Protecting intellectual property of deep neural networks with watermarking J Zhang, Z Gu, J Jang, H Wu, MP Stoecklin, H Huang, I Molloy Proceedings of the 2018 on Asia conference on computer and communications …, 2018 | 627 | 2018 |
Bitshred: feature hashing malware for scalable triage and semantic analysis J Jang, D Brumley, S Venkataraman Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 397 | 2011 |
ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions J Jang, M Woo, D Brumley USENIX ;login:, 2012 | 296 | 2012 |
The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics BJ Kwon, J Mondal, J Jang, L Bilge, T Dumitras ACM Conference on Computer and Communications Security, 2015 | 178 | 2015 |
SplitScreen: Enabling Efficient, Distributed Malware Detection SK Cha, I Moraru, J Jang, J Truelove, D Brumley, DG Andersen USENIX Symposium on Networked Systems Design and Implementation, 2010 | 129 | 2010 |
Towards automatic software lineage inference J Jang, M Woo, D Brumley 22nd USENIX Security Symposium (USENIX Security 13), 81-96, 2013 | 123 | 2013 |
Android malware clustering through malicious payload mining Y Li, J Jang, X Hu, X Ou Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017 | 114 | 2017 |
Experimental Study of Fuzzy Hashing in Malware Clustering Analysis Y Li, SC Sundaramurthy, AG Bardas, X Ou, D Caragea, X Hu, J Jang Workshop on Cyber Security Experimentation and Test, 2015 | 103 | 2015 |
Threat intelligence computing X Shu, F Araujo, DL Schales, MP Stoecklin, J Jang, H Huang, JR Rao Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 82 | 2018 |
Deeplocker-concealing targeted attacks with ai locksmithing D Kirat, J Jang, M Stoecklin Black hat USA, 2018 | 68 | 2018 |
A Time-based Key Management Protocol for Wireless Sensor Networks J Jang Yonsei University, 2007 | 68 | 2007 |
Detecting web exploit kits by tree-based structural similarity search X Hu, J Jang, F Monrose, MP Stoecklin, T Taylor, T Wang US Patent 9,723,016, 2017 | 54 | 2017 |
Deeplocker: How AI can power a stealthy new breed of malware MP Stoecklin, J Jang, D Kirat Security Intelligence 8 (2018), 2018 | 51 | 2018 |
Detecting malicious exploit kits using tree-based similarity searches T Taylor, X Hu, T Wang, J Jang, MP Stoecklin, F Monrose, R Sailer proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016 | 43 | 2016 |
BAYWATCH: robust beaconing detection to identify infected hosts in large-scale enterprise networks X Hu, J Jang, MP Stoecklin, T Wang, DL Schales, D Kirat, JR Rao 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016 | 41 | 2016 |
Consolidating structured and unstructured security and threat intelligence with knowledge graphs Y Park, J Jang, DH Kirat, JR Rao, MP Stoecklin US Patent App. 15/368,845, 2018 | 39 | 2018 |
Cognitive offense analysis using contextual data and knowledge graphs WA Bird, SC Deffeyes, J Jang, D Kirat, Y Park, JR Rao, MP Stoecklin US Patent 10,542,015, 2020 | 36 | 2020 |
Bitshred: Fast, scalable code reuse detection in binary code J Jang, D Brumley, S Venkataraman CMU-CyLab-10-006 16, 2009 | 36 | 2009 |
Bitshred: Fast, scalable malware triage J Jang, D Brumley, S Venkataraman Cylab, Carnegie Mellon University, Pittsburgh, PA, Technical Report CMU …, 2010 | 31 | 2010 |
Identifying malicious web infrastructures X Hu, J Jang, T Wang, J Zhang US Patent 9,578,042, 2017 | 30 | 2017 |