팔로우
Jiyong Jang
Jiyong Jang
Research Scientist, IBM Research
us.ibm.com의 이메일 확인됨 - 홈페이지
제목
인용
인용
연도
Protecting intellectual property of deep neural networks with watermarking
J Zhang, Z Gu, J Jang, H Wu, MP Stoecklin, H Huang, I Molloy
Proceedings of the 2018 on Asia conference on computer and communications …, 2018
5042018
Bitshred: feature hashing malware for scalable triage and semantic analysis
J Jang, D Brumley, S Venkataraman
Proceedings of the 18th ACM conference on Computer and communications …, 2011
3832011
ReDeBug: finding unpatched code clones in entire os distributions
J Jang, A Agrawal, D Brumley
2012 IEEE Symposium on Security and Privacy, 48-62, 2012
2742012
ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions
J Jang, M Woo, D Brumley
USENIX ;login:, 2012
2742012
The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics
BJ Kwon, J Mondal, J Jang, L Bilge, T Dumitras
ACM Conference on Computer and Communications Security, 2015
1672015
SplitScreen: Enabling efficient, distributed malware detection
SK Cha, I Moraru, J Jang, J Truelove, D Brumley, DG Andersen
Journal of Communications and Networks 13 (2), 187-200, 2011
1242011
SplitScreen: Enabling Efficient, Distributed Malware Detection
SK Cha, I Moraru, J Jang, J Truelove, D Brumley, DG Andersen
USENIX Symposium on Networked Systems Design and Implementation, 2010
1242010
Towards automatic software lineage inference
J Jang, M Woo, D Brumley
22nd USENIX Security Symposium (USENIX Security 13), 81-96, 2013
1162013
Android malware clustering through malicious payload mining
Y Li, J Jang, X Hu, X Ou
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
1002017
Experimental Study of Fuzzy Hashing in Malware Clustering Analysis
Y Li, SC Sundaramurthy, AG Bardas, X Ou, D Caragea, X Hu, J Jang
Workshop on Cyber Security Experimentation and Test, 2015
952015
Threat intelligence computing
X Shu, F Araujo, DL Schales, MP Stoecklin, J Jang, H Huang, JR Rao
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
702018
A time-based key management protocol for wireless sensor networks
J Jang, T Kwon, J Song
International conference on information security practice and experience …, 2007
702007
A Time-based Key Management Protocol for Wireless Sensor Networks
J Jang
Yonsei University, 2007
702007
Deeplocker–concealing targeted attacks with ai locksmithing
D Kirat, J Jang, M Stoecklin
Blackhat USA 1, 1-29, 2018
562018
Detecting web exploit kits by tree-based structural similarity search
X Hu, J Jang, F Monrose, MP Stoecklin, T Taylor, T Wang
US Patent 9,723,016, 2017
512017
Detecting malicious exploit kits using tree-based similarity searches
T Taylor, X Hu, T Wang, J Jang, MP Stoecklin, F Monrose, R Sailer
proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
442016
BAYWATCH: robust beaconing detection to identify infected hosts in large-scale enterprise networks
X Hu, J Jang, MP Stoecklin, T Wang, DL Schales, D Kirat, JR Rao
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
372016
Bitshred: Fast, scalable code reuse detection in binary code
J Jang, D Brumley, S Venkataraman
CMU-CyLab-10-006 16, 2009
372009
Consolidating structured and unstructured security and threat intelligence with knowledge graphs
Y Park, J Jang, DH Kirat, JR Rao, MP Stoecklin
US Patent App. 15/368,845, 2018
342018
Cognitive offense analysis using contextual data and knowledge graphs
WA Bird, SC Deffeyes, J Jang, D Kirat, Y Park, JR Rao, MP Stoecklin
US Patent 10,542,015, 2020
322020
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20