Publications

International Conferences

2024


Kanghoon Lee, Youngbae Jeon, and Ji Won Yoon, 9th IEEE European Symposium on Security and Privacy (Euro S&P 2024)



2023


Dowoo Baik, Ji Won Yoon, The 15th Asian Conference on Machine Learning (ACML), 2023

 

Tae Min Ahn, Kang Hoon Lee, Joon Soo Yoo and Ji Won Yoon , 28th European Symposium on Research in Computer Security (ESORICS) 2023


Yongbin Park, Minchul Kim, Ji Won Yoon, Proceedings of the 22nd IEEE Statistical Signal Processing Workshop, SSP 2023  


Kang Hoon Lee and Ji Won Yoon , 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (PKC) 2023


Hyunsoo Kim, Youngbae Jeon, and Ji Won Yoon, The 18th ACM Asia Conference on Computer and Communications Security (ACM ASIACCS) 2023

2022


Youngbae Jeon, Hyekyung Han, and Ji Won Yoon , International Conference on Pattern Recognition (ICPR) 2022



2021


Efficient Adaptation of TFHE for High End-to-End Throughput [link]

Kang Hoon Lee and Ji Won Yoon, International Conference on Information Security Applications (WISA 2021)



2020


Location tracking technique for Regional ENF Classification Using ARIMA [link]

S. Kim, J. W. Yoon, ICTC 2020


Comparison of various interpolation techniques to infer localization of audio files using ENF signals [link]

H Han, KH Lee, Y Jeon, JW Yoon, 2020 International Conference on Software Security and Assurance (ICSSA), 46-51


ResMax: Detecting Voice Spoofing Attacks with Residual Network and Max Feature Map [link]

I. Kwak, S. Kwak, J. Lee, J. H. Huh, C. Lee, Y. B. Jeon, J. Hwang,  J. W. Yoon, International conference of Pattern Recognition (ICPR), 2020 (Accepted for publication)


2019


Static Malware Analysis in Encrypted Domain [link]

T. Hwang and J. W. Yoon, ICTC, 2019


Forecasting the Electric Network Frequency signals on Power Grid [link]

W. Bang, and J. W. Yoon, ICTC 2019


Model Selection for data analysis in encrypted domains: application to simple linear regression [link]

M. Hong, J. W. Yoon, WISA 2019, Lecture Notes in Computer Science book series (LNCS, volume 11897)


A Bitwise Logistic Regression using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme [link pdf]

J. S. Yoo, J. H. Hwang, B. K. Song and J. W. Yoon, The 15th International Conference on Information Security Practice and Experience (ISPEC 2019)


Voice Presentation Attack Detection through Text-Converted Voice Command Analysis [link]

I. Y. Kwak, I.J. Kim, J.H. Huh, and J. W. Yoon, The ACM CHI Conference on Human Factors in Computing Systems, (CHI 2019)


2018


A New Bayesian Approach to Exploring Damaged assets by Monitoring Mission Failures Caused by Undetected Attack

S.W. Shim and J. W. Yoon, WISA 2018


Logarithm Design on Encrypted Data with Bitwise Operation

J. S. Yoon, B.K. Song, and J. W. Yoon, WISA 2018


I'm Listening to your Location! Inferring User Location with Acoustic Side Channel

Y. Jeon, M. Kim, H. Kim, H. Kim, J. H. Huh and J. W. Yoon, “The Web Conference 2018” (WWW 2018)


PD-FDS: Purchase Density based Online Credit Card Fraud Detection System [link]

Y.J. Ki and J. W. Yoon, Proceedings of the KDD 2017: Workshop on Anomaly Detection in Finance, PMLR 71:76-84, 2018. 

2017


A new side channel attack on digital door lock with vibration signal analysis: The longer password does not guarantee higher security level

Y. M. Ha, S. H. Jang, K. W. Kim and J. W. Yoon, International Conference on Multisensor Fusion and Integration for Intelligent Systems (MFI), 2017

link


Construction of a National Scale ENF Map using Online Multimedia Data

H. Kim, Y. Jeon and J. W. Yoon, ACM International Conference on Information and Knowledge Management, long full research paper (CIKM) 2017

link


Model Parameter Estimation and Inference on Encrypted domain: Application to Noise Reduction in Encrypted Images

S. Lee and J. W. Yoon, WISA, 2017 (Best paper awarded) 


An efficient method to securely store and handle genomic data [link]

Y.J. Ki and J. W. Yoon, 2017 International Conference on Software Security and Assurance (ICSSA) 


2016


Classification of Home Appliance by using Probabilistic KNN with Sensor Data [link]

Seung-Joon Kang, and J. W. Yoon, the Asia-Pacific Signal and Information Processing Association (APSIPA),  2016 [area: signal processing and IoT]


A new approach to building a disguised server using the honey port against general scanning attacks [link]

Hyunsoo Park, Youngbae Jeon, and J. W. Yoon, The 11th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), 2016 [area: Network security]


A Practical approach to constructing triple-blind review process with maximal anonymity and fairness [link]

J. S. Jung, J.-I. Kim and J. W. Yoon, The 17th World Conference on Information Security Applications (WISA), 2016 [area: privacy and anomaly]


Honey Chatting: A Novel Instant Messaging System Robust to Eavesdropping over Communication [link, poster]

J.-I. Kim and J. W. Yoon, IEEE the 41st IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2016

 

An adaptive approximation for Gaussian wavelet Kernel [link]

Y. M. Ha and J. W. Yoon, IEEE The 18th International Conference on Advanced Communications Techology (ICACT) 2016

 

An efficient geometric shape coding and representation approach to obtain both skeleton and contours

J. W. Yoon, ACM IMCOM, 2016 [area: Computer vision]

2015


A simple sequential outlier detection with several residuals [link]

J. W. Yoon, European Signal Processing Conference (EUSIPCO), 2015 [area: signal processing]


Various threat models to detour the air-gapped systems of network separation [link]

Eunchong Lee, Hyunsoo Kim, and Ji Won Yoon, The 16th International Workshop on Information Security Applications (WISA), 2015 [area: information security]


A new technique to protect confidential documents from shoulder surfers using a shuffling method [link]

Hyunsoo Kim, Hyoungshick Kim and Ji Won Yoon, ICSSA 2015, [area: information security] (Selected as the best student paper)


Visual Honey Encryption: Application to steganography [link]

J. W. Yoon, H. S. Kim, H. J. Jo, H. L. Lee, and K. S. Lee, ACM Information Hiding and Multimedia Security (ACM IH & MMSec) 2015 [area: information security]


Passing go with DNA sequencing: Delivering messages in a covert transgenic channel [link]

J. Y. Chun, H.-L. Lee and J. W. Yoon, 2nd International Workshop on Genome Privacy and Security (GenoPri 2015), held in conjunction with the 36th IEEE Symposium on Security and Privacy (S&P), San Jose, CA, USA, 21, May, 2015


2014


Structural code scheme against brute-force attack [link]

H. J. Jo and J. W. Yoon, The 15th International Workshop on Information Security Applications (WISA 2014), [area: information security and applied mathematics]


Statistical coding scheme for the protection of cryptographic systems against brute-force attack (Poster) [link]

H. J. Jo and J. W. Yoon, IEEE Symposium on Security and Privacy (S&P), poster session, 2014 [area: information security and applied mathematics]


2013


Extracting Image Features for a new steganalysis approach

H. J. Jo and J. W. Yoon, International Conference on Internet, 2013, [area: information security]


Network Analysis of Korean legislators using Bipartite projection

J. Y. Lee, H. J. Jo and J. W. Yoon, International Conference on Internet, 2013, [area: information security]

link


2012


Bayesian separation of wind power generation signals

J. W. Yoon, F. Fusco, M. Wurst, International conference of Pattern Recognition (ICPR), 2012

link


Mining residential household information from low-resolution smart meter data

F. Fusco, M. Wurst, J. W. Yoon, International conference of Pattern Recognition (ICPR), 2012

link


Bayesian implementation of a Lagrangian macroscopic traffic flow model

J. W. Yoon, T. T. Tchrakian, International conference of Pattern Recognition (ICPR), 2012

link


Predicting arrival times of buses using real-time GPS measurements

M. Sinn, J. W. Yoon, F. Calabrese, E. Bouillet, IEEE international conference on Intelligent Transportation systems (ITSC), 2012 

link


Cityride: a predictive bike sharing journey advisor

J. W. Yoon, F. Pinelli, F. Calabrese, IEEE International conference on mobile data management, (MDM) 2012

link


2011


Effective measurement selection in truncated kernel density estimator: Voronoi mean shift algorithm for truncated kernels

J. W. Yoon, H. J. Lee, and H. S. Kim, International Conference on Ubiquitous Information Management and Communication, 2011 

link


Large-scale Bayesian ICA with application to separation of the cosmic microwave background

S. P. Wilson, and J. W. Yoon, Big Learning, Workshop of NIPS, 2011

link


Inference for latent variable models with many hyper-parameters

J. W. Yoon and S. P. Wilson, World Statistical Congress, 2011, (ISI) 

link


The Efficient Gaussian Approximation for a class of Latent Gaussian model

J. W. Yoon and S. Wilson, Irish conference on Signals and Systems (ISSC), 2011 

link


2010


Improved Mean Shift Algorithm with Heterogeneous Node Weights

J. W. Yoon, and S. P. Wilson,International conference of Pattern Recognition (ICPR), 2010 

link


A highly efficient blocked Gibbs sampler reconstruction of multidimensional NMR spectra

J. W. Yoon, S. P. Wilson, K. H. Mok, International Conference on Artificial Intelligence and Statistics (AISTATS), 2010 

link


2009


A new collision-free pseudonym scheme in mobile ad-hoc network

J. W. Yoon, and H. S. Kim, International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, 2009. (WiOPT)

link


2008


Adaptive Classification by hybrid EKF with truncated filtering: Brain Computer Interfacing

J. W. Yoon, S. J. Roberts, M. Dyson, and J. Q. Gan, Intelligent Data Engineering and Automated Learning (IDEAL) 2008

link


Sequential Bayesian Estimation for Adaptive Classification

J. W. Yoon, S. J. Roberts, M. Dyson, and J. Q. Gan, IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems (MFI), 2008

link


2007


Bayesian Inference for 2D gel electrophoresis image analysis

J. W. Yoon, S. J. Godsill, C. H. Kang, T. S. Kim, Bioinformatics Research and Development 2007 

link


2006


Bayesian inference for multidimensional NMR image reconstruction

J. W. Yoon, and S. J. Godsill, European Signal Processing Conference (EUSIPCO), 2006 

link

Previous Published Papers (Before 2013)

Publication list of Prof. Yoon (Google Scholar)