Publications

Journals & Conference

International Journals


2022

  • Clock Offset Estimation for Systems with Asymmetric Packet Delays [accepted for publication]

Y.M. Ha, U.J. Pak, J.K, T.H. Kim and Ji Won Yoon, IEEE/ACM Transactions on Networking


  • A Phase-Based Approach for ENF Signal Extraction From Rolling Shutter Videos [link]

Hyekyung Han, Youngbae Jeon, Baek-kyung Song and Ji Won Yoon, IEEE Signal Processing Letters, Volume 29, Pages 1724-1728, 08 July, 2022 DOI: 10.1109/LSP.2022.3189306


  • The impact of COVID-19 on cryptocurrency markets: A network analysis based on mutual information [link]

Mi Yeon Hong, Ji Won Yoon, PLOS ONE 17.2 (2022)


Youngbae Jeon, Hyekyung Han, Ji Won Yoon, 2022 26th International Conference on Pattern Recognition (ICPR)


2021

  • t-BMPNet: Trainable Bitwise Multilayer Perceptron Neural Network over Fully Homomorphic Encryption Scheme [link]

J. S. Yoo, J.W. Yoon, Security and Communication Networks (2021)

  • A new approach to training more interpretable model with additional segmentation [link]

Sunguk Shin, Youngjoon Kim, and Ji Won Yoon, Pattern Recognition Letters, Volume 152, December 2021, Pages 188-194 (2021)


  • Efficient Correlation Power Analysis (CPA) Focusing on Byte-Wise Calculation Points [link]

Youngbae Jeon, Ji Hyeok Jung, Ji Won Yoon, IEEE Access 9, 74275-74285


2020

  • Maxafl: Maximizing code coverage with a gradient-based optimization technique, [link]

Y Kim, J Yoon, Electronics 10 (1), 11


  • Homomorphic Model Selection for Data Analysis in an Encrypted Domain [link]

M.Y. Hong, J.S. Yoo, and J. W. Yoon, Applied Sciences 10.18 (2020): 6174


  • An Automated End-to-End Side Channel Analysis Based on Probabilistic Model [link]

J. Hwang and J. W. Yoon, Applied Science, 30 March 2020 [area: signal processing and information security]


2019

  • The power grid estimation using Electric Network Frequency signals

W. Bang, and J. W. Yoon, Security and Communication Networks 2019, (Accepted for publication) [area: signal processing and information security]


  • A global sampler of single particle tracking solutions for single molecule microscopy [link]

PLOS ONE 2019, October 28, 2019, https://doi.org/10.1371/journal.pone.0221865 [area: statistical signal processing]


  • A Bitwise Design and Implementation for Privacy Preserving Data Mining: From Atomic Operations to Advanced Algorithms

B. K. Song, J. S. Yoo, M. Hong, and J. W. Yoon, Security and Communication Networks 2019, (Accepted for publication) [area: cryptography and security]


2017

  • The vulnerability exploitation conveying digital data over mobile voice call channels [link]

S.J. Lee, Y.M. Ha, S.J. Yoon, H.J. Jo, S.H. Jang, J.Y. Lee, Y.A. Kim and J. W. Yoon, Wireless Personal Communications, 25, May, 2017 [area: AI, Communication and security]


2016

  • A new Bayesian edge linking algorithm using single target tracking techniques [link matlab_code]

J. W. Yoon, Symmetry 2016, 8(12), 143


  • Bayesian Interpretation to Generalize Adaptive Mean Shift Algorithm [link]

J. W. Yoon, Journal of Intelligent and Fuzzy Systems, 2016


2015

  • Model selection for mixture model via integrated nested Laplace approximation [link bibtex]

J. W. Yoon, IET Electronics Letters, 2015, Vol. 51, No. 6, pp. 484-486 [area: statistical signal processing]


  • A novel statistical approach to detect card frauds using transaction patterns [link]

C. C. Lee and J. W. Yoon, IEICE Transactions on Information and Systems, Vol.E98-D, No.3,pp.649-660, Mar. 2015.[area: signal processing and information security]


  • A new countermeasure against brute force attacks that use high performance computers for big data analysis [link]

H.-J. Jo and J. W. Yoon, International Journal of Distributed Sensor Networks, 2015 [area: cryptography and security]


2014

  • Efficient model selection for probabilistic K nearest neighbour classification [link]

J. W. Yoon and Nial Friel, Neurocomputing, 2014[area: signal processing]


  • Bayesian reconstruction of Projection Reconstruction NMR (PR-NMR) [link]

J. W. Yoon, 2014, Computers in Biology and Medicine, Volume 54, Pages 89–99, November 1, 2014.(Selected as a Honorable Mention Paper) [area: signal processing and medicine


  • Statistical Denoising Scheme for single molecule fluorescence microscopic images [link]

J. W. Yoon, Biomedical Signal Processing and Control, Volume 10, March 2014, Pages 11–20, [area: signal processing and applied mathematics]


  • Network analysis of temporal trends in scholarly research productivity [link]

H. Kim, J. W. Yoon and J. Crowcroft, Journal of Informetrics, Volume 6, no. 1, pp. 97--110


  • Bayesian inference for an adaptive ordered probit model: An application to brain computer inferfacing [link]

J. W. Yoon, S. J. Roberts, M. Dyson and J. Q. Gan, Neural Networks, v. 24, no. 7, pp. 726--734


  • A perfect collision-free pseudonym system [link]

J. W. Yoon and H. S. Kim, IEEE Communications letters, vol 15, no. 6, pp. 686--688


  • An image encryption scheme with a pseudorandom permutation based on chaotic maps [link]

J. W. Yoon and H. S. Kim, (2010), Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 12, pp. 3998--4006


  • Hybrid spam filtering fro mobile communication [link]

J. W. Yoon and H. S. Kim, and J. H. Hur, (2010), Computers & Security, vol. 29, no. 4, pp. 446--459


  • Robust measurement validation in target tracking using geometric structure [link]

J. W. Yoon and S. J. Roberts, (2010), IEEE Signal Processing Letters, vol 17, no. 5, pp. 493--496


  • Adaptive classification for brain computer interface systems using sequential Monte Carlo sampling [link]

J. W. Yoon, S. J. Roberts, M. Dyson and J. Q. Gan, (2009), Neural Networks, vol. 22, no. 9, pp. 1286--1294


  • DySCo: quantitating associations of membrane proteins using two-color single molecule tracking [link]

P. D. Dunne, R. A. Fenandes, J. McColl, J. W. Yoon, J. R. James, S. J. Dvis, D. Klenerman, 2009, Biophysical Journal, Vol 97, No. 4, pp. L5--L7


  • Bayesian inference for improved single molecule fluorescence tracking [link]

J. W. Yoon, A. Bruckbauer, W. J. Fitzgerald, D. Klenerman, 2008, Biophysical Journal, vol 94, No. 12, pp. 4932--4947


  • Nanopipette delivery of individual molecules to cellular compartments for single molecule fluorescence tracking [link]

A. Bruckbauer, P. James, D. Zhou, J. W. Yoon, D. Excell, Y. Korchev, R. Jones, D. Klenerman, 2007, Biophysical Journal, Vol. 93, No. 9, pp. 3120--3131


  • Deterministic and Statistical methods for reconstructing multidimensiional NMR spectra [link]

J. W. Yoon, S. Godsill, E. Kupce, R. Freeman, 2006, Magnetic Resonance in Chemistry, Vol 44, No 3, pp. 197--209


International Conferences

Invasion of location privacy using online map services and smartphone sensors [accepted for publication]

Hyunsoo Kim, Youngbae Jeon, and Ji Won Yoon, The 18th ACM Asia Conference on Computer and Communications Security (ACM ASIACCS) 2023


Manifold Learning-based Frequency Estimation for extracting ENF signal from digital video [link]

Youngbae Jeon, Hyekyung Han, and Ji Won Yoon , International Conference on Pattern Recognition (ICPR) 2022


Efficient Adaptation of TFHE for High End-to-End Throughput [link]

Kang Hoon Lee and Ji Won Yoon, International Conference on Information Security Applications (WISA 2021)


Location tracking technique for Regional ENF Classification Using ARIMA [link]

S. Kim, J. W. Yoon, ICTC 2020


Comparison of various interpolation techniques to infer localization of audio files using ENF signals [link]

H Han, KH Lee, Y Jeon, JW Yoon, 2020 International Conference on Software Security and Assurance (ICSSA), 46-51


ResMax: Detecting Voice Spoofing Attacks with Residual Network and Max Feature Map [link]

I. Kwak, S. Kwak, J. Lee, J. H. Huh, C. Lee, Y. B. Jeon, J. Hwang, J. W. Yoon, International conference of Pattern Recognition (ICPR), 2020 (Accepted for publication)


Static Malware Analysis in Encrypted Domain [link]

T. Hwang and J. W. Yoon, ICTC, 2019


Forecasting the Electric Network Frequency signals on Power Grid [link]

W. Bang, and J. W. Yoon, ICTC 2019


Model Selection for data analysis in encrypted domains: application to simple linear regression [link]

M. Hong, J. W. Yoon, WISA 2019, Lecture Notes in Computer Science book series (LNCS, volume 11897)


A Bitwise Logistic Regression using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme [link pdf]

J. S. Yoo, J. H. Hwang, B. K. Song and J. W. Yoon, The 15th International Conference on Information Security Practice and Experience (ISPEC 2019)


Voice Presentation Attack Detection through Text-Converted Voice Command Analysis [link]

I. Y. Kwak, I.J. Kim, J.H. Huh, and J. W. Yoon, The ACM CHI Conference on Human Factors in Computing Systems, (CHI 2019)


A New Bayesian Approach to Exploring Damaged assets by Monitoring Mission Failures Caused by Undetected Attack

S.W. Shim and J. W. Yoon, WISA 2018


Logarithm Design on Encrypted Data with Bitwise Operation

J. S. Yoon, B.K. Song, and J. W. Yoon, WISA 2018


I'm Listening to your Location! Inferring User Location with Acoustic Side Channel

Y. Jeon, M. Kim, H. Kim, H. Kim, J. H. Huh and J. W. Yoon, “The Web Conference 2018” (WWW 2018)


A new side channel attack on digital door lock with vibration signal analysis: The longer password does not guarantee higher security level

Y. M. Ha, S. H. Jang, K. W. Kim and J. W. Yoon, International Conference on Multisensor Fusion and Integration for Intelligent Systems (MFI), 2017

link


Construction of a National Scale ENF Map using Online Multimedia Data

H. Kim, Y. Jeon and J. W. Yoon, ACM International Conference on Information and Knowledge Management, long full research paper (CIKM) 2017

link


Model Parameter Estimation and Inference on Encrypted domain: Application to Noise Reduction in Encrypted Images

S. Lee and J. W. Yoon, WISA, 2017 (Best paper awarded)


PD-FDS: Purchase Density based Online Credit Card Fraud Detection System [link]

Y.J. Ki and J. W. Yoon, Proceedings of the KDD 2017: Workshop on Anomaly Detection in Finance, PMLR 71:76-84, 2018.


An efficient method to securely store and handle genomic data [link]

Y.J. Ki and J. W. Yoon, 2017 International Conference on Software Security and Assurance (ICSSA)


Classification of Home Appliance by using Probabilistic KNN with Sensor Data [link]

Seung-Joon Kang, and J. W. Yoon, the Asia-Pacific Signal and Information Processing Association (APSIPA), 2016 [area: signal processing and IoT]


A new approach to building a disguised server using the honey port against general scanning attacks [link]

Hyunsoo Park, Youngbae Jeon, and J. W. Yoon, The 11th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), 2016 [area: Network security]


A Practical approach to constructing triple-blind review process with maximal anonymity and fairness [link]

J. S. Jung, J.-I. Kim and J. W. Yoon, The 17th World Conference on Information Security Applications (WISA), 2016 [area: privacy and anomaly]


Honey Chatting: A Novel Instant Messaging System Robust to Eavesdropping over Communication [link, poster]

J.-I. Kim and J. W. Yoon, IEEE the 41st IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2016

An adaptive approximation for Gaussian wavelet Kernel [link]

Y. M. Ha and J. W. Yoon, IEEE The 18th International Conference on Advanced Communications Techology (ICACT) 2016

An efficient geometric shape coding and representation approach to obtain both skeleton and contours

J. W. Yoon, ACM IMCOM, 2016 [area: Computer vision]


A simple sequential outlier detection with several residuals [link]

J. W. Yoon, European Signal Processing Conference (EUSIPCO), 2015 [area: signal processing]


Various threat models to detour the air-gapped systems of network separation [link]

Eunchong Lee, Hyunsoo Kim, and Ji Won Yoon, The 16th International Workshop on Information Security Applications (WISA), 2015 [area: information security]


A new technique to protect confidential documents from shoulder surfers using a shuffling method [link]

Hyunsoo Kim, Hyoungshick Kim and Ji Won Yoon, ICSSA 2015, [area: information security] (Selected as the best student paper)


Visual Honey Encryption: Application to steganography [link]

J. W. Yoon, H. S. Kim, H. J. Jo, H. L. Lee, and K. S. Lee, ACM Information Hiding and Multimedia Security (ACM IH & MMSec) 2015 [area: information security]


Passing go with DNA sequencing: Delivering messages in a covert transgenic channel [link]

J. Y. Chun, H.-L. Lee and J. W. Yoon, 2nd International Workshop on Genome Privacy and Security (GenoPri 2015), held in conjunction with the 36th IEEE Symposium on Security and Privacy (S&P), San Jose, CA, USA, 21, May, 2015


Structural code scheme against brute-force attack [link]

H. J. Jo and J. W. Yoon, The 15th International Workshop on Information Security Applications (WISA 2014), [area: information security and applied mathematics]


Statistical coding scheme for the protection of cryptographic systems against brute-force attack (Poster) [link]

H. J. Jo and J. W. Yoon, IEEE Symposium on Security and Privacy (S&P), poster session, 2014 [area: information security and applied mathematics]

Extracting Image Features for a new steganalysis approach

H. J. Jo and J. W. Yoon, International Conference on Internet, 2013, [area: information security]


Network Analysis of Korean legislators using Bipartite projection

J. Y. Lee, H. J. Jo and J. W. Yoon, International Conference on Internet, 2013, [area: information security]

link


Bayesian separation of wind power generation signals

J. W. Yoon, F. Fusco, M. Wurst, International conference of Pattern Recognition (ICPR), 2012

link


Mining residential household information from low-resolution smart meter data

F. Fusco, M. Wurst, J. W. Yoon, International conference of Pattern Recognition (ICPR), 2012

link


Bayesian implementation of a Lagrangian macroscopic traffic flow model

J. W. Yoon, T. T. Tchrakian, International conference of Pattern Recognition (ICPR), 2012

link


Predicting arrival times of buses using real-time GPS measurements

M. Sinn, J. W. Yoon, F. Calabrese, E. Bouillet, IEEE international conference on Intelligent Transportation systems (ITSC), 2012

link


Cityride: a predictive bike sharing journey advisor

J. W. Yoon, F. Pinelli, F. Calabrese, IEEE International conference on mobile data management, (MDM) 2012

link


Effective measurement selection in truncated kernel density estimator: Voronoi mean shift algorithm for truncated kernels

J. W. Yoon, H. J. Lee, and H. S. Kim, International Conference on Ubiquitous Information Management and Communication, 2011

link


Large-scale Bayesian ICA with application to separation of the cosmic microwave background

S. P. Wilson, and J. W. Yoon, Big Learning, Workshop of NIPS, 2011

link


Inference for latent variable models with many hyper-parameters

J. W. Yoon and S. P. Wilson, World Statistical Congress, 2011, (ISI)

link


The Efficient Gaussian Approximation for a class of Latent Gaussian model

J. W. Yoon and S. Wilson, Irish conference on Signals and Systems (ISSC), 2011

link


Improved Mean Shift Algorithm with Heterogeneous Node Weights

J. W. Yoon, and S. P. Wilson,International conference of Pattern Recognition (ICPR), 2010

link


A highly efficient blocked Gibbs sampler reconstruction of multidimensional NMR spectra

J. W. Yoon, S. P. Wilson, K. H. Mok, International Conference on Artificial Intelligence and Statistics (AISTATS), 2010

link


A new collision-free pseudonym scheme in mobile ad-hoc network

J. W. Yoon, and H. S. Kim, International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, 2009. (WiOPT)

link


Adaptive Classification by hybrid EKF with truncated filtering: Brain Computer Interfacing

J. W. Yoon, S. J. Roberts, M. Dyson, and J. Q. Gan, Intelligent Data Engineering and Automated Learning (IDEAL) 2008

link


Sequential Bayesian Estimation for Adaptive Classification

J. W. Yoon, S. J. Roberts, M. Dyson, and J. Q. Gan, IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems (MFI), 2008

link


Bayesian Inference for 2D gel electrophoresis image analysis

J. W. Yoon, S. J. Godsill, C. H. Kang, T. S. Kim, Bioinformatics Research and Development 2007

link


Bayesian inference for multidimensional NMR image reconstruction

J. W. Yoon, and S. J. Godsill, European Signal Processing Conference (EUSIPCO), 2006

link

Previous Published Papers (Before 2013)

Publication list of Prof. Yoon (Google Scholar)

Published Korean Journals (Since 2013)

망혼용단말 탐지방법에 대한 연구 및 자동탐지시스템 구현

M. H. Lee and J. W. Yoon, 정보보호학회논문지 제28권 제2호, 2018.4, 457-469

link


IoT환경에서의 부하 균형을 이룬 네트워크 토폴로지 탐색

H. S. Park, H. S. Kim and J. W. Yoon, 한국정보과학회, 2017, [accepted for publication]


효율적인 임무피해평가를 위한 자산-임무 의존성 모델 적 및 최적화된 구현

Y. B. Jeon, H. S. Jung, I. S. Han, and J. W. Yoon, 한국정보과학회, 2017, [accepted for publication]


NS-3 시물레이터를 활용한 토폴로지 규모추정에 대한 실험적 검증

H. S. Kim, H. S. Park and J. W. Yoon, 한국정보전자통신과학기술학회, 2017, [accepted for publication]


AISecurity를 위한 베이지안 추론 기술 소개

Ji Won Yoon, 한국정보과학회, 정보과학회 컴퓨팅의 실제 논문지 22(12), 2016.12, 694-695


허니암호의 메시지 복구보안 기능을 위한 암호패딩 문제점 분석

C.-H. Ji and Ji Won Yoon, 한국정보과학회, 정보과학회논문지 44(6), 2017.6, 637-642


Open CV를 활용한 미확인 항공기 추적을 위한 비정형 대용량 데이터 매칭 시스템 설계

J.-H. Cho and Ji Won Yoon, Journal of Digital Forensics 2016 Dec.: 10(2), [area: Digital Forensics]

link


생체정보 다분할 분산저장 기법을 통한 보안성 향상의 생체인증 시스템 설계

Yoongi Hong and Ji Won Yoon, 한국융합보안학회, 2016, (Accepted for publication with minor revision)[area: biometrics]


Rapid Hybrid Recommender System with BigData Log for Outbound Leisure Product

Kyusik Lee and Ji Won Yoon, 2016, 제22권 제12호, 2016.12, 646-653[area: data mining]

link


Author Identification using Artificial Neural Network

Jisoo Jung and Ji Won Yoon, 한국정보보호학회, 제26권 제5호, 2016.10, 1191-1199 [area: cyber intelligence]


ISIS-related issue analysis system based on Topic model (Topic model 기반의 국가 별 ISIS 관련 관심 이슈 분석 시스템)

Sunghoon Kim, and Ji Won Yoon, 한국정보과학회, 제43권 제11호, 2016.11, 1201-1209 [area: cyber intelligence]


Illegal and Harmful Information Detection Technique Using Combination of Search Words (단어 조합 검색을 이용한 불법·유해정보 탐지 기법)

Byoung-Woo Han, and Ji Won Yoon, 한국정보보호학회, 제26권 제2호, 2016.4, 397-404[area: cyber intelligence]

link


Which country"s end devices are most sharing vulnerabilities in East Asia? (거시적인 관점에서 바라본 취약점 공유 정도를 측정하는 방법에 대한 연구)

Kwang-Won Kim and Ji Won Yoon, 한국정보보호학회, 제25권 제5호, 2015.10, 1281-1291 [area: information security]

link


스마트 기기 환경에서 전력 신호 분석을 통한 프라이버시 침해 위협 (Threatening privacy by identifying appliances and the pattern of the usage from electric signal data)

Jae-Yeon Jo and Ji Won Yoon, 한국정보보호학회 Journal of The Korea Institute of Information Security & Cryptology, 제25권 제5호, 2015.10, 1001-1009, 2015

link


Probabilistic K-nearest neighbour classifier for detection of malware in android mobile

Seung Joon Kang and Ji Won Yoon, Journal of The Korea Institute of Information Security & Cryptology, 2015, 정보보호학회논문지 제25권 제4호, 2015.8, 817-827

link


Optimization of Lightweight Encryption Algorithm (LEA) using threads and shared memory of GPU

Moo Kyu Park and Ji Won Yoon, Journal of The Korea Institute of Information Security & Cryptology, 2015, 정보보호학회논문지 제25권 제4호, 2015.8, 719-726

link


A study on the managed security services (MSS) method for energy-based SCADA Systems (에너지 기반보호시설의 보안관제 방안에 관한 연구)

Jeong-woo Jang, Woo-suk Kim and Ji Won Yoon, Journal of The Korea Institute of Information Security & Cryptology, Vol. 25, No. 2, Apr. 2015, pp. 279-292,

link


클라우드 환경에서의 사이버 물리 시스템 관점에서 본 헬스케어 보안 관련 이슈들

Hyelim Lee, Jae Yeon Jo, and Ji Won Yoon, 정보보학회지, 2014, Vol. 24, No. 6, 2014, pp. 7-13

link


A Side Channel Attack with Vibration Signal on Card Terminal (진동 신호를 이용한 카드 단말기 부채털 공격)

Soo Hee Jang, YoungMok Ha and Ji Won Yoon, Journal of The Korea Institute of Information Security & Cryptology, Vol. 24, No. 6, Dec, 2014, pp. 1045-1053

link


A Study of Accident Prevention Effect through Anomaly Analysis in E-Banking (전자금융거래 이상징후 분석을 통한 사고예방 효과성에 관한 연구)

Eun Young Park, and Ji Won Yoon, Journal of Socieity for e-Business Studies, Vol 19, No. 4, Nov. 2014, pp. 119-134

link


A Study on the Countermeasures for Prevention of Opening a Fraud Account (사기이용계좌 개설 방지를 위한 대응방안 연구)

Chang Woo Kim and Ji Won Yoon, Journal of The Korea Institute of Information Security & Cryptology, Vol. 25, No. 1, Feb., 2015, pp. 173-179

link


Efficient Malware Detector for Android Devices

Hyelim Lee and Ji Won Yoon, Korea institute of information security and cryptology, 2014

link


Network Analysis of Korean legislators using Bipartite Network Projection

Ji-yeon Lee, Hyun-joo Jo, and Ji Won Yoon, Journal of Internet Computing and Services(JICS), 2014, August

link


Discrimination of SPAM and prevention of smishing by sending personally identified SMS(For financial sector), 개인식별화된 SMS 발송을 통한 스팸식별 및 스미싱 예방 (금융권 중심)

Choon Kyong Joo and Ji Won Yoon, Journal of The Korea Institute of Information Security & Cryptology, v.24 no.4, 2014, pp.645-653

link


Network Analysis of Legislators and Committees based on bills in the 18th and 19th National Assembly, Korea

Ji-yeon Lee, Hyun-joo Jo, and, Ji Won Yoon, The Journal of Digital Policy and Management, 2014

link


Incremental -nearest neighbor classifier for detection of outlier signature in mobile POS

Young-Mok Ha, Ji Won Yoon and Young An Kim, Journal of Security Engineering, 2014

link

The danger and vulnerability of eavesdropping by using loud-speakers

Seung Joon Lee, Young-Mok Ha, Hyun Ju Jo, and Ji Won Yoon, Journal of The Korea Institute of Information Security & Cryptology, Vol. 23, No.6, Dec. 2013


The Sub Authentication Method For Driver Using Driving Patterns

J.M. Jeong, H.C. Kang, H. J. Jo, Ji Won Yoon and D.H. Lee, Journal of The Korea Institute of Information Security & Cryptology, 2013


A statistical selection of Acceptance Time Window (ATW) to assure the freshness of a protocol run

Eun Ho Shin, H. S. Kim and Ji Won Yoon, Journal of Security Engineering, 2013

link

Published Korean Conferences (Since 2013)

S. Park, H. J. Ju, and Ji Won Yoon, "Smartwatch 내의 통신 취약점을 이용한 Exploit", 한국정보보호학회 동계학술대회 2016 [accepted for oral presentation]

Kyuseok Han and Ji Won Yoon, "네트워크 고립 공격 기법에 대한 연구", 한국 정보보호학회 동계학술대회 2016 [accepted for oral presentation]

Youngbae Jeon, and Ji Won Yoon, "사이버 공격의 임무 프로세스에 대한 피해 정량화에 관한 연구", 한국 정보보호학회 동계학술대회 2016 [accepted for oral presentation]

Saeh-Byul Lee and Ji Won Yoon, "동형암호 기반 다자간 계산의 발전 방향", 한국정보보호학회 하계학술대회, 2016

Jae Sun Sim and Ji Won Yoon, "완전동형암호 설계의 연구동향, " 한국정보보호학회 하계학술대회, 2016

Young-Bae Jeon and Ji Won Yoon, "하이브리드 모바일 애플리케이션 개발 프레임워크 기반 안드로이드 앱 보안 취약점 분석", 한국정보보호학회 하계학술대회, 2016

Sun-Hong Whang and Ji Won Yoon, "OSINT 기반의 전략물자 공급사슬(Supply Chain) 행위자 분석 시스템 개발을 위한 가능성 분석, ", 한국정보보호학회 하계학술대회, 2016

Chang Whan Ji and Ji Won Yoon, "패스워드 무차별 대입 공격을 무력화 하기 위한 확률기반 대응 기술 동향 및 발전방안 연구, ", 한국정보보호학회 하계학술대회, 2016

S. H. Choi and Ji Won Yoon, "RF (Radio Frequency)통신 환경에서의 신호 재전송 공격(Replay Attack) 방지방안", 한국정보보호학회 영남지부 학술대회, 2016

J. H. Shin and Ji Won Yoon, "HTTP 플로우 정보를 활용한 비정상 웹 트래픽 탐지기법", 한국정보보호학회 영남지부 학술대회, 2016

Ik-Whan Kim and Ji Won Yoon, "화면보호기 기능을 이용한 망분리 우회 기술", 한국정보보호학회, 동계학술대회, 2015

Eun Young Lee and Ji Won Yoon, "위변조된 음성 신호 탐지를 위한 스펙트럼 분석 기술", 한국정보보호학회, 동계학술대회, 2015 (우수논문상)

Sung Hoon Kim and Ji Won Yoon, "Open Source Intelligence 기반의 범죄 억제 및 예측 시스템 설계를 위한 START 프로그램 분석", 한국정보보호학회, 동계학술대회, 2015

Ji Soo Jeong and Ji Won Yoon, "웹문서 유사도 분석을 통한 사이버 범죄 탐지 연구", 한국정보보호학회, 하계학술대회, 2015

Sung Hoon Kim and Ji Won Yoon, "Open-Source Intelligence에 기반한 사이버 선거사범 추적 기술", 한국정보보호학회, 하계학술대회, 2015

H. * Kang, S. *. Park, S. *. Shin, H. *. Lee, J. W. Yoon, "무선입력장치 보안 취약성 확인 및 대응 방안", 한국통신학회, 2015 동계학술대회, [link]

S. J. Kang, and J. W. Yoon, "안드로이드 모바일 악성 앱 탐지를 위한 확률적 k-근접 이웃 분류기", 정보보호학회 2014 동계학술대회 (우수논문상)

M. K. Park, and J. W. Yoon, "GPU의 스레드와 공유메모리를 이용한 LEA 최적화", 정보보호학회, 2014, 동계학술대회 (최우수논문상- 행정안전부 장관상)

B. W. Han, M. K. Park, K. W. Kim, and J. W. Yoon, "연결 중심성(degree centrality)을 이용한 허브 라우터 탐지방법", 정보보호학회 2014, 동계학술대회

K. W. Kim and J. W. Yoon, "거시적인 관점에서 바라본 시스템의 위협 측정", 정보보호학회, 2014, 동계학술대회

M. K. Park, J. E. Park, and J. W. Yoon, "CUDA 병렬 프로그래밍 튜토리얼 및 보안에서의 GPU 활용", 정보보호학회 2014 하계학술대회

S. H. Jang, H. L. Lee, and J. W. Yoon, "Neural Network를 이용한 안드로이드 악성 어플리케이션 분류 및 탐지기법에 관한 연구", 정보보호학회 2013 동계학술대회 (우수논문상)

H.L. LEE, Y. J. Keum, H. J. Kang, J. W. Yoon, H. K. Kim, "계단 형태와 투시원근법을 이용한 이미지 위변조 탐지 기법", 정보보호학회 2013 하계학술대회

H. K. Kim, J. W. Yoon, "빅데이타 분석 기술 및 공공 치안 분야 사례 연구", 정보보호학회 2013 하계학술대회

J. W. Yoon, "Robust long term prediction of GPS signals with Bayesian anomaly detection", 국방과학연구소 통신전자학술대회, 2012