Follow
Yeonjoon Lee
Yeonjoon Lee
Assistant Professor of College of Computing, Hanyang University
Verified email at hanyang.ac.kr - Homepage
Title
Cited by
Cited by
Year
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th USENIX Security Symposium (USENIX Security 15), 2015
2912015
The peril of fragmentation: Security hazards in android device driver customizations
X Zhou, Y Lee, N Zhang, M Naveed, XF Wang
2014 IEEE Symposium on Security and Privacy, 409-423, 2014
1822014
Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios
K Chen, X Wang, Y Chen, P Wang, Y Lee, XF Wang, B Ma, A Wang, ...
2016 IEEE Symposium on Security and Privacy (SP), 357-376, 2016
1412016
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps
S Demetriou, N Zhang, Y Lee, XF Wang, CA Gunter, X Zhou, M Grace
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
88*2017
Mayhem in the push clouds: Understanding and mitigating security hazards in mobile push-messaging services
T Li, X Zhou, L Xing, Y Lee, M Naveed, XF Wang, X Han
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
612014
Using sonar for liveness detection to protect smart speakers against remote attackers
Y Lee, Y Zhao, J Zeng, K Lee, N Zhang, FH Shezan, Y Tian, K Chen, ...
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020
402020
Mass discovery of android traffic imprints through instantiated partial execution
Y Chen, W You, Y Lee, K Chen, XF Wang, W Zou
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
312017
Understanding {iOS-based} Crowdturfing Through Hidden {UI} Analysis
Y Lee, X Wang, K Lee, X Liao, XF Wang, T Li, X Mi
28th USENIX Security Symposium (USENIX Security 19), 765-781, 2019
162019
Ghost installer in the shadow: Security analysis of app installation on android
Y Lee, T Li, N Zhang, S Demetriou, M Zha, XF Wang, K Chen, X Zhou, ...
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
102017
A Survey on Satellite Communication System Security
M Kang, S Park, Y Lee
Sensors 24 (9), 2897, 2024
82024
Image-based artificial intelligence technology for diagnosing middle ear diseases: a systematic review
D Song, T Kim, Y Lee, J Kim
Journal of Clinical Medicine 12 (18), 5831, 2023
82023
What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources
S Demetriou, X Zhou, M Naveed, Y Lee, X Yuan, W Kan, C Gunter
NDSS, 2015
82015
Understanding illicit UI in iOS apps through hidden UI analysis
Y Lee, X Wang, X Liao, XF Wang
IEEE Transactions on Dependable and Secure Computing 18 (5), 2390-2402, 2019
52019
Aliasing Backdoor Attacks on Pre-trained Models
C Wei, Y Lee, K Chen, G Meng, P Lv
32nd USENIX Security Symposium (USENIX Security 23), 2707-2724, 2023
42023
Echo-guard: Acoustic-based anomaly detection system for smart manufacturing environments
CB Seo, G Lee, Y Lee, SH Seo
International Conference on Information Security Applications, 64-75, 2021
42021
Development of ResNet152 UNet++-based segmentation algorithm for the tympanic membrane and affected areas
T Kim, K Oh, J Kim, Y Lee, J Choi
IEEE Access 11, 56225-56234, 2023
32023
Toward better ear disease diagnosis: A multi-modal multi-fusion model using endoscopic images of the tympanic membrane and pure-tone audiometry
T Kim, S Kim, J Kim, Y Lee, J Choi
IEEE Access, 2023
22023
Semantic Decomposition and Anomaly Detection of Tympanic Membrane Endoscopic Images
D Song, IS Song, J Kim, J Choi, Y Lee
Applied Sciences 12 (22), 11677, 2022
22022
Automatic Diagnosis of Chronic Otitis Media with a Dual Neural Network Using Pure-Tone Audiometry and Tympanic Membrane Images
T Kim, S Kim, J Kim, Y Lee, J Choi
Available at SSRN 4390612, 0
1
Exclusively in-store: Acoustic location authentication for stationary business devices
S Park, C Seo, X Wang, Y Lee, SH Seo
Journal of Network and Computer Applications 232, 104028, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20