Generic unpacking using entropy analysis G Jeong, E Choo, J Lee, M Bat-Erdene, H Lee 2010 5th International Conference on Malicious and Unwanted Software, 98-105, 2010 | 80 | 2010 |
Detecting opinion spammer groups through community discovery and sentiment analysis E Choo, T Yu, M Chi Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 …, 2015 | 74 | 2015 |
SRMT: A lightweight encryption scheme for secure real-time multimedia transmission E Choo, J Lee, H Lee, G Nam 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE …, 2007 | 43 | 2007 |
Revealing and incorporating implicit communities to improve recommender systems E Choo, T Yu, M Chi, Y Sun Proceedings of the fifteenth ACM conference on Economics and computation …, 2014 | 16 | 2014 |
Method for encrypting and decrypting an image frame HJ Lee, EJ Choo, JH Lee, GW Nam US Patent App. 11/905,240, 2008 | 16 | 2008 |
Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis E Choo, T Yu, M Chi Journal of Computer Security 25 (3), 283-318, 2017 | 12 | 2017 |
SIRAJ: a unified framework for aggregation of malicious entity detectors S Thirumuruganathan, M Nabeel, E Choo, I Khalil, T Yu 2022 IEEE Symposium on Security and Privacy (SP), 507-521, 2022 | 11 | 2022 |
Content-agnostic detection of phishing domains using certificate transparency and passive dns M AlSabah, M Nabeel, Y Boshmaf, E Choo Proceedings of the 25th International Symposium on Research in Attacks …, 2022 | 9 | 2022 |
A large scale study and classification of virustotal reports on phishing and malware urls E Choo, M Nabeel, D Kim, R De Silva, T Yu, I Khalil ACM SIGMETRICS Performance Evaluation Review 52 (1), 55-56, 2024 | 8 | 2024 |
Identifying malicious metering data in advanced metering infrastructure E Choo, Y Park, H Siyamwala 2014 IEEE 8th International Symposium on Service Oriented System Engineering …, 2014 | 8 | 2014 |
Time-window based group-behavior supported method for accurate detection of anomalous users LP Yuan, E Choo, T Yu, I Khalil, S Zhu 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021 | 7 | 2021 |
Ravindu De Silva, Ting Yu, and Issa Khalil. 2022. A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs E Choo, M Nabeel arXiv preprint arXiv:2205.13155, 2022 | 6 | 2022 |
DeviceWatch: a data-driven network analysis approach to identifying compromised mobile devices with graph-inference E Choo, M Nabeel, M Alsabah, I Khalil, T Yu, W Wang ACM Transactions on Privacy and Security 26 (1), 1-32, 2022 | 4 | 2022 |
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs E Choo, M Nabeel, D Kim, R De Silva, T Yu, I Khalil Proceedings of the ACM on Measurement and Analysis of Computing Systems 7 (3 …, 2023 | 3 | 2023 |
Method and system for domain maliciousness assessment via real-time graph inference M Nabeel, IM Khalil, T Yu, E Choo US Patent 11,206,275, 2021 | 3 | 2021 |
Graphic model analysis of frauds in online consumer reviews C Song, K Goswami, Y Park, SY Chang, E Choo Proceedings of the Second International Conference on Internet of things …, 2017 | 3 | 2017 |
Munkhbayar Bat-Erdene, and Heejo Lee.“ G Jeong, E Choo, J Lee Generic unpacking using entropy analysis.” In: MALWARE., 2010 | 3 | 2010 |
Anomalous user account detection systems and methods IM Khalil, T Yu, EJ Choo, LP Yuan, S Zhu US Patent 11,991,196, 2024 | 2 | 2024 |
Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users LP Yuan, E Choo, T Yu, I Khalil, S Zhu arXiv preprint arXiv:2012.13971, 2020 | 2 | 2020 |
Analyzing opinion spammers’ network behavior in online review systems E Choo 2018 IEEE Fourth International Conference on Big Data Computing Service and …, 2018 | 2 | 2018 |