48-59 (2019) - [j24]Minjae Park, Geunha You, Seong-je Cho, Minkyu Park, Sangchul Han:
A Framework for Identifying Obfuscation Techniques applied to Android Apps using Machine Learning. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(4): 22-30 (2019) - [j23]Masoud Reyhani Hamedani, Gyoosik Kim, Seong-je Cho:
SimAndro: an effective method to compute similarity of Android applications. Soft Comput. 23(17): 7569-7590 (2019) - [c43]Jaemin Jung, Kyeonghwan Lim, Byoungchul Kim, Seong-je Cho, Sangchul Han, Kyoungwon Suh:
Detecting Malicious Android Apps using the Popularity and Relations of APIs. AIKE 2019: 309-312 - [c42]Anthony Opara, Youngsang Song, Seong-je Cho, Lawrence Chung:
Representing Multicloud Security and Privacy Policies and Detecting Potential Problems. ICSOC Workshops 2019: 57-68 - [c41]Byoungchul Kim, Jaemin Jung, Sangchul Han, Soyeon Jeon, Seong-je Cho, Jongmoo Choi:
A New Technique for Detecting Android App Clones Using Implicit Intent and Method Information. ICUFN 2019: 478-483 - [c40]Gunhee Choi, Juhyung Son, Jongmoo Choi, Seong-je Cho, Youjip Won:
HPanal: a framework for analyzing tradeoffs of huge pages. SAC 2019: 1438-1443 - 2018
- [j22]ThienLuan Ho, Seong-Je Cho, Seungrohk Oh:
Parallel multiple pattern matching schemes based on cuckoo filter for deep packet inspection on graphics processing units. IET Inf. Secur. 12(4): 381-388 (2018) - [j21]Seong-je Cho, Kyeonghwan Lim, Jungkyu Han, Byoung-chir Kim, Minkyu Park, Sangchul Han:
Open-Source Android App Detection considering the Effects of Code Obfuscation. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(3): 50-61 (2018) - [j20]Jaewoo Shim, Kyeonghwan Lim, Seong-je Cho, Sangchul Han, Minkyu Park:
Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework. Secur. Commun. Networks 2018: 6280768:1-6280768:12 (2018) - [j19]Yesol Kim, Seong-je Cho, Sangchul Han, Ilsun You:
A software classification scheme using binary-level characteristics for efficient software filtering. Soft Comput. 22(2): 595-606 (2018) - [j18]Masoud Reyhani Hamedani, Dongjin Shin, Myeonggeon Lee, Seong-je Cho, Changha Hwang:
AndroClass: An Effective Method to Classify Android Applications by Applying Deep Neural Networks to Comprehensive Features. Wirel. Commun. Mob. Comput. 2018: 1250359:1-1250359:21 (2018) - [c39]Jaemin Jung, Hyun-Jin Kim, Dongjin Shin, Myeonggeon Lee, Hyunjae Lee, Seong-je Cho, Kyoungwon Suh:
Android Malware Detection Based on Useful API Calls and Machine Learning. AIKE 2018: 175-178 - [c38]Myeonggeon Lee, Gwangjun Choi, Junsang Park, Seong-je Cho:
Study of Analyzing and Mitigating Vulnerabilities in uC/OS Real-Time Operating System. ICUFN 2018: 834-836 - [c37]Jaemin Jung, Jongmoo Choi, Seong-je Cho, Sangchul Han, Minkyu Park, Young-Sup Hwang:
Android malware detection using convolutional neural networks and data section images. RACS 2018: 149-153 - [c36]Myonghoon Oh, Jongmoo Choi, Seong-je Cho, Jeesoo Kim, Changhwan Youn, Woosuk Chung:
Analyzing and modeling the impact of memory latency and bandwidth on application performance. SAC 2018: 1095-1101 - 2017
- [c35]Kyeonghwan Lim, Jaemin Jeong, Seong-je Cho, Jongmoo Choi, Minkyu Park, Sangchul Han, Seongtae Jhang:
An Anti-Reverse Engineering Technique using Native code and Obfuscator-LLVM for Android Applications. RACS 2017: 217-221 - [c34]Juhyung Son, Sungmin Koo, Jongmoo Choi, Seong-je Cho, Seungjae Baek, Gwangil Jeon, Jun-Hyeok Park, Hyoung-Chun Kim:
Quantitative analysis of measurement overhead for integrity verification. SAC 2017: 1528-1533 - 2016
- [j17]Hwan-taek Lee, Dongjin Kim, Minkyu Park, Seong-je Cho:
Protecting data on android platform against privilege escalation attack. Int. J. Comput. Math. 93(2): 401-414 (2016) - [j16]Nak Young Kim, Jaewoo Shim, Seong-je Cho, Minkyu Park, Sangchul Han:
Android Application Protection against Static Reverse Engineering based on Multidexing. J. Internet Serv. Inf. Secur. 6(4): 54-64 (2016) - [j15]Kyeonghwan Lim, Younsik Jeong, Seong-je Cho, Minkyu Park, Sangchul Han:
An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7(3): 40-52 (2016) - [j14]Dongjin Kim, Yesol Kim, Seong-je Cho, Minkyu Park, Sangchul Han, Guk-seon Lee, Young-Sup Hwang:
An effective and intelligent Windows application filtering system using software similarity. Soft Comput. 20(5): 1821-1827 (2016) - [c33]Sangwook Cho, Gyoosik Kim, Seong-je Cho, Jongmoo Choi, Minkyu Park, Sangchul Han:
Runtime Input Validation for Java Web Applications using Static Bytecode Instrumentation. RACS 2016: 148-152 - [c32]Haecheon Kim, Seungmin Lim, Junkee Yoon, Seungjae Baek, Jongmoo Choi, Seong-je Cho:
Analysis of micro-architecture resources interference on multicore NUMA systems. SAC 2016: 1871-1876 - 2015
- [j13]Jonghwa Park, Hyojung Kim, Younsik Jeong, Seong-je Cho, Sangchul Han, Minkyu Park:
Effects of Code Obfuscation on Android App Similarity Analysis. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(4): 86-98 (2015) - [j12]Dong-Kyu Chae, Sang-Wook Kim, Seong-je Cho, Yesol Kim:
Effective and efficient detection of software theft via dynamic API authority vectors. J. Syst. Softw. 110: 1-9 (2015) - [c31]Dong-Kyu Chae, Sang-Wook Kim, Seong-je Cho, Yesol Kim:
DAAV: Dynamic API Authority Vectors for Detecting Software Theft. CIKM 2015: 1819-1822 - [c30]Yesol Kim, Jonghyuk Park, Seong-je Cho, Yunmook Nah, Sangchul Han, Minkyu Park:
Machine learning-based software classification scheme for efficient program similarity analysis. RACS 2015: 114-118 - 2014
- [j11]Yongman Han, JongCheon Choi, Seong-je Cho, Haeyoung Yoo, Jinwoon Woo, Yunmook Nah, Minkyu Park:
A new detection scheme of software copyright infringement using software birthmark on windows systems. Comput. Sci. Inf. Syst. 11(3): 1055-1069 (2014) - [j10]Dongjin Kim, Seong-je Cho, Sangchul Han, Minkyu Park, Ilsun You:
Open Source Software Detection using Function-level Static Software Birthmark. J. Internet Serv. Inf. Secur. 4(4): 25-37 (2014) - [j9]Chanhee Lee, Jonghwa Kim, Seong-je Cho, Jongmoo Choi, Yeongung Park:
Unified security enhancement framework for the Android operating system. J. Supercomput. 67(3): 738-756 (2014) - [c29]Dongjin Kim, Jeongoh Moon, Seong-je Cho, Jongmoo Choi, Minkyu Park, Sangchul Han, Lawrence Chung:
A birthmark-based method for intellectual software asset management. ICUIMC 2014: 39:1-39:6 - [c28]Yesol Kim, Jeongoh Moon, Seong-je Cho, Minkyu Park, Sangchul Han:
Efficient Identification of Windows Executable Programs to Prevent Software Piracy. IMIS 2014: 236-240 - [c27]Dongjin Kim, Yesol Kim, Jeongoh Moon, Seong-je Cho, Jinwoon Woo, Ilsun You:
Identifying Windows Installer Package Files for Detection of Pirated Software. IMIS 2014: 287-290 - [c26]SeongWook Kang, Hyungjoon Shim, Seong-je Cho, Minkyu Park, Sangchul Han:
A robust and efficient birthmark-based android application filtering system. RACS 2014: 253-257 - [c25]Duck-Ho Bae, Ji-Woong Chang, Se-Mi Park, Byeong-Soo Jeong, Sang-Wook Kim, Seong-je Cho:
An effective data clustering method based on expected update time in flash memory environment. SAC 2014: 1492-1497 - [c24]Younsik Jeong, Hwan-taek Lee, Seong-je Cho, Sangchul Han, Minkyu Park:
A kernel-based monitoring approach for analyzing malicious behavior on Android. SAC 2014: 1737-1738 - 2013
- [j8]Young-Sup Hwang, Jin Baek Kwon, Jae Chan Moon, Seong Je Cho:
Classifying Malicious Web Pages by Using an Adaptive Support Vector Machine. J. Inf. Process. Syst. 9(3): 395-404 (2013) - [j7]Hwan-taek Lee, Minkyu Park, Seong-je Cho:
Detection and prevention of LeNa Malware on Android. J. Internet Serv. Inf. Secur. 3(3/4): 63-71 (2013) - [c23]Yongsuk Choi, Yeongseong Park, Jongmoo Choi, Seong-je Cho, Hwansoo Han:
RAMC: runtime abstract memory context based plagiarism detection in binary code. ICUIMC 2013: 67 - [c22]Seongsoo Park, Seungcheol Ko, Jungsik Choi, Hwansoo Han, Seong-je Cho, Jongmoo Choi:
Detecting source code similarity using code abstraction. ICUIMC 2013: 74 - [c21]JongCheon Choi, Yongman Han, Seong-je Cho, Haeyoung Yoo, Jinwoon Woo, Minkyu Park, Youngsang Song, Lawrence Chung:
A Static Birthmark for MS Windows Applications Using Import Address Table. IMIS 2013: 129-134 - [c20]JongCheon Choi, Yongman Han, Seong-je Cho, Haeyoung Yoo, Minkyu Park, Sangchul Han, Ilsun You, Inshik Song:
A Survey of Feature Extraction Techniques to Detect the Theft of Windows Applications. IMIS 2013: 723-728 - [c19]Yesol Kim, Jeongoh Moon, Dongjin Kim, Younsik Jeong, Seong-je Cho, Minkyu Park, Sangchul Han:
A Static Birthmark of Windows Binary Executables Based on Strings. IMIS 2013: 734-738 - [c18]Younsik Jeong, Seong-je Cho, Moonju Park, Jeonguk Ko, Hyungjoon Shim, Joonmo Kim, Sangchul Han, Minkyu Park:
An efficient protection scheme of digital contents under mobile devices. RACS 2013: 306-311 - [c17]Jeonguk Ko, Hyungjoon Shim, Dongjin Kim, Younsik Jeong, Seong-je Cho, Minkyu Park, Sangchul Han, Seong Baeg Kim:
Measuring similarity of android applications via reversing and K-gram birthmarking. RACS 2013: 336-341 - [c16]Dongjin Kim, Yongman Han, Seong-je Cho, Haeyoung Yoo, Jinwoon Woo, Yunmook Nah, Minkyu Park, Lawrence Chung:
Measuring similarity of windows applications using static and dynamic birthmarks. SAC 2013: 1628-1633 - 2012
- [j6]HongGeun Kim, Dongjin Kim, Seong-je Cho, Moonju Park, Minkyu Park:
Efficient Detection of Malicious Web Pages Using High-Interaction Client Honeypots. J. Inf. Sci. Eng. 28(5): 911-924 (2012) - [j5]Yeongung Park, Chanhee Lee, Jonghwa Kim, Seong-je Cho, Jongmoo Choi:
An Android Security Extension to Protect Personal Information against Illegal Accesses and Privilege Escalation Attacks. J. Internet Serv. Inf. Secur. 2(3/4): 29-42 (2012) - [c15]Yeongung Park, Choonghyun Lee, Chanhee Lee, JiHyeog Lim, Sangchul Han, Minkyu Park, Seong-je Cho:
RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks. LEET 2012 - [c14]Taeseung Lee, Giyoun Won, Seongje Cho, Namje Park, Dongho Won:
Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing. NPC 2012: 138-144 - [c13]Younsik Jeong, Yeong-Ung Park, Jae-Chan Moon, Seong-je Cho, Dongjin Kim, Minkyu Park:
An anti-piracy mechanism based on class separation and dynamic loading for Android applications. RACS 2012: 328-332 - [c12]Jinman Jung, Joonhyouk Jang, Yookun Cho, Hwansoo Han, Gwangil Jeon, Seong-je Cho, Minwoo Jang, Jung-Yeop Kim:
A fast mount mechanism for YAFFS2. SAC 2012: 1791-1795 - 2011
- [c11]HongGeun Kim, Dong-Jin Kim, Seong-je Cho, Moonju Park, Minkyu Park:
An efficient visitation algorithm to improve the detection speed of high-interaction client honeypots. RACS 2011: 266-271 - 2010
- [j4]Heeheon Kim, Xuefeng Piao, Sangchul Han, Moonju Park, Minkyu Park, Seongje Cho, Yookun Cho:
Improving responsiveness of soft aperiodic tasks using proportional slack time. Comput. Electr. Eng. 36(5): 913-926 (2010) - [c10]Min-Jae Kim, Jin-Young Lee, Hyeyoung Chang, Seongje Cho, Yongsu Park, Minkyu Park, Philip A. Wilsey:
Design and Performance Evaluation of Binary Code Packing for Protecting Embedded Software against Reverse Engineering. ISORC 2010: 80-86
2000 – 2009
- 2009
- [c9]Xuefeng Piao, Heeheon Kim, Yookun Cho, Moonju Park, Sangchul Han, Minkyu Park, Seongje Cho:
Energy Consumption Optimization of Real-Time Embedded Systems. ICESS 2009: 281-287 - 2008
- [c8]Seongje Cho, Hyeyoung Chang, Yookun Cho:
Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture. SEUS 2008: 406-416 - 2007
- [c7]YongSuk Lee, WoongChul Choi, SukJoong Kang, Seongje Cho:
Multi-channel Enhancements for IEEE 802.11-Based Multi-hop Ad-Hoc Wireless Networks. EUC Workshops 2007: 82-92 - [c6]HongGeun Kim, Jungkyu Han, Seongje Cho:
An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices. SAC 2007: 1171-1175 - 2006
- [j3]Seungwon Lee, Seongje Cho, Jongmoo Choi, Yookun Cho:
Efficient Identification of Bad Signatures in RSA-Type Batch Signature. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 74-80 (2006) - [j2]Sangchul Han, Heeheon Kim, Xuefeng Piao, Minkyu Park, Seongje Cho, Yookun Cho:
Finish Time Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems. IEICE Trans. Inf. Syst. 89-D(12): 2981-2984 (2006) - [c5]Xuefeng Piao, Sangchul Han, Heeheon Kim, Minkyu Park, Yookun Cho, Seongje Cho:
Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems. ISORC 2006: 359-364 - 2005
- [j1]Minkyu Park, Sangchul Han, Heeheon Kim, Seongje Cho, Yookun Cho:
Comparison of Deadline-Based Scheduling Algorithms for Periodic Real-Time Tasks on Multiprocessor. IEICE Trans. Inf. Syst. 88-D(3): 658-661 (2005) - [c4]Seungwon Lee, Seongje Cho, Jongmoo Choi, Yookun Cho:
Batch Verification with DSA-Type Digital Signatures for Ubiquitous Computing. CIS (2) 2005: 125-130 - [c3]Seongje Cho, Hyeyoung Chang, HongGeun Kim, WoongChul Choi:
SoIDPS: Sensor Objects-Based Intrusion Detection and Prevention System and Its Implementation. CIS (2) 2005: 260-266 - 2004
- [c2]Minkyu Park, Sangchul Han, Heeheon Kim, Seongje Cho, Yookun Cho:
Comparison of Tie-Breaking Policies for Real-Time Scheduling on Multiprocessor. EUC 2004: 174-182 - 2003
- [c1]Seongje Cho, Chulyean Chang, Joonmo Kim, Jongmoo Choi:
A Study on Monitoring and Protecting Computer System against Interception Threat. Human.Society@Internet 2003 2003: 96-105
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 21:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint