E-mail Google Scholar Curriculum Vitae GitHub HCR Lab. Yongsan-gu, Seoul
H Lee, JD Yoo, S Jeong, HK Kim, Detecting Domain Names Generated by DGAs with Low False Positives in Chinese Domain Names, IEEE Access, Sep 2024, doi: 10.1109/ACCESS.2024.3454242.
S Jeong, HK Kim, ML Han, BI Kwak, AERO: Automotive Ethernet Real-Time Observer for Anomaly Detection in In-Vehicle Networks, IEEE Transactions on Industrial Informatics, Vol. 20, No. 3, pp. 4651–4662, Mar 2024, doi: 10.1109/TII.2023.3324949.
S Jeong, S Lee, H Lee, HK Kim, X-CANIDS: Signal-Aware Explainable Intrusion Detection System for Controller Area Network-Based In-Vehicle Network, IEEE Transactions on Vehicular Technology, Vol. 73, No. 3, pp. 3230–3246, Mar 2024, doi: 10.1109/TVT.2023.3327275.
Y Noh, S Jeong, HK Kim, Trading Behind-the-Scene: Analysis of Online Gold Farming Network in Auction House System, IEEE Transactions on Games, vol. 14, no. 3, pp. 423–434, Sep 2022, doi: 10.1109/TG.2021.3094054.
S Jeong, B Jeon, B Chung, HK Kim, Convolutional Neural Network-based Intrusion Detection System for AVTP Streams in Automotive Ethernet-based Networks, Vehicular Communications, vol. 29, no. 100338, pp.1–11, Jun 2021, doi: 10.1016/j.vehcom.2021.100338
K Kim, JS Kim, S Jeong, JH Park, HK Kim, Cybersecurity for Autonomous Vehicles: Review of Attacks and Defense, Computers & Security, vol. 103, no. 102150, pp. 1–27, Apr 2021, doi: 10.1016/j.cose.2020.102150
AR Kang, SH Jeong, A Mohaisen, HK Kim, Multimodal Game Bot Detection using User Behavioral Characteristics, SpringerPlus, vol. 5, no. 523, pp. 1–19, Apr 2016, doi: 10.1186/s40064-016-2122-8
SH Jeong, AR Kang, HK Kim, Analysis of Game Bot’s Behavioral Characteristics in Social Interaction Networks of MMORPG, ACM SIGCOMM Computer Communication Review, vol. 45, no. 4, pp.99–100, Oct 2015, doi: 10.1145/2829988.2790005, Poster (PDF)
S Jeong, M Ryu, H Kang, HK Kim, Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade Linux, in ACM Conference on Data and Application Security and Privacy (ACM CODASPY 2023), pp. 201–212, Apr 2023, doi: 10.1145/3577923.3583650, The Best Paper
S Jeong, E Park, KU Seo, JD Yoo, HK Kim, MUVIDS: False MAVLink Injection Attack Detection in Communication for Unmanned Vehicles, in International Workshop on Automotive and Autonomous Vehicle Security (AutoSec 2021 Workshop), pp. 1–6, Feb 2022, doi: 10.14722/autosec.2021.23036
TU Kang, HM Song, S Jeong, HK Kim, Automated Reverse Engineering and Attack for CAN using OBD-II, in IEEE Vehicular Technology Conference (VTC-Fall 2018), pp. 1–8, Aug 2018, doi: 10.1109/VTCFall.2018.8690781
H Lee, SH Jeong, HK Kim, OTIDS: A Novel Intrusion Detection System for In-vehicle Network by using Remote Frame, in Conference on Privacy, Security and Trust (PST 2017), pp. 57–66, Aug 2017, doi: 10.1109/PST.2017.00017
AR Kang, SH Jeong, SY Ko, K Ren, A Mohaisen, Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service, in IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb 2016 Workshop), pp. 54–59, Oct 2016, doi: 10.1109/HotWeb.2016.18
SH Jeong, AR Kang, J Kim, HK Kim, A Mohaisen, A Longitudinal Analysis of. i2p Leakage in the Public DNS Infrastructure, in ACM SIGCOMM (SIGCOMM 2016), pp. 557–558, Aug 2016, doi: 10.1145/2934872.2960423, Poster (PDF)
SH Jeong, HK Kim, J Woo, The Big Data Analysis Framework of Information Security Policy based on Security Incidents, in Journal of the Korea Society of Computer and Information vol. 22, no. 10, pp. 73–81, Oct 2017, doi: 10.9708/jksci.2017.22.10.073
SH Jeong, H Kim, S Shin, T Lee, HK Kim, A Survey of Fraud Detection Research based on Transaction Analysis and Data Mining Technique, in Journal of The Korea Institute of Information Security & Cryptology, vol. 25, no. 6, pp. 1525–1540, Dec 2015, doi: 10.13089/JKIISC.2015.25.6.1525
S Jeong, Toward Understanding Network Intrusion on Vehicles: An eXplainable IDS Analyzing Signals and Time-series Periodicity, in Conference on Information Security and Cryptography-Winter 2023 (CISC-W’23), pp. 376–379, Dec. 2023, Outstanding Paper Award (정보보호학회장상-우수논문상)