


default search action
Ah Reum Kang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j9]Young-Seob Jeong
, Sang-Min Lee, Jong-Hyun Kim, Jiyoung Woo
, Ah Reum Kang
:
Malware Detection Using Byte Streams of Different File Formats. IEEE Access 10: 51041-51047 (2022) - [j8]Dae-Yeon Kim
, Dong-Sik Choi, Ah Reum Kang, Jiyoung Woo, Yechan Han, Sung Wan Chun, Jaeyun Kim
:
Intelligent Ensemble Deep Learning System for Blood Glucose Prediction Using Genetic Algorithms. Complex. 2022: 7902418:1-7902418:10 (2022) - 2021
- [j7]Young-Seob Jeong
, Juhyun Kim, Dahye Kim, Jiyoung Woo
, Mun Gyu Kim
, Hun Woo Choi, Ah Reum Kang
, Sun Young Park
:
Prediction of Postoperative Complications for Patients of End Stage Renal Disease. Sensors 21(2): 544 (2021) - 2020
- [j6]Jihyun Lee
, Jiyoung Woo, Ah Reum Kang
, Young-Seob Jeong, Woohyun Jung
, Misoon Lee, Sang Hyun Kim
:
Comparative Analysis on Machine Learning and Deep Learning to Predict Post-Induction Hypotension. Sensors 20(16): 4575 (2020) - [j5]Young-Seob Jeong, Jiyoung Woo, Sang-Min Lee, Ah Reum Kang
:
Malware Detection of Hangul Word Processor Files Using Spatial Pyramid Average Pooling. Sensors 20(18): 5265 (2020) - [j4]Dae-Yeon Kim
, Dong-Sik Choi
, Jaeyun Kim, Sung Wan Chun, Hyo-Wook Gil, Namjun Cho, Ah Reum Kang
, Jiyoung Woo
:
Developing an Individual Glucose Prediction Model Using Recurrent Neural Network. Sensors 20(22): 6460 (2020) - [c20]Marina Blanton, Ah Reum Kang, Chen Yuan:
Improved Building Blocks for Secure Multi-party Computation Based on Secret Sharing with Honest Majority. ACNS (1) 2020: 377-397
2010 – 2019
- 2019
- [j3]Young-Seob Jeong
, Jiyoung Woo
, Ah Reum Kang
:
Malware Detection on Byte Streams of PDF Files Using Convolutional Neural Networks. Secur. Commun. Networks 2019: 8485365:1-8485365:9 (2019) - [i5]Marina Blanton
, Ah Reum Kang, Chen Yuan:
Improved Building Blocks for Secure Multi-Party Computation based on Secret Sharing with Honest Majority. IACR Cryptol. ePrint Arch. 2019: 718 (2019) - 2018
- [i4]Marina Blanton, Ah Reum Kang
, Subhadeep Karan, Jaroslaw Zola:
Privacy Preserving Analytics on Distributed Medical Data. CoRR abs/1806.06477 (2018) - 2017
- [c19]Ah Reum Kang
, Jeremy Blackburn, Haewoon Kwak, Huy Kang Kim:
I Would Not Plant Apple Trees If the World Will Be Wiped: Analyzing Hundreds of Millions of Behavioral Records of Players During an MMORPG Beta Test. WWW (Companion Volume) 2017: 435-444 - [i3]Ah Reum Kang, Jeremy Blackburn, Haewoon Kwak, Huy Kang Kim:
I Would Not Plant Apple Trees If the World Will Be Wiped: Analyzing Hundreds of Millions of Behavioral Records of Players During an MMORPG Beta Test. CoRR abs/1703.01500 (2017) - 2016
- [c18]Mee Lan Han
, Hee Chan Han, Ah Reum Kang
, Byung Il Kwak, Aziz Mohaisen, Huy Kang Kim
:
WHAP: Web-hacking profiling using Case-Based Reasoning. CNS 2016: 344-345 - [c17]Ah Reum Kang
, Aziz Mohaisen:
Transparency of the new gTLD's centralized zone data service: A measurement study. CNS 2016: 354-355 - [c16]Ah Reum Kang
, Aziz Mohaisen
:
Assessing DNS privacy under partial deployment of special-use Domain Names. CNS 2016: 358-359 - [c15]Jeffrey Spaulding, Ah Reum Kang
, Shambhu J. Upadhyaya, Aziz Mohaisen
:
A user study of the effectiveness of typosquatting techniques. CNS 2016: 360-361 - [c14]Ah Reum Kang
, Aziz Mohaisen:
Automatic alerts annotation for improving DDoS mitigation systems. CNS 2016: 362-363 - [c13]Ah Reum Kang
, Seong Hoon Jeong
, Steven Y. Ko, Kui Ren, Aziz Mohaisen:
Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service. HotWeb 2016: 54-59 - [c12]Seong Hoon Jeong
, Ah Reum Kang
, Joongheon Kim, Huy Kang Kim
, Aziz Mohaisen:
A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure. SIGCOMM 2016: 557-558 - [c11]Aziz Mohaisen, Ah Reum Kang
, Kui Ren:
Does Query Blocking Improve DNS Privacy? - Quantifying Privacy Under Partial Blocking Deployment. WISA 2016: 1-14 - [i2]Ah Reum Kang, Seong Hoon Jeong, Aziz Mohaisen, Huy Kang Kim:
Multimodal Game Bot Detection using User Behavioral Characteristics. CoRR abs/1606.01426 (2016) - [i1]Ah Reum Kang
, Jeffrey Spaulding, Aziz Mohaisen:
Domain Name System Security and Privacy: Old Problems and New Challenges. CoRR abs/1606.07080 (2016) - 2015
- [c10]Mee Lan Han
, Jin Lee, Ah Reum Kang
, Sungwook Kang, Jung Kyu Park, Huy Kang Kim
:
A Statistical-Based Anomaly Detection Method for Connected Cars in Internet of Things Environment. IOV 2015: 89-97 - [c9]Seong Hoon Jeong
, Ah Reum Kang
, Huy Kang Kim
:
Analysis of Game Bot's Behavioral Characteristics in Social Interaction Networks of MMORPG. SIGCOMM 2015: 99-100 - [c8]Ah Reum Kang
, Juyong Park, Jina Lee, Huy Kang Kim
:
Rise and Fall of Online Game Groups: Common Findings on Two Different Games. WWW (Companion Volume) 2015: 1079-1084 - 2014
- [c7]Jane E. Lee, Ah Reum Kang
, Huy Kang Kim
, Juyong Park:
Moneymakers and Bartering in Online Games. CompleNet 2014: 39-46 - [c6]Ah Reum Kang
, Hana Kim, Jiyoung Woo, Juyong Park, Huy Kang Kim
:
Altruism in games: Helping others help themselves. NETGAMES 2014: 1-6 - 2013
- [j2]Ah Reum Kang
, Jiyoung Woo, Juyong Park, Huy Kang Kim
:
Online game bot detection based on party-play log analysis. Comput. Math. Appl. 65(9): 1384-1395 (2013) - [c5]Jiyoung Woo, Hyun-Jae Kang, Ah Reum Kang
, Hyukmin Kwon, Huy Kang Kim
:
Who Is Sending a Spam Email: Clustering and Characterizing Spamming Hosts. ICISC 2013: 469-482 - [c4]Ah Reum Kang, Juyong Park, Huy Kang Kim:
Loyalty or Profit? Early Evolutionary Dynamics of Online Game Groups. NetGames 2013: 2:1-2:6 - [c3]Jiyoung Woo, Ah Reum Kang
, Huy Kang Kim
:
The contagion of malicious behaviors in online games. SIGCOMM 2013: 543-544 - 2012
- [j1]Ah Reum Kang
, Huy Kang Kim, Jiyoung Woo:
Chatting Pattern Based Game BOT Detection: Do They Talk Like Us? KSII Trans. Internet Inf. Syst. 6(11): 2866-2879 (2012) - [c2]Jiyoung Woo, Ah Reum Kang
, Huy Kang Kim
:
Modeling of bot usage diffusion across social networks in MMORPGs. WASA 2012: 13-18 - 2011
- [c1]Seokshin Son, Ah Reum Kang
, Hyunchul Kim, Ted Taekyoung Kwon, Juyong Park, Huy Kang Kim
:
Multi-relational social networks in a large-scale MMORPG. SIGCOMM 2011: 414-415
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint