Следене
Hayoon Yi
Hayoon Yi
Samsung Research
Потвърден имейл адрес: samsung.com
Заглавие
Позовавания
Позовавания
Година
LSTM-based system-call language modeling and robust ensemble method for designing host-based intrusion detection systems
G Kim, H Yi, J Lee, Y Paek, S Yoon
arXiv preprint arXiv:1611.01726, 2016
1302016
Mantis: Automatic performance prediction for smartphone applications
Y Kwon, S Lee, H Yi, D Kwon, S Yang, BG Chun, L Huang, P Maniatis, ...
2013 USENIX Annual Technical Conference (USENIX ATC 13), 297-308, 2013
892013
Techniques to minimize state transfer costs for dynamic execution offloading in mobile cloud computing
S Yang, D Kwon, H Yi, Y Cho, Y Kwon, Y Paek
IEEE Transactions on Mobile Computing 13 (11), 2648-2660, 2014
752014
Fast dynamic execution offloading for efficient mobile cloud computing
S Yang, Y Kwon, Y Cho, H Yi, D Kwon, J Youn, Y Paek
2013 IEEE International conference on Pervasive computing and communications …, 2013
552013
Precise execution offloading for applications with dynamic behavior in mobile cloud computing
Y Kwon, H Yi, D Kwon, S Yang, Y Cho, Y Paek
Pervasive and Mobile Computing 27, 58-74, 2016
312016
Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM.
Y Cho, D Kwon, H Yi, Y Paek
NDSS, 2017
222017
Mantis: Efficient predictions of execution time, energy usage, memory usage and network usage on smart mobile devices
Y Kwon, S Lee, H Yi, D Kwon, S Yang, B Chun, L Huang, P Maniatis, ...
IEEE Transactions on Mobile Computing 14 (10), 2059-2072, 2014
192014
LSTM-based system-call language modeling and robust ensemble method for designing host-based intrusion detection systems. arXiv 2016
G Kim, H Yi, J Lee, Y Paek, S Yoon
arXiv preprint arXiv:1611.01726, 2016
152016
Hawkware: network intrusion detection based on behavior analysis with ANNs on an IoT device
S Ahn, H Yi, Y Lee, WR Ha, G Kim, Y Paek
2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020
102020
Safe and efficient implementation of a security system on ARM using intra-level privilege separation
D Kwon, H Yi, Y Cho, Y Paek
ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-30, 2019
92019
Mimicry resilient program behavior modeling with LSTM based branch models
H Yi, G Kim, J Lee, S Ahn, Y Lee, S Yoon, Y Paek
arXiv preprint arXiv:1803.09171, 2018
82018
DADE: a fast data anomaly detection engine for kernel integrity monitoring
H Yi, Y Cho, Y Paek, K Ko
The Journal of Supercomputing 75, 4575-4600, 2019
42019
Data Embedding Scheme for Efficient Program Behavior Modeling With Neural Networks
S Ahn, H Yi, H Bae, S Yoon, Y Paek
IEEE Transactions on Emerging Topics in Computational Intelligence 6 (4 …, 2022
12022
Real-time anomalous branch behavior inference with a GPU-inspired engine for machine learning models
H Oh, H Yi, H Choe, Y Cho, S Yoon, Y Paek
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 908-913, 2019
12019
LSTM-based system-call language modeling and ensemble method for host-based intrusion detection
G Kim, H Yi, J Lee, Y Paek, S Yoon
12016
Exploration of machine learning techniques for anomaly detection in computer security
이하윤
서울대학교 대학원, 2019
2019
Poster: Fast Object Identification for Kernel Data Anomaly Detection
H Yi, Y Cho, D Kwon, Y Paek
2017
A Design and study on automatic extraction of kernel data structure to improve performance of rootkit detection tool, Gibraltar.
W Choi, H Yi, Y Cho, Y Paek
Proceedings of the Korea Information Processing Society Conference, 384-387, 2015
2015
A Meta-data Generation and Compression Technique for Code Reuse Attack Detection
D Hwang, I Heo, J Lee, H Yi, Y Paek
Proceedings of the Korea Information Processing Society Conference, 424-427, 2015
2015
The potential of mobile execution offloading for enhanced device security
H Yi, Y Cho, D Kwon, Y Paek
Proceedings of the Korea Information Processing Society Conference, 240-242, 2014
2014
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20