Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text H Jo, Y Lee, S Shin Computers & Security 120, 102763, 2022 | 20 | 2022 |
DarkBERT: A language model for the dark side of the Internet Y Jin, E Jang, J Cui, JW Chung, Y Lee, S Shin ACL 2023; https://aclanthology.org/2023.acl-long.415/, 2023 | 13 | 2023 |
Toward Semantic Assessment of Vulnerability Severity: A Text Mining Approach. Y Lee, S Shin First International Workshop on EntitY REtrieval (EYRE 2018, CIKM Workshops), 2018 | 10 | 2018 |
Shedding new light on the language of the dark web Y Jin, E Jang, Y Lee, S Shin, JW Chung NAACL 2022; https://aclanthology.org/2022.naacl-main.412/, 2022 | 9 | 2022 |
Duo: software defined intrusion tolerant system using dual cluster Y Lee, S Lee, H Seo, C Yoon, S Shin, H Yoon Security and Communication Networks 2018, 1-13, 2018 | 5 | 2018 |
DRAINCLoG: Detecting Rogue Accounts with Illegally-obtained NFTs using Classifiers Learned on Graphs H Kim, J Cui, E Jang, C Lee, Y Lee, JW Chung, S Shin NDSS 2024; https://www.ndss-symposium.org/ndss-paper/drainclog-detecting …, 2023 | 4 | 2023 |
Rule-based approach for context inconsistency management scheme in ubiquitous computing Y Lee, J Lim, SJ Hyun, D Lee 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010 | 3 | 2010 |
Hypert: hypernymy-aware BERT with Hearst pattern exploitation for hypernym discovery G Yun, Y Lee, AS Moon, J Lee Journal of Big Data 10 (1), 141, 2023 | 1 | 2023 |
Ignore Me But Don't Replace Me: Utilizing Non-Linguistic Elements for Pretraining on the Cybersecurity Domain E Jang, J Cui, D Yim, Y Jin, JW Chung, S Shin, Y Lee NAACL 2024 Findings, arXiv preprint arXiv:2403.10576, 2024 | | 2024 |
Analyzing the Language Usage Characteristics of Korean Dark Web Users Y Lee, D Yim, Y Lee Annual Conference on Human and Language Technology, 397-402, 2022 | | 2022 |