Search Results for author: Huy Kang Kim

Found 13 papers, 2 papers with code

Action2Score: An Embedding Approach To Score Player Action

no code implementations21 Jul 2022 Junho Jang, Ji Young Woo, Huy Kang Kim

In most MOBA games, a player's rank is determined by the match result (win or lose).

Unsupervised Driver Behavior Profiling leveraging Recurrent Neural Networks

no code implementations11 Aug 2021 Young Ah Choi, Kyung Ho Park, Eunji Park, Huy Kang Kim

As a result, our model yields high regression error given a sequence of aggressive driver behavior and low error given at a sequence of normal driver behavior.

Anomaly Detection

Convolutional Neural Network-based Intrusion Detection System for AVTP Streams in Automotive Ethernet-based Networks

2 code implementations6 Feb 2021 Seonghoon Jeong, Boosun Jeon, Boheung Chung, Huy Kang Kim

In this paper, we present an intrusion detection method for detecting audio-video transport protocol (AVTP) stream injection attacks in automotive Ethernet-based networks.

Autonomous Vehicles Intrusion Detection

Understand Watchdogs: Discover How Game Bot Get Discovered

no code implementations26 Nov 2020 Eunji Park, Kyung Ho Park, Huy Kang Kim

This provides us explanations about the game bots' behavior, and the truthfulness of the explanations has been evaluated.

Explainable Artificial Intelligence (XAI)

Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort

no code implementations1 Nov 2020 Kyung Ho Park, Eunji Park, Huy Kang Kim

As unsupervised learning does not require labeling, our model let the practitioner not to label every type of attack from the flight data.

Intrusion Detection

Automobile Theft Detection by Clustering Owner Driver Data

no code implementations19 Sep 2019 Yong Goo Kang, Kyung Ho Park, Huy Kang Kim

We cluster the key features of the owner driving data using the k-means algorithm.

Clustering

Andro-Simnet: Android Malware Family Classification Using Social Network Analysis

no code implementations22 Jun 2019 Hye Min Kim, Hyun Min Song, Jae Woo Seo, Huy Kang Kim

To maintain high classification accuracy, we propose a process to derive the optimal weights of the selected features in the proposed similarity measure.

Cryptography and Security

Detecting and Classifying Android Malware using Static Analysis along with Creator Information

no code implementations2 Mar 2019 Hyunjae Kang, Jae-wook Jang, Aziz Mohaisen, Huy Kang Kim

Guided by this insight, we propose a method to improve on the performance of Android malware detection by incorporating the creator's information as a feature and classify malicious applications into similar groups.

Cryptography and Security

ADSaS: Comprehensive Real-time Anomaly Detection System

no code implementations30 Nov 2018 Sooyeon Lee, Huy Kang Kim

Since with massive data growth, the need for autonomous and generic anomaly detection system is increased.

Anomaly Detection Time Series +1

Know Your Master: Driver Profiling-based Anti-theft Method

1 code implementation18 Apr 2017 Byung Il Kwak, JiYoung Woo, Huy Kang Kim

In our model, we add mechanical features of automotive parts that are excluded in previous works, but can be differentiated by drivers' driving behaviors.

Driver Identification feature selection

Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles

no code implementations4 Jun 2016 Jae-wook Jang, Jaesung Yun, Aziz Mohaisen, JiYoung Woo, Huy Kang Kim

Mass-market mobile security threats have increased recently due to the growth of mobile technologies and the popularity of mobile devices.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.