Euijin Choo
Title
Cited by
Cited by
Year
Generic unpacking using entropy analysis
G Jeong, E Choo, J Lee, M Bat-Erdene, H Lee
2010 5th International Conference on Malicious and Unwanted Software, 98-105, 2010
622010
Detecting opinion spammer groups through community discovery and sentiment analysis
E Choo, T Yu, M Chi
IFIP annual conference on data and applications security and privacy, 170-187, 2015
452015
SRMT: A lightweight encryption scheme for secure real-time multimedia transmission
E Choo, J Lee, H Lee, G Nam
2007 International Conference on Multimedia and Ubiquitous Engineering (MUE …, 2007
372007
Revealing and incorporating implicit communities to improve recommender systems
E Choo, T Yu, M Chi, Y Sun
Proceedings of the fifteenth ACM conference on Economics and computation …, 2014
122014
Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis
E Choo, T Yu, M Chi
Journal of Computer Security 25 (3), 283-318, 2017
102017
Method for encrypting and decrypting an image frame
HJ Lee, EJ Choo, JH Lee, GW Nam
US Patent App. 11/905,240, 2008
102008
Munkhbayar Bat-Erdene, and Heejo Lee.“
G Jeong, E Choo, J Lee
Generic unpacking using entropy analysis.” In: MALWARE., 2010
52010
Identifying malicious metering data in advanced metering infrastructure
E Choo, Y Park, H Siyamwala
2014 IEEE 8th International Symposium on Service Oriented System Engineering …, 2014
42014
Analyzing opinion spammers’ network behavior in online review systems
E Choo
2018 IEEE Fourth International Conference on Big Data Computing Service and …, 2018
22018
Graphic model analysis of frauds in online consumer reviews
C Song, K Goswami, Y Park, SY Chang, E Choo
Proceedings of the Second International Conference on Internet of things …, 2017
12017
COMPARS: toward an empirical approach for comparing the resilience of reputation systems
E Choo, J Jiang, T Yu
Proceedings of the 4th ACM conference on Data and application security and …, 2014
12014
Dynamic multimedia scheduling against Motion based DoS attacks
E Choo, H Lee, WY Lee
2009 International Conference on Information Networking, 1-5, 2009
12009
Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users
LP Yuan, E Choo, T Yu, I Khalil, S Zhu
arXiv preprint arXiv:2012.13971, 2020
2020
Method and system for domain maliciousness assessment via real-time graph inference
M Nabeel, IM Khalil, T Yu, EJ Choo
US Patent App. 16/426,477, 2020
2020
DeviceWatch: Identifying Compromised Mobile Devices through Network Traffic Analysis and Graph Inference
E Choo, M Nabeel, M Alsabah, I Khalil, T Yu, W Wang
arXiv preprint arXiv:1911.12080, 2019
2019
Information Assurance in Electronic Commerce Market
E Choo
North Carolina State University, 2015
2015
Workshop Organizers
Y Park, H Hu, SY Chang, S Choi, T Austin, J Hur, AA Yavuz, H Kim, H Li, ...
Poster: Who spams whom? Detecting Opinion Spammer Groups and Their Spam Targets
E Choo
Revealing Implicit Communities to Incorporate into Recommender Systems
E Choo, T Yu, M Chi, YL Sun
Poster: Toward Understanding Spamming Behavior in Public Forums
E Choo, T Yu, M Chi
The system can't perform the operation now. Try again later.
Articles 1–20