Euijin Choo
Cited by
Cited by
Generic unpacking using entropy analysis
G Jeong, E Choo, J Lee, M Bat-Erdene, H Lee
2010 5th International Conference on Malicious and Unwanted Software, 98-105, 2010
Detecting opinion spammer groups through community discovery and sentiment analysis
E Choo, T Yu, M Chi
IFIP annual conference on data and applications security and privacy, 170-187, 2015
SRMT: A lightweight encryption scheme for secure real-time multimedia transmission
E Choo, J Lee, H Lee, G Nam
2007 International Conference on Multimedia and Ubiquitous Engineering (MUE…, 2007
Revealing and incorporating implicit communities to improve recommender systems
E Choo, T Yu, M Chi, Y Sun
Proceedings of the fifteenth ACM conference on Economics and computation…, 2014
Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis
E Choo, T Yu, M Chi
Journal of Computer Security 25 (3), 283-318, 2017
Method for encrypting and decrypting an image frame
HJ Lee, EJ Choo, JH Lee, GW Nam
US Patent App. 11/905,240, 2008
Munkhbayar Bat-Erdene, and Heejo Lee.“
G Jeong, E Choo, J Lee
Generic unpacking using entropy analysis.” In: MALWARE., 2010
Identifying malicious metering data in advanced metering infrastructure
E Choo, Y Park, H Siyamwala
2014 IEEE 8th International Symposium on Service Oriented System Engineering…, 2014
Analyzing opinion spammers’ network behavior in online review systems
E Choo
2018 IEEE Fourth International Conference on Big Data Computing Service and…, 2018
Time-window based group-behavior supported method for accurate detection of anomalous users
LP Yuan, E Choo, T Yu, I Khalil, S Zhu
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems…, 2021
Graphic model analysis of frauds in online consumer reviews
C Song, K Goswami, Y Park, SY Chang, E Choo
Proceedings of the Second International Conference on Internet of things…, 2017
COMPARS: toward an empirical approach for comparing the resilience of reputation systems
E Choo, J Jiang, T Yu
Proceedings of the 4th ACM conference on Data and application security and…, 2014
Dynamic multimedia scheduling against Motion based DoS attacks
E Choo, H Lee, WY Lee
2009 International Conference on Information Networking, 1-5, 2009
Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users
LP Yuan, E Choo, T Yu, I Khalil, S Zhu
arXiv preprint arXiv:2012.13971, 2020
Method and system for domain maliciousness assessment via real-time graph inference
M Nabeel, IM Khalil, T Yu, EJ Choo
US Patent App. 16/426,477, 2020
DeviceWatch: Identifying Compromised Mobile Devices through Network Traffic Analysis and Graph Inference
E Choo, M Nabeel, M Alsabah, I Khalil, T Yu, W Wang
arXiv preprint arXiv:1911.12080, 2019
Information Assurance in Electronic Commerce Market
E Choo
North Carolina State University, 2015
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)| 978-1-6654-3572-7/21/$31.00 2021 IEEE| DOI: 10.1109/DSN48987. 2021.00066
A Abuadbba, M Ahamad, A Ahmed, B Ahmed, ME Ahmed, H Alemzadeh, ...
Workshop Organizers
Y Park, H Hu, SY Chang, S Choi, T Austin, J Hur, AA Yavuz, H Kim, H Li, ...
Poster: Who spams whom? Detecting Opinion Spammer Groups and Their Spam Targets
E Choo
The system can't perform the operation now. Try again later.
Articles 1–20