Follow
Euijin Choo
Title
Cited by
Cited by
Year
Generic unpacking using entropy analysis
G Jeong, E Choo, J Lee, M Bat-Erdene, H Lee
2010 5th International Conference on Malicious and Unwanted Software, 98-105, 2010
772010
Detecting opinion spammer groups through community discovery and sentiment analysis
E Choo, T Yu, M Chi
Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 …, 2015
722015
SRMT: A lightweight encryption scheme for secure real-time multimedia transmission
E Choo, J Lee, H Lee, G Nam
2007 International Conference on Multimedia and Ubiquitous Engineering (MUE …, 2007
432007
Revealing and incorporating implicit communities to improve recommender systems
E Choo, T Yu, M Chi, Y Sun
Proceedings of the fifteenth ACM conference on Economics and computation …, 2014
162014
Method for encrypting and decrypting an image frame
HJ Lee, EJ Choo, JH Lee, GW Nam
US Patent App. 11/905,240, 2008
162008
Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis
E Choo, T Yu, M Chi
Journal of Computer Security 25 (3), 283-318, 2017
112017
Identifying malicious metering data in advanced metering infrastructure
E Choo, Y Park, H Siyamwala
2014 IEEE 8th International Symposium on Service Oriented System Engineering …, 2014
82014
Siraj: A unified framework for aggregation of malicious entity detectors
S Thirumuruganathan, M Nabeel, E Choo, I Khalil, T Yu
2022 IEEE Symposium on Security and Privacy (SP), 507-521, 2022
72022
Time-window based group-behavior supported method for accurate detection of anomalous users
LP Yuan, E Choo, T Yu, I Khalil, S Zhu
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
62021
Munkhbayar Bat-Erdene, and Heejo Lee.“
G Jeong, E Choo, J Lee
Generic unpacking using entropy analysis.” In: MALWARE., 2010
52010
A large scale study and classification of virustotal reports on phishing and malware urls
E Choo, M Nabeel, D Kim, R De Silva, T Yu, I Khalil
Proceedings of the ACM on Measurement and Analysis of Computing Systems 7 (3 …, 2023
32023
DeviceWatch: a data-driven network analysis approach to identifying compromised mobile devices with graph-inference
E Choo, M Nabeel, M Alsabah, I Khalil, T Yu, W Wang
ACM Transactions on Privacy and Security 26 (1), 1-32, 2022
32022
Content-agnostic detection of phishing domains using certificate transparency and passive dns
M AlSabah, M Nabeel, Y Boshmaf, E Choo
Proceedings of the 25th International Symposium on Research in Attacks …, 2022
22022
Method and system for domain maliciousness assessment via real-time graph inference
M Nabeel, IM Khalil, T Yu, E Choo
US Patent 11,206,275, 2021
22021
Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users
LP Yuan, E Choo, T Yu, I Khalil, S Zhu
arXiv preprint arXiv:2012.13971, 2020
22020
Analyzing opinion spammers’ network behavior in online review systems
E Choo
2018 IEEE Fourth International Conference on Big Data Computing Service and …, 2018
22018
Graphic model analysis of frauds in online consumer reviews
C Song, K Goswami, Y Park, SY Chang, E Choo
Proceedings of the Second International Conference on Internet of things …, 2017
22017
COMPARS: toward an empirical approach for comparing the resilience of reputation systems
E Choo, J Jiang, T Yu
Proceedings of the 4th ACM conference on Data and application security and …, 2014
22014
Anomalous user account detection systems and methods
IM Khalil, T Yu, EJ Choo, LP Yuan, S Zhu
US Patent App. 17/685,687, 2022
12022
Compromised mobile device detection system and method
M Al Sabah, M Nabeel, E Choo, IM Khalil, T Yu, W Wang
US Patent App. 17/495,391, 2022
12022
The system can't perform the operation now. Try again later.
Articles 1–20