no code implementations • 21 Jul 2022 • Junho Jang, Ji Young Woo, Huy Kang Kim
In most MOBA games, a player's rank is determined by the match result (win or lose).
no code implementations • 11 Aug 2021 • Young Ah Choi, Kyung Ho Park, Eunji Park, Huy Kang Kim
As a result, our model yields high regression error given a sequence of aggressive driver behavior and low error given at a sequence of normal driver behavior.
2 code implementations • 6 Feb 2021 • Seonghoon Jeong, Boosun Jeon, Boheung Chung, Huy Kang Kim
In this paper, we present an intrusion detection method for detecting audio-video transport protocol (AVTP) stream injection attacks in automotive Ethernet-based networks.
no code implementations • 26 Nov 2020 • Eunji Park, Kyung Ho Park, Huy Kang Kim
This provides us explanations about the game bots' behavior, and the truthfulness of the explanations has been evaluated.
no code implementations • 1 Nov 2020 • Kyung Ho Park, Eunji Park, Huy Kang Kim
As unsupervised learning does not require labeling, our model let the practitioner not to label every type of attack from the flight data.
no code implementations • 22 Nov 2019 • Kyung Ho Park, Huy Kang Kim
GAN has merit to build identification model by learning the owner driver's data only.
no code implementations • 19 Sep 2019 • Yong Goo Kang, Kyung Ho Park, Huy Kang Kim
We cluster the key features of the owner driving data using the k-means algorithm.
no code implementations • 10 Aug 2019 • Kyung Ho Park, EunJo Lee, Huy Kang Kim
To overcome this limitation, we propose improved bot detection method with financial analysis.
no code implementations • 22 Jun 2019 • Hye Min Kim, Hyun Min Song, Jae Woo Seo, Huy Kang Kim
To maintain high classification accuracy, we propose a process to derive the optimal weights of the selected features in the proposed similarity measure.
Cryptography and Security
no code implementations • 2 Mar 2019 • Hyunjae Kang, Jae-wook Jang, Aziz Mohaisen, Huy Kang Kim
Guided by this insight, we propose a method to improve on the performance of Android malware detection by incorporating the creator's information as a feature and classify malicious applications into similar groups.
Cryptography and Security
no code implementations • 30 Nov 2018 • Sooyeon Lee, Huy Kang Kim
Since with massive data growth, the need for autonomous and generic anomaly detection system is increased.
1 code implementation • 18 Apr 2017 • Byung Il Kwak, JiYoung Woo, Huy Kang Kim
In our model, we add mechanical features of automotive parts that are excluded in previous works, but can be differentiated by drivers' driving behaviors.
no code implementations • 4 Jun 2016 • Jae-wook Jang, Jaesung Yun, Aziz Mohaisen, JiYoung Woo, Huy Kang Kim
Mass-market mobile security threats have increased recently due to the growth of mobile technologies and the popularity of mobile devices.
Cryptography and Security