Follow
Yoon-Chan Jhi
Yoon-Chan Jhi
Director of Software Security in Technology Research at Samsung SDS, Seoul, Korea
Verified email at samsung.com
Title
Cited by
Cited by
Year
Proactive worm containment (PWC) for enterprise networks
P Liu, YC Jhi, L Li
US Patent 8,904,535, 2014
2872014
Behavior based software theft detection
X Wang, YC Jhi, S Zhu, P Liu
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1442009
Detecting software theft via system call based birthmarks
X Wang, YC Jhi, S Zhu, P Liu
2009 Annual Computer Security Applications Conference, 149-158, 2009
1322009
Value-based program characterization and its application to software plagiarism detection
YC Jhi, X Wang, X Jia, S Zhu, P Liu, D Wu
Proceedings of the 33rd international conference on software engineering …, 2011
1222011
Still: Exploit code detection via static taint and initialization analyses
X Wang, YC Jhi, S Zhu, P Liu
2008 Annual Computer Security Applications Conference (ACSAC), 289-298, 2008
982008
IMPACT: Impersonation attack detection via edge computing using deep autoencoder and feature abstraction
SJ Lee, PD Yoo, AT Asyhari, Y Jhi, L Chermak, CY Yeun, K Taha
IEEE Access 8, 65520-65529, 2020
952020
A first step towards algorithm plagiarism detection
F Zhang, YC Jhi, D Wu, P Liu, S Zhu
Proceedings of the 2012 International Symposium on Software Testing and …, 2012
802012
Program characterization using runtime values and its application to software plagiarism detection
YC Jhi, X Jia, X Wang, S Zhu, P Liu, D Wu
IEEE Transactions on Software Engineering 41 (9), 925-943, 2015
502015
DEMISe: Interpretable deep extraction and mutual information selection techniques for IoT intrusion detection
LR Parker, PD Yoo, TA Asyhari, L Chermak, Y Jhi, K Taha
Proceedings of the 14th international conference on availability …, 2019
362019
Cross-layer damage assessment for cyber situational awareness
P Liu, X Jia, S Zhang, X Xiong, YC Jhi, K Bai, J Li
Cyber Situational Awareness: Issues and Research, 155-176, 2010
212010
SAS: semantics aware signature generation for polymorphic worm detection
D Kong, YC Jhi, T Gong, S Zhu, P Liu, H Xi
International Journal of Information Security 10, 269-283, 2011
152011
PWC: A proactive worm containment solution for enterprise networks
YC Jhi, P Liu, L Li, Q Gu, J Jing, G Kesidis
Security and Communication Networks 3 (4), 334-354, 2010
122010
Evaluation of Collaborative Worm Containments on DETER Testbed.
L Li, P Liu, Y Jhi, G Kesidis
DETER, 2007
122007
Sas: Semantics aware signature generation for polymorphic worm detection
D Kong, YC Jhi, T Gong, S Zhu, P Liu, H Xi
Security and Privacy in Communication Networks: 6th Iternational ICST …, 2010
102010
Protecting web services from remote exploit code: a static analysis approach
X Wang, YC Jhi, S Zhu, P Liu
Proceedings of the 17th international conference on World Wide Web, 1139-1140, 2008
92008
Method and apparatus for detecting nop sled
YC Jhi, YJ Kum, JH Kim, IS Jeong
US Patent App. 15/933,522, 2018
42018
Apparatus and method for detecting malicious code
YC Jhi, S Hwang
US Patent App. 15/333,849, 2017
42017
Method for secure network communication and system thereof
KY Choi, CHO Beumjin, JHI Yoonchan, Y Hyojin, J Cho, K Park, ...
US Patent App. 18/387,523, 2024
2024
Method, apparatus, system and computer program for workload deployment in cloud system including function accelerator card
CHO Beumjin, HAM Namsik, JHI Yoonchan, J Cho
US Patent App. 18/370,037, 2024
2024
Code inspection interface providing method and apparatus for implementing the method
HS Moon, HC Park, YC Jhi, JH Lee
US Patent App. 17/853,821, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20