What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Huy Kang Kim
Google Scholar
ORCID:
0000-0002-0760-8807
29
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
MeNU: Memorizing normality for UAV anomaly detection with a few sensor values.
Jeong Do Yoo
Gang Min Kim
Min Geun Song
Huy Kang Kim
2024
journals/compsec
GUIDE: GAN-based UAV IDS Enhancement.
Jeong Do Yoo
Haerin Kim
Huy Kang Kim
2024
conf/sp
Benzene: A Practical Root Cause Analysis System with an Under-Constrained State Mutation.
Younggi Park
Hwiwon Lee
Jinho Jung
Hyungjoon Koo
Huy Kang Kim
2024
conf/wisa
Field Testing and Detection of Camera Interference for Autonomous Driving.
Ki Beom Park
Huy Kang Kim
2024
conf/wisa
Who Ruins the Game?: Unveiling Cheating Players in the "Battlefield" Game.
Dong Young Kim
Huy Kang Kim
2024
conf/dsn
Mitigating False Positives in DGA Detection for Non-English Domain Names.
Huiju Lee
Huy Kang Kim
2023
journals/tifs
TOW-IDS: Intrusion Detection System Based on Three Overlapped Wavelets for Automotive Ethernet.
Mee Lan Han
Byung Il Kwak
Huy Kang Kim
2022
journals/compsec
Unsupervised malicious domain detection with less labeling effort.
Kyung Ho Park
Hyun Min Song
Jeong Do Yoo
Su-Youn Hong
Byoungmo Cho
Kwangsoo Kim
Huy Kang Kim
2022
conf/asiajcis
Bot-pelganger: Predict and Preserve Game Bots' Behavior.
Yongsik Kim
Huy Kang Kim
2022
conf/csr2
SoK: Demystifying Cyber Resilience Quantification in Cyber-Physical Systems.
Hwiwon Lee
Sosun Kim
Huy Kang Kim
2021
journals/compsec
AutoVAS: An automated vulnerability analysis system with a deep learning approach.
Sanghoon Jeon
Huy Kang Kim
2021
journals/compsec
Cybersecurity for autonomous vehicles: Review of attacks and defense.
Kyounggon Kim
Jun Seok Kim
Seonghoon Jeong
Jo-Hee Park
Huy Kang Kim
2021
journals/compsec
TZMon: Improving mobile game security with ARM trustzone.
Sanghoon Jeon
Huy Kang Kim
2021
journals/tifs
Event-Triggered Interval-Based Anomaly Detection and Attack Identification Methods for an In-Vehicle Network.
Mee Lan Han
Byung Il Kwak
Huy Kang Kim
2021
conf/wisa
Unsupervised Driver Behavior Profiling Leveraging Recurrent Neural Networks.
Young Ah Choi
Kyung Ho Park
Eunji Park
Huy Kang Kim
2020
journals/compsec
De-Wipimization: Detection of data wiping traces for investigating NTFS file system.
Dong Bin Oh
Kyung Ho Park
Huy Kang Kim
2020
journals/compsec
CAN-ADF: The controller area network attack detection framework.
Shahroz Tariq
Sangyup Lee
Huy Kang Kim
Simon S. Woo
2020
conf/asiajcis
Anomaly Detection using Clustered Deep One-Class Classification.
Younghwan Kim
Huy Kang Kim
2020
conf/wisa
Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort.
Kyung Ho Park
Eunji Park
Huy Kang Kim
2019
conf/wisa
Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM.
Kyung Ho Park
Eunjo Lee
Huy Kang Kim
2019
conf/acsac
FuzzBuilder: automated building greybox fuzzing environment for C/C++ library.
Joonun Jang
Huy Kang Kim
2018
conf/wisa
ADSaS: Comprehensive Real-Time Anomaly Detection System.
Sooyeon Lee
Huy Kang Kim
2017
journals/tifs
Crime Scene Reconstruction: Online Gold Farming Network Analysis.
Hyukmin Kwon
Aziz Mohaisen
Jiyoung Woo
Yongdae Kim
Eunjo Lee
Huy Kang Kim
2017
conf/dsn
Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches.
Mengmeng Ge
Huy Kang Kim
Dong Seong Kim
2016
journals/compsec
Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information.
Jae-wook Jang
Hyun-Jae Kang
Jiyoung Woo
Aziz Mohaisen
Huy Kang Kim
2016
conf/cns
WHAP: Web-hacking profiling using Case-Based Reasoning.
Mee Lan Han
Hee Chan Han
Ah Reum Kang
Byung Il Kwak
Aziz Mohaisen
Huy Kang Kim
2016
conf/ndss
You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild.
Eunjo Lee
Jiyoung Woo
Hyoungshick Kim
Aziz Mohaisen
Huy Kang Kim
2014
conf/wisa
ADAM: Automated Detection and Attribution of Malicious Webpages.
Ahmed E. Kosba
Aziz Mohaisen
Andrew G. West
Trevor Tonn
Huy Kang Kim
2013
conf/icisc
Who Is Sending a Spam Email: Clustering and Characterizing Spamming Hosts.
Jiyoung Woo
Hyun-Jae Kang
Ah Reum Kang
Hyukmin Kwon
Huy Kang Kim
Coauthors
Ah Reum Kang
(2)
Ahmed E. Kosba
(1)
Andrew G. West
(1)
Aziz Mohaisen
(5)
Byoungmo Cho
(1)
Byung Il Kwak
(3)
Dong Bin Oh
(1)
Dong Seong Kim
(1)
Dong Young Kim
(1)
Eunji Park
(2)
Eunjo Lee
(3)
Gang Min Kim
(1)
Haerin Kim
(1)
Hee Chan Han
(1)
Huiju Lee
(1)
Huy Kang Kim
(29)
Hwiwon Lee
(2)
Hyoungshick Kim
(1)
Hyukmin Kwon
(2)
Hyun Min Song
(1)
Hyun-Jae Kang
(2)
Hyungjoon Koo
(1)
Jae-wook Jang
(1)
Jeong Do Yoo
(3)
Jinho Jung
(1)
Jiyoung Woo
(4)
Jo-Hee Park
(1)
Joonun Jang
(1)
Jun Seok Kim
(1)
Ki Beom Park
(1)
Kwangsoo Kim
(1)
Kyounggon Kim
(1)
Kyung Ho Park
(5)
Mee Lan Han
(3)
Mengmeng Ge
(1)
Min Geun Song
(1)
Sanghoon Jeon
(2)
Sangyup Lee
(1)
Seonghoon Jeong
(1)
Shahroz Tariq
(1)
Simon S. Woo
(1)
Sooyeon Lee
(1)
Sosun Kim
(1)
Su-Youn Hong
(1)
Trevor Tonn
(1)
Yongdae Kim
(1)
Yongsik Kim
(1)
Young Ah Choi
(1)
Younggi Park
(1)
Younghwan Kim
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to