Skip to main content

Showing 1–50 of 55 results for author: Kim, H K

  1. arXiv:2406.12721  [pdf

    eess.AS cs.SD

    Sound event detection based on auxiliary decoder and maximum probability aggregation for DCASE Challenge 2024 Task 4

    Authors: Sang Won Son, Jongyeon Park, Hong Kook Kim, Sulaiman Vesal, Jeong Eun Lim

    Abstract: In this report, we propose three novel methods for developing a sound event detection (SED) model for the DCASE 2024 Challenge Task 4. First, we propose an auxiliary decoder attached to the final convolutional block to improve feature extraction capabilities while reducing dependency on embeddings from pre-trained large models. The proposed auxiliary decoder operates independently from the main de… ▽ More

    Submitted 24 June, 2024; v1 submitted 17 June, 2024; originally announced June 2024.

    Comments: DCASE 2024 challenge Task4, 4 pages

  2. arXiv:2406.11248  [pdf

    eess.AS cs.AI cs.SD

    Performance Improvement of Language-Queried Audio Source Separation Based on Caption Augmentation From Large Language Models for DCASE Challenge 2024 Task 9

    Authors: Do Hyun Lee, Yoonah Song, Hong Kook Kim

    Abstract: We present a prompt-engineering-based text-augmentation approach applied to a language-queried audio source separation (LASS) task. To enhance the performance of LASS, the proposed approach utilizes large language models (LLMs) to generate multiple captions corresponding to each sentence of the training dataset. To this end, we first perform experiments to identify the most effective prompts for c… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

    Comments: DCASE 2024 Challenge Task 9, 4 pages

  3. arXiv:2406.00810  [pdf, other

    cs.CR

    Expanding the Attack Scenarios of SAE J1939: A Comprehensive Analysis of Established and Novel Vulnerabilities in Transport Protocol

    Authors: Hwejae Lee, Hyosun Lee, Saehee Jun, Huy Kang Kim

    Abstract: Following the enactment of the UN Regulation, substantial efforts have been directed toward implementing intrusion detection and prevention systems (IDPSs) and vulnerability analysis in Controller Area Network (CAN). However, Society of Automotive Engineers (SAE) J1939 protocol, despite its extensive application in camping cars and commercial vehicles, has seen limited vulnerability identification… ▽ More

    Submitted 2 June, 2024; originally announced June 2024.

    Comments: 18 pages, 7 figures, 5 tables; This is the accepted version of ESCAR USA 2024

    MSC Class: 68M25 ACM Class: K.6.5

  4. arXiv:2405.15987  [pdf, other

    cs.CY

    Modes of Analyzing Disinformation Narratives With AI/ML/Text Mining to Assist in Mitigating the Weaponization of Social Media

    Authors: Andy Skumanich, Han Kyul Kim

    Abstract: This paper highlights the developing need for quantitative modes for capturing and monitoring malicious communication in social media. There has been a deliberate "weaponization" of messaging through the use of social networks including by politically oriented entities both state sponsored and privately run. The article identifies a use of AI/ML characterization of generalized "mal-info," a broad… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

    Comments: Accepted at ICWSM-2024 Workshop on Digital State Sponsored Disinformation and Propaganda: Challenges and Opportunities (DSSDP24)

  5. arXiv:2404.04096  [pdf, other

    cs.IT eess.SP

    Machine Learning-Aided Cooperative Localization under Dense Urban Environment

    Authors: Hoon Lee, Hong Ki Kim, Seung Hyun Oh, Sang Hyun Lee

    Abstract: Future wireless network technology provides automobiles with the connectivity feature to consolidate the concept of vehicular networks that collaborate on conducting cooperative driving tasks. The full potential of connected vehicles, which promises road safety and quality driving experience, can be leveraged if machine learning models guarantee the robustness in performing core functions includin… ▽ More

    Submitted 5 April, 2024; originally announced April 2024.

  6. arXiv:2403.07090  [pdf, other

    cs.IR cs.AI

    Time Series Analysis of Key Societal Events as Reflected in Complex Social Media Data Streams

    Authors: Andy Skumanich, Han Kyul Kim

    Abstract: Social media platforms hold valuable insights, yet extracting essential information can be challenging. Traditional top-down approaches often struggle to capture critical signals in rapidly changing events. As global events evolve swiftly, social media narratives, including instances of disinformation, become significant sources of insights. To address the need for an inductive strategy, we explor… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

    Comments: AAAI2024 Workshop on AI for Time Series Analysis (AI4TS)

  7. arXiv:2403.07082  [pdf, ps, other

    cs.CY

    Exploring the Impact of ChatGPT on Student Interactions in Computer-Supported Collaborative Learning

    Authors: Han Kyul Kim, Shriniwas Nayak, Aleyeh Roknaldin, Xiaoci Zhang, Marlon Twyman, Stephen Lu

    Abstract: The growing popularity of generative AI, particularly ChatGPT, has sparked both enthusiasm and caution among practitioners and researchers in education. To effectively harness the full potential of ChatGPT in educational contexts, it is crucial to analyze its impact and suitability for different educational purposes. This paper takes an initial step in exploring the applicability of ChatGPT in a c… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

    Comments: AAAI2024 Workshop on AI for Education (AI4ED)

  8. arXiv:2311.14496  [pdf, other

    cs.CR

    RTPS Attack Dataset Description

    Authors: Dong Young Kim, Dongsung Kim, Yuchan Song, Gang Min Kim, Min Geun Song, Jeong Do Yoo, Huy Kang Kim

    Abstract: This paper explains all about our RTPS datasets. We collect malicious/benign packet data by injecting attack data in an Unmanned Ground Vehicle (UGV) in the normal state. We assembled the testbed, consisting of UGV, Controller, PC, and Router. We collect this dataset in the UGV part of our testbed. We conducted two types of attack "Command Injection" and "Command Injection with ARP Spoofing" on… ▽ More

    Submitted 2 April, 2024; v1 submitted 24 November, 2023; originally announced November 2023.

    Comments: This manuscript is written in Korean. You can download our dataset through our lab: https://ocslab.hksecurity.net/Datasets/rtps-attack-dataset We welcome your comments or feedback. Contact INFO: Dong Young Kim (klgh1256@korea.ac.kr), Huy Kang Kim (cenda@korea.ac.kr)

  9. arXiv:2311.14342  [pdf, other

    cs.CR

    AI-based Attack Graph Generation

    Authors: Sangbeom Park, Jaesung Lee, Jeong Do Yoo, Min Geun Song, Hyosun Lee, Jaewoong Choi, Chaeyeon Sagong, Huy Kang Kim

    Abstract: With the advancement of IoT technology, many electronic devices are interconnected through networks, communicating with each other and performing specific roles. However, as numerous devices join networks, the threat of cyberattacks also escalates. Preventing and detecting cyber threats are crucial, and one method of preventing such threats involves using attack graphs. Attack graphs are widely us… ▽ More

    Submitted 27 November, 2023; v1 submitted 24 November, 2023; originally announced November 2023.

    Comments: in Korean Language, 8 Figures, 14 Pages

  10. arXiv:2311.14327  [pdf, other

    cs.CR

    C-ITS Environment Modeling and Attack Modeling

    Authors: Jaewoong Choi, Min Geun Song, Hyosun Lee, Chaeyeon Sagong, Sangbeom Park, Jaesung Lee, Jeong Do Yoo, Huy Kang Kim

    Abstract: As technology advances, cities are evolving into smart cities, with the ability to process large amounts of data and the increasing complexity and diversification of various elements within urban areas. Among the core systems of a smart city is the Cooperative-Intelligent Transport Systems (C-ITS). C-ITS is a system where vehicles provide real-time information to drivers about surrounding traffic… ▽ More

    Submitted 27 November, 2023; v1 submitted 24 November, 2023; originally announced November 2023.

    Comments: in Korean Language, 14 Figures, 15 Pages

  11. arXiv:2306.06461  [pdf

    eess.AS cs.SD

    Semi-supervsied Learning-based Sound Event Detection using Freuqency Dynamic Convolution with Large Kernel Attention for DCASE Challenge 2023 Task 4

    Authors: Ji Won Kim, Sang Won Son, Yoonah Song, Hong Kook Kim, Il Hoon Song, Jeong Eun Lim

    Abstract: This report proposes a frequency dynamic convolution (FDY) with a large kernel attention (LKA)-convolutional recurrent neural network (CRNN) with a pre-trained bidirectional encoder representation from audio transformers (BEATs) embedding-based sound event detection (SED) model that employs a mean-teacher and pseudo-label approach to address the challenge of limited labeled data for DCASE 2023 Tas… ▽ More

    Submitted 10 June, 2023; originally announced June 2023.

    Comments: DCASE 2023 Challenge Task 4A, 5 pages

  12. X-CANIDS: Signal-Aware Explainable Intrusion Detection System for Controller Area Network-Based In-Vehicle Network

    Authors: Seonghoon Jeong, Sangho Lee, Hwejae Lee, Huy Kang Kim

    Abstract: Controller Area Network (CAN) is an essential networking protocol that connects multiple electronic control units (ECUs) in a vehicle. However, CAN-based in-vehicle networks (IVNs) face security risks owing to the CAN mechanisms. An adversary can sabotage a vehicle by leveraging the security risks if they can access the CAN bus. Thus, recent actions and cybersecurity regulations (e.g., UNR 155) re… ▽ More

    Submitted 14 March, 2024; v1 submitted 21 March, 2023; originally announced March 2023.

    Comments: This is the Accepted version of an article for publication in IEEE TVT

    Journal ref: IEEE Transactions on Vehicular Technology, Vol. 73, No. 3, pp. 3230-3246, Mar. 2024

  13. arXiv:2212.10854  [pdf, other

    cs.CR

    Defining C-ITS Environment and Attack Scenarios

    Authors: Yongsik Kim, Jae Woong Choi, Hyo Sun Lee, Jeong Do Yoo, Haerin Kim, Junho Jang, Kibeom Park, Huy Kang Kim

    Abstract: As technology advances, it is possible to process a lot of data, and as various elements in the city become diverse and complex, cities are becoming smart cities. One of the core systems of smart cities is Cooperative-Intelligent Transport Systems (C-ITS). C-ITS is a system that provides drivers with real-time accident risk information such as surrounding traffic conditions, sudden stops, and fall… ▽ More

    Submitted 21 December, 2022; originally announced December 2022.

    Comments: in Korean language

  14. arXiv:2212.09268  [pdf, other

    cs.CR

    UAVCAN Dataset Description

    Authors: Dongsung Kim, Yuchan Song, Soonhyeon Kwon, Haerin Kim, Jeong Do Yoo, Huy Kang Kim

    Abstract: We collected attack data from unmanned vehicles using the UAVCAN protocol, and public and described technical documents. A testbed was built with a drone using PX4, and a total of three attacks, Flooding, Fuzzy, and Replay, were performed. The attack was carried out in a total of 10 scenarios. We expect that the attack data will help develop technologies such as anomaly detection to solve the secu… ▽ More

    Submitted 8 April, 2024; v1 submitted 19 December, 2022; originally announced December 2022.

    Comments: in english language

  15. arXiv:2207.10297  [pdf, other

    cs.LG

    Action2Score: An Embedding Approach To Score Player Action

    Authors: Junho Jang, Ji Young Woo, Huy Kang Kim

    Abstract: Multiplayer Online Battle Arena (MOBA) is one of the most successful game genres. MOBA games such as League of Legends have competitive environments where players race for their rank. In most MOBA games, a player's rank is determined by the match result (win or lose). It seems natural because of the nature of team play, but in some sense, it is unfair because the players who put a lot of effort lo… ▽ More

    Submitted 21 July, 2022; originally announced July 2022.

    Comments: 20 pages, 8 figures, 4 tables; accepted to ACM CHIPLAY 2022, and PACM on Human-Computer Interaction

  16. arXiv:2204.06113  [pdf, other

    cs.CR

    Liuer Mihou: A Practical Framework for Generating and Evaluating Grey-box Adversarial Attacks against NIDS

    Authors: Ke He, Dan Dongseong Kim, Jing Sun, Jeong Do Yoo, Young Hun Lee, Huy Kang Kim

    Abstract: Due to its high expressiveness and speed, Deep Learning (DL) has become an increasingly popular choice as the detection algorithm for Network-based Intrusion Detection Systems (NIDSes). Unfortunately, DL algorithms are vulnerable to adversarial examples that inject imperceptible modifications to the input and cause the DL algorithm to misclassify the input. Existing adversarial attacks in the NIDS… ▽ More

    Submitted 12 April, 2022; originally announced April 2022.

    Comments: 16 pages, 8 figures, planning on submitting to ACM CCS 2022

    ACM Class: I.2.1

  17. arXiv:2112.13595  [pdf, other

    eess.IV cs.CV

    Depth estimation of endoscopy using sim-to-real transfer

    Authors: Bong Hyuk Jeong, Hang Keun Kim, Young Don Son

    Abstract: In order to use the navigation system effectively, distance information sensors such as depth sensors are essential. Since depth sensors are difficult to use in endoscopy, many groups propose a method using convolutional neural networks. In this paper, the ground truth of the depth image and the endoscopy image is generated through endoscopy simulation using the colon model segmented by CT colonog… ▽ More

    Submitted 27 December, 2021; originally announced December 2021.

    Comments: 12 pages, 9 figures

    MSC Class: 68T05; 62P10 ACM Class: I.2.1

  18. arXiv:2110.07116  [pdf, other

    eess.AS cs.SD

    Auxiliary Loss of Transformer with Residual Connection for End-to-End Speaker Diarization

    Authors: Yechan Yu, Dongkeon Park, Hong Kook Kim

    Abstract: End-to-end neural diarization (EEND) with self-attention directly predicts speaker labels from inputs and enables the handling of overlapped speech. Although the EEND outperforms clustering-based speaker diarization (SD), it cannot be further improved by simply increasing the number of encoder blocks because the last encoder block is dominantly supervised compared with lower blocks. This paper pro… ▽ More

    Submitted 26 September, 2022; v1 submitted 13 October, 2021; originally announced October 2021.

    Comments: Submitted to ICASSP 2022, equal contribution from first two authors

  19. arXiv:2108.05079  [pdf, other

    cs.LG cs.AI cs.HC

    Unsupervised Driver Behavior Profiling leveraging Recurrent Neural Networks

    Authors: Young Ah Choi, Kyung Ho Park, Eunji Park, Huy Kang Kim

    Abstract: In the era of intelligent transportation, driver behavior profiling has become a beneficial technology as it provides knowledge regarding the driver's aggressiveness. Previous approaches achieved promising driver behavior profiling performance through establishing statistical heuristics rules or supervised learning-based models. Still, there exist limits that the practitioner should prepare a labe… ▽ More

    Submitted 11 August, 2021; originally announced August 2021.

    Comments: 11 pages, 2 figures, 1 table, this paper is accepted in WISA 2021

    ACM Class: I.2; I.5.1

  20. arXiv:2107.02569  [pdf

    cs.SD cs.LG eess.AS

    Self-training with noisy student model and semi-supervised loss function for dcase 2021 challenge task 4

    Authors: Nam Kyun Kim, Hong Kook Kim

    Abstract: This report proposes a polyphonic sound event detection (SED) method for the DCASE 2021 Challenge Task 4. The proposed SED model consists of two stages: a mean-teacher model for providing target labels regarding weakly labeled or unlabeled data and a self-training-based noisy student model for predicting strong labels for sound events. The mean-teacher model, which is based on the residual convolu… ▽ More

    Submitted 6 July, 2021; originally announced July 2021.

    Comments: 5 pages, DCASE 2021 challenge Task 4 technical report

  21. arXiv:2102.03546  [pdf, other

    cs.CR cs.LG eess.SY

    Convolutional Neural Network-based Intrusion Detection System for AVTP Streams in Automotive Ethernet-based Networks

    Authors: Seonghoon Jeong, Boosun Jeon, Boheung Chung, Huy Kang Kim

    Abstract: Connected and autonomous vehicles (CAVs) are an innovative form of traditional vehicles. Automotive Ethernet replaces the controller area network and FlexRay to support the large throughput required by high-definition applications. As CAVs have numerous functions, they exhibit a large attack surface and an increased vulnerability to attacks. However, no previous studies have focused on intrusion d… ▽ More

    Submitted 6 February, 2021; originally announced February 2021.

    Comments: 35 pages, 9 figures, accepted to Vehicular Communications (Elsevier)

    ACM Class: C.2.5

  22. arXiv:2011.13374  [pdf, other

    cs.AI cs.HC cs.LG

    Understand Watchdogs: Discover How Game Bot Get Discovered

    Authors: Eunji Park, Kyung Ho Park, Huy Kang Kim

    Abstract: The game industry has long been troubled by malicious activities utilizing game bots. The game bots disturb other game players and destroy the environmental system of the games. For these reasons, the game industry put their best efforts to detect the game bots among players' characters using the learning-based detections. However, one problem with the detection methodologies is that they do not p… ▽ More

    Submitted 19 January, 2021; v1 submitted 26 November, 2020; originally announced November 2020.

    Comments: 9 pages, 3 figures, 3 tables, this paper is accepted in ICAART 2021

  23. arXiv:2011.00540  [pdf, other

    cs.CR cs.LG

    Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort

    Authors: Kyung Ho Park, Eunji Park, Huy Kang Kim

    Abstract: Along with the importance of safety, an IDS has become a significant task in the real world. Prior studies proposed various intrusion detection models for the UAV. Past rule-based approaches provided a concrete baseline IDS model, and the machine learning-based method achieved a precise intrusion detection performance on the UAV with supervised learning models. However, previous methods have room… ▽ More

    Submitted 1 November, 2020; originally announced November 2020.

    Comments: 14 pages, 4 tables, 3 figures, 5 equations, In Proceeding of WISA 2020 (THE 21ST WORLD CONFERENCE ON INFORMATION SECURITY APPLICATIONS)

  24. Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment

    Authors: Daegeon Kim, Do Hyung Gu, Huy Kang Kim

    Abstract: National disasters can threaten national security and require several organizations to integrate the functionalities to correspond to the event. Many countries are constructing a nationwide mobile communication network infrastructure to share information and promptly communicate with corresponding organizations. Public Safety Long-Term Evolution (PS-LTE) is a communication mechanism adopted in man… ▽ More

    Submitted 9 January, 2021; v1 submitted 25 September, 2020; originally announced September 2020.

    Journal ref: Security and Communication Networks, vol. 2020, Article ID 8869418

  25. arXiv:2008.07212  [pdf, ps, other

    cs.IT math.CO

    Optimal minimal Linear codes from posets

    Authors: Jong Yoon Hyun, Hyun Kwang Kim, Yansheng Wu, Qin Yue

    Abstract: Recently, some infinite families of minimal and optimal binary linear codes were constructed from simplicial complexes by Hyun {\em et al.} We extend this construction method to arbitrary posets. Especially, anti-chains are corresponded to simplicial complexes. In this paper, we present two constructions of binary linear codes from hierarchical posets of two levels. In particular, we determine t… ▽ More

    Submitted 17 August, 2020; originally announced August 2020.

    Comments: 22 pages, to appear in DCC

  26. arXiv:2007.00947  [pdf

    eess.AS cs.SD

    Polyphonic sound event detection based on convolutional recurrent neural networks with semi-supervised loss function for DCASE challenge 2020 task 4

    Authors: Nam Kyun Kim, Hong Kook Kim

    Abstract: This report proposes a polyphonic sound event detection (SED) method for the DCASE 2020 Challenge Task 4. The proposed SED method is based on semi-supervised learning to deal with the different combination of training datasets such as weakly labeled dataset, unlabeled dataset, and strongly labeled synthetic dataset. Especially, the target label of each audio clip from weakly labeled or unlabeled d… ▽ More

    Submitted 2 July, 2020; originally announced July 2020.

    Comments: 4 pages, DCASE challenge 2020 task4 technical report

  27. arXiv:1911.09870  [pdf, other

    cs.CR cs.LG eess.SP

    This Car is Mine!: Automobile Theft Countermeasure Leveraging Driver Identification with Generative Adversarial Networks

    Authors: Kyung Ho Park, Huy Kang Kim

    Abstract: As a car becomes more connected, a countermeasure against automobile theft has become a significant task in the real world. To respond to automobile theft, data mining, biometrics, and additional authentication methods are proposed. Among current countermeasures, data mining method is one of the efficient ways to capture the owner driver's unique characteristics. To identify the owner driver from… ▽ More

    Submitted 22 November, 2019; originally announced November 2019.

    Comments: 6 pages, 3 figures, 3 tables, In Proceedings of the escar Asia 2019

  28. arXiv:1909.10851  [pdf, other

    cs.HC cs.SI

    Oldie is Goodie: Effective User Retention by In-game Promotion Event Analysis

    Authors: Kyoung Ho Kim, Huy Kang Kim

    Abstract: For sustainable growth and profitability, online game companies are constantly carrying out various events to attract new game users, to maximize return users, and to minimize churn users in online games. Because minimizing churn users is the most cost-effective method, many pieces of research are being conducted on ways to predict and to prevent churns in advance. However, there is still little r… ▽ More

    Submitted 24 September, 2019; originally announced September 2019.

    Comments: 6 pages, 7 figures, 5 tables; This paper is an author version of the same title paper appeared in the proceedings on ACM CHIPLAY 2019

  29. arXiv:1909.08929  [pdf, other

    cs.LG stat.ML

    Automobile Theft Detection by Clustering Owner Driver Data

    Authors: Yong Goo Kang, Kyung Ho Park, Huy Kang Kim

    Abstract: As automobiles become intelligent, automobile theft methods are evolving intelligently. Therefore automobile theft detection has become a major research challenge. Data-mining, biometrics, and additional authentication methods have been proposed to address automobile theft, in previous studies. Among these methods, data-mining can be used to analyze driving characteristics and identify a driver co… ▽ More

    Submitted 19 September, 2019; originally announced September 2019.

    Comments: 15 pages, 7 figures, 3 tables, In Proceedings of the 17th escar Europe 2019

  30. arXiv:1909.02786  [pdf, other

    cs.CR

    Security Requirements of Commercial Drones for Public Authorities by Vulnerability Analysis of Applications

    Authors: Daegeon Kim, Huy Kang Kim

    Abstract: Due to the ability to overcome the geospatial limitations and to the possibility to converge the various information communication technologies, the application domains and the market size of drones are increasing internationally. Public authorities in South Korean are investing for the domestic drone industry and the technological advancement as a power of innovation and growth of the country. Th… ▽ More

    Submitted 6 September, 2019; originally announced September 2019.

    Comments: 12 pages, 12 figures, 5 tables

  31. arXiv:1908.03748  [pdf, other

    cs.CR cs.LG

    Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM

    Authors: Kyung Ho Park, Eunjo Lee, Huy Kang Kim

    Abstract: With the rapid growth of MMORPG market, game bot detection has become an essential task for maintaining stable in-game ecosystem. To classify bots from normal users, detection methods are proposed in both game client and server-side. Among various classification methods, data mining method in server-side captured unique characteristics of bots efficiently. For features used in data mining, behavio… ▽ More

    Submitted 10 August, 2019; originally announced August 2019.

    Comments: 10 pages, 1 figure, 5 tables, In Proceedings of the 20th World Conference on Information Security and Applications (WISA) 2019

  32. GIDS: GAN based Intrusion Detection System for In-Vehicle Network

    Authors: Eunbi Seo, Hyun Min Song, Huy Kang Kim

    Abstract: A Controller Area Network (CAN) bus in the vehicles is an efficient standard bus enabling communication between all Electronic Control Units (ECU). However, CAN bus is not enough to protect itself because of lack of security features. To detect suspicious network connections effectively, the intrusion detection system (IDS) is strongly required. Unlike the traditional IDS for Internet, there are s… ▽ More

    Submitted 17 July, 2019; originally announced July 2019.

    Comments: 9 pages, 11 figures, Accepted for PST 2018 : 16th International Conference on Privacy, Security and Trust, some numbers in table 2 has fixed after doing additional experiment

    Journal ref: In 2018 16th Annual Conference on Privacy, Security and Trust (PST), pp. 1-6. IEEE, 2018

  33. Andro-Simnet: Android Malware Family Classification Using Social Network Analysis

    Authors: Hye Min Kim, Hyun Min Song, Jae Woo Seo, Huy Kang Kim

    Abstract: While the rapid adaptation of mobile devices changes our daily life more conveniently, the threat derived from malware is also increased. There are lots of research to detect malware to protect mobile devices, but most of them adopt only signature-based malware detection method that can be easily bypassed by polymorphic and metamorphic malware. To detect malware and its variants, it is essential t… ▽ More

    Submitted 22 June, 2019; originally announced June 2019.

    Comments: 13 pages, 11 figures, dataset link: http://ocslab.hksecurity.net/Datasets/andro-simnet , demo video: https://youtu.be/JmfS-ZtCbg4 , In Proceedings of the 16th Annual Conference on Privacy, Security and Trust (PST), 2018

    Journal ref: 2018 16th Annual Conference on Privacy, Security and Trust (PST), Belfast, 2018, pp. 1-8

  34. arXiv:1904.03568  [pdf, other

    cs.RO

    Active Robot-Assisted Feeding with a General-Purpose Mobile Manipulator: Design, Evaluation, and Lessons Learned

    Authors: Daehyung Park, Yuuna Hoshi, Harshal P. Mahajan, Ho Keun Kim, Zackory Erickson, Wendy A. Rogers, Charles C. Kemp

    Abstract: Eating is an essential activity of daily living (ADL) for staying healthy and living at home independently. Although numerous assistive devices have been introduced, many people with disabilities are still restricted from independent eating due to the devices' physical or perceptual limitations. In this work, we present a new meal-assistance system and evaluations of this system with people with m… ▽ More

    Submitted 16 September, 2019; v1 submitted 6 April, 2019; originally announced April 2019.

  35. Detecting and Classifying Android Malware using Static Analysis along with Creator Information

    Authors: Hyunjae Kang, Jae-wook Jang, Aziz Mohaisen, Huy Kang Kim

    Abstract: Thousands of malicious applications targeting mobile devices, including the popular Android platform, are created every day. A large number of those applications are created by a small number of professional under-ground actors, however previous studies overlooked such information as a feature in detecting and classifying malware, and in attributing malware to creators. Guided by this insight, we… ▽ More

    Submitted 2 March, 2019; originally announced March 2019.

    Comments: International Journal of Distributed Sensor Networks

  36. arXiv:1812.02361  [pdf

    cs.CR

    Trustworthy Smart Band: Security Requirement Analysis with Threat Modeling

    Authors: Suin Kang, Hye Min Kim, Huy Kang Kim

    Abstract: As smart bands make life more convenient and provide a positive lifestyle, many people are now using them. Since smart bands deal with private information, security design and implementation for smart band system become necessary. To make a trustworthy smart band, we must derive the security requirements of the system first, and then design the system satisfying the security requirements. In this… ▽ More

    Submitted 6 December, 2018; originally announced December 2018.

  37. arXiv:1811.12634  [pdf, ps, other

    cs.LG stat.ML

    ADSaS: Comprehensive Real-time Anomaly Detection System

    Authors: Sooyeon Lee, Huy Kang Kim

    Abstract: Since with massive data growth, the need for autonomous and generic anomaly detection system is increased. However, developing one stand-alone generic anomaly detection system that is accurate and fast is still a challenge. In this paper, we propose conventional time-series analysis approaches, the Seasonal Autoregressive Integrated Moving Average (SARIMA) model and Seasonal Trend decomposition us… ▽ More

    Submitted 30 November, 2018; originally announced November 2018.

    Comments: 6 pages, 4 figures, In Proceedings of the 19th World Conference on Information Security and Applications (WISA) 2018

  38. Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis

    Authors: Daegeon Kim, Huy Kang Kim

    Abstract: The objectives of cyberattacks are becoming sophisticated, and attackers are concealing their identity by masquerading as other attackers. Cyber threat intelligence (CTI) is gaining attention as a way to collect meaningful knowledge to better understand the intention of an attacker and eventually predict future attacks. A systemic threat analysis based on data acquired from actual cyber incidents… ▽ More

    Submitted 6 October, 2019; v1 submitted 25 November, 2018; originally announced November 2018.

    Comments: preprint version of paper published in Security and Communication Networks special issue on Data-Driven Cybersecurity

  39. arXiv:1805.09956  [pdf, other

    cs.DS

    Improved Approximation for Node-Disjoint Paths in Grids with Sources on the Boundary

    Authors: Julia Chuzhoy, David H. K. Kim, Rachit Nimavat

    Abstract: We study the classical Node-Disjoint Paths (NDP) problem: given an undirected $n$-vertex graph G, together with a set {(s_1,t_1),...,(s_k,t_k)} of pairs of its vertices, called source-destination, or demand pairs, find a maximum-cardinality set of mutually node-disjoint paths that connect the demand pairs. The best current approximation for the problem is achieved by a simple greedy $O(\sqrt{n})$-… ▽ More

    Submitted 24 May, 2018; originally announced May 2018.

    Comments: To appear in the proceedings of ICALP 2018

    ACM Class: F.2.2

  40. arXiv:1801.06368  [pdf, other

    cs.CY cs.CR cs.SI

    No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games

    Authors: Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Huy Kang Kim

    Abstract: Online game involves a very large number of users who are interconnected and interact with each other via the Internet. We studied the characteristics of exchanging virtual goods with real money through processes called "real money trading (RMT)." This exchange might influence online game user behaviors and cause damage to the reputation of game companies. We examined in-game transactions to revea… ▽ More

    Submitted 19 January, 2018; originally announced January 2018.

    Comments: 10 pages, 11 figures, In Proceedings of the 27th International World Wide Web Conference (WWW) 2018

  41. arXiv:1711.01980  [pdf, other

    cs.DS

    Almost Polynomial Hardness of Node-Disjoint Paths in Grids

    Authors: Julia Chuzhoy, David H. K. Kim, Rachit Nimavat

    Abstract: In the classical Node-Disjoint Paths (NDP) problem, we are given an $n$-vertex graph $G=(V,E)$, and a collection $M=\{(s_1,t_1),\ldots,(s_k,t_k)\}$ of pairs of its vertices, called source-destination, or demand pairs. The goal is to route as many of the demand pairs as possible, where to route a pair we need to select a path connecting it, so that all selected paths are disjoint in their vertices.… ▽ More

    Submitted 6 November, 2017; originally announced November 2017.

  42. arXiv:1705.00242  [pdf, other

    cs.CR cs.HC cs.MM

    Crime Scene Re-investigation: A Postmortem Analysis of Game Account Stealers' Behaviors

    Authors: Hana Kim, Seongil Yang, Huy Kang Kim

    Abstract: As item trading becomes more popular, users can change their game items or money into real money more easily. At the same time, hackers turn their eyes on stealing other users game items or money because it is much easier to earn money than traditional gold-farming by running game bots. Game companies provide various security measures to block account- theft attempts, but many security measures on… ▽ More

    Submitted 29 April, 2017; originally announced May 2017.

    Comments: 7 pages, 8 figures, In Proceedings of the 15th Annual Workshop on Network and Systems Support for Games (NetGames 2017)

    ACM Class: K.6.5; K.8.0

  43. arXiv:1705.00128  [pdf, other

    cs.CR

    Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches

    Authors: Mengmeng Ge, Huy Kang Kim, Dong Seong Kim

    Abstract: In most of modern enterprise systems, redundancy configuration is often considered to provide availability during the part of such systems is being patched. However, the redundancy may increase the attack surface of the system. In this paper, we model and assess the security and capacity oriented availability of multiple server redundancy designs when applying security patches to the servers. We c… ▽ More

    Submitted 29 April, 2017; originally announced May 2017.

  44. arXiv:1704.05223  [pdf, other

    cs.CR cs.LG

    Know Your Master: Driver Profiling-based Anti-theft Method

    Authors: Byung Il Kwak, JiYoung Woo, Huy Kang Kim

    Abstract: Although many anti-theft technologies are implemented, auto-theft is still increasing. Also, security vulnerabilities of cars can be used for auto-theft by neutralizing anti-theft system. This keyless auto-theft attack will be increased as cars adopt computerized electronic devices more. To detect auto-theft efficiently, we propose the driver verification method that analyzes driving patterns usin… ▽ More

    Submitted 18 April, 2017; originally announced April 2017.

    Comments: 8 pages, 11 figures, Accepted for PST 2016 : 14th International Conference on Privacy, Security and Trust

  45. arXiv:1703.01500  [pdf, other

    cs.CY cs.HC cs.SI physics.soc-ph

    I Would Not Plant Apple Trees If the World Will Be Wiped: Analyzing Hundreds of Millions of Behavioral Records of Players During an MMORPG Beta Test

    Authors: Ah Reum Kang, Jeremy Blackburn, Haewoon Kwak, Huy Kang Kim

    Abstract: In this work, we use player behavior during the closed beta test of the MMORPG ArcheAge as a proxy for an extreme situation: at the end of the closed beta test, all user data is deleted, and thus, the outcome (or penalty) of players' in-game behaviors in the last few days loses its meaning. We analyzed 270 million records of player behavior in the 4th closed beta test of ArcheAge. Our findings sho… ▽ More

    Submitted 4 March, 2017; originally announced March 2017.

    Comments: 10 pages, 9 figures, In Proceedings of the 26th International World Wide Web Conference (WWW) 2017

    ACM Class: J.4; K.4

  46. arXiv:1611.05429  [pdf, other

    cs.DS

    New Hardness Results for Routing on Disjoint Paths

    Authors: Julia Chuzhoy, David H. K. Kim, Rachit Nimavat

    Abstract: In the classical Node-Disjoint Paths (NDP) problem, the input consists of an undirected $n$-vertex graph $G$, and a collection $\mathcal{M}=\{(s_1,t_1),\ldots,(s_k,t_k)\}$ of pairs of its vertices, called source-destination, or demand, pairs. The goal is to route the largest possible number of the demand pairs via node-disjoint paths. The best current approximation for the problem is achieved by a… ▽ More

    Submitted 16 November, 2016; originally announced November 2016.

  47. arXiv:1606.01971  [pdf

    cs.CR

    Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph

    Authors: Jae-wook Jang, Jiyoung Woo, Aziz Mohaisen, Jaesung Yun, Huy Kang Kim

    Abstract: As the security landscape evolves over time, where thousands of species of malicious codes are seen every day, antivirus vendors strive to detect and classify malware families for efficient and effective responses against malware campaigns. To enrich this effort, and by capitalizing on ideas from the social network analysis domain, we build a tool that can help classify malware families using feat… ▽ More

    Submitted 6 June, 2016; originally announced June 2016.

    Comments: Mathematical Problems in Engineering, Vol 2015

  48. arXiv:1606.01426  [pdf, other

    cs.CY cs.CR

    Multimodal Game Bot Detection using User Behavioral Characteristics

    Authors: Ah Reum Kang, Seong Hoon Jeong, Aziz Mohaisen, Huy Kang Kim

    Abstract: As the online service industry has continued to grow, illegal activities in the online world have drastically increased and become more diverse. Most illegal activities occur continuously because cyber assets, such as game items and cyber money in online games, can be monetized into real currency. The aim of this study is to detect game bots in a Massively Multiplayer Online Role Playing Game (MMO… ▽ More

    Submitted 4 June, 2016; originally announced June 2016.

    Journal ref: Springerplus. 2016; 5: 523

  49. arXiv:1606.01403  [pdf, other

    cs.CR

    Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles

    Authors: Jae-wook Jang, Jaesung Yun, Aziz Mohaisen, Jiyoung Woo, Huy Kang Kim

    Abstract: Mass-market mobile security threats have increased recently due to the growth of mobile technologies and the popularity of mobile devices. Accordingly, techniques have been introduced for identifying, classifying, and defending against mobile threats utilizing static, dynamic, on-device, off-device, and hybrid approaches. In this paper, we contribute to the mobile security defense posture by intro… ▽ More

    Submitted 4 June, 2016; originally announced June 2016.

    Comments: 13 pages

    Journal ref: SpringerPlus (2016) 5:273

  50. arXiv:1603.05520  [pdf, other

    cs.DS

    Improved Approximation for Node-Disjoint Paths in Planar Graphs

    Authors: Julia Chuzhoy, David H. K. Kim, Shi Li

    Abstract: We study the classical Node-Disjoint Paths (NDP) problem: given an $n$-vertex graph $G$ and a collection $M=\{(s_1,t_1),\ldots,(s_k,t_k)\}$ of pairs of vertices of $G$ called demand pairs, find a maximum-cardinality set of node-disjoint paths connecting the demand pairs. NDP is one of the most basic routing problems, that has been studied extensively. Despite this, there are still wide gaps in our… ▽ More

    Submitted 17 March, 2016; originally announced March 2016.