Agent apparatus and method for sharing anonymous identifier-based security information among security management domains AN Gae-Il, SEO Dae-Hee, JH Kim, SH Lim, S Yi, KY Kim, DI Seo US Patent 8,789,200, 2014 | 118 | 2014 |
Apparatus for sharing security information among network domains and method thereof G An, S Yi, KY Kim, J Kim US Patent App. 13/182,972, 2012 | 107 | 2012 |
Network security control system and method, and security event processing apparatus and visualization processing apparatus for network security control S Yi, KY Kim, G An, J Kim US Patent App. 13/198,215, 2012 | 96 | 2012 |
Data hashing method, data processing method, and data processing system using similarity-based hashing algorithm HS Moon, S Yi, J Oh, JS Jang, C Kim US Patent 7,617,231, 2009 | 73 | 2009 |
A control theoretic approach for designing adaptive AQM schemes X Deng, S Yi, G Kesidis, CR Das GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003 | 61 | 2003 |
A control theoretic approach for designing adaptive AQM schemes X Deng, S Yi, G Kesidis, CR Das GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003 | 61 | 2003 |
Proxy‐RED: an AQM scheme for wireless local area networks S Yi, M Kappes, S Garg, X Deng, G Kesidis, CR Das Wireless Communications and Mobile Computing 8 (4), 421-434, 2008 | 57 | 2008 |
Stabilized virtual buffer (SVB)-an active queue management scheme for Internet quality-of-service X Deng, S Yi, G Kesidis, CR Das Global Telecommunications Conference, 2002. GLOBECOM'02. IEEE 2, 1628-1632, 2002 | 38 | 2002 |
Providing fairness in DiffServ architecture S Yi, X Deng, G Kesidis, CR Das Global Telecommunications Conference, 2002. GLOBECOM'02. IEEE 2, 1435-1439, 2002 | 31 | 2002 |
Memory-efficient content filtering hardware for high-speed intrusion detection systems S Yi, B Kim, J Oh, J Jang, G Kesidis, CR Das Proceedings of the 2007 ACM symposium on Applied computing, 264-269, 2007 | 22 | 2007 |
Method and apparatus for visualizing network security state S Yi US Patent 9,130,981, 2015 | 21 | 2015 |
A dynamic quarantine scheme for controlling unresponsive TCP sessions S Yi, X Deng, G Kesidis, CR Das Telecommunication Systems 37 (4), 169-189, 2008 | 16 | 2008 |
Multi-agent deep reinforcement learning using attentive graph neural architectures for real-time strategy games WJ Yun, S Yi, J Kim 2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2021 | 12 | 2021 |
PTL: PRAM translation layer GS Choi, BW On, K Choi, S Yi Microprocessors and Microsystems 37 (1), 24-32, 2013 | 12 | 2013 |
Method and apparatus for automatically generating signatures in network security systems S Yi, HS Moon, J Oh, JS Jang US Patent App. 11/774,699, 2008 | 12 | 2008 |
CuMARL: Curiosity-based learning in multiagent reinforcement learning DD Ningombam, B Yoo, HW Kim, HJ Song, S Yi IEEE Access 10, 87254-87265, 2022 | 8 | 2022 |
Method and apparatus for quantifying threat situations to recognize network threat in advance KY Kim, S Yi, SH Lim, J Kim, SEO Dae-Hee, LEE Byung-Gil US Patent App. 13/902,069, 2013 | 8 | 2013 |
QSOD: Hybrid policy gradient for deep multi-agent reinforcement learning HMRU Rehman, BW On, DD Ningombam, S Yi, GS Choi IEEE Access 9, 129728-129741, 2021 | 7 | 2021 |
A novel and efficient influence-seeking exploration in deep multiagent reinforcement learning B Yoo, DD Ningombam, S Yi, HW Kim, E Chung, R Han, HJ Song IEEE Access 10, 47741-47753, 2022 | 6 | 2022 |
Method and apparatus for detecting network attacks and generating attack signatures based on signature merging S Yi US Patent 10,225,269, 2019 | 5 | 2019 |