Follow
Youn Kyu Lee
Youn Kyu Lee
Verified email at hongik.ac.kr - Homepage
Title
Cited by
Cited by
Year
Recovering architectural design decisions
A Shahbazian, YK Lee, D Le, Y Brun, N Medvidovic
2018 IEEE international conference on software architecture (ICSA), 95-9509, 2018
722018
A SEALANT for Inter-App Security Holes in Android
YK Lee, J young Bang, G Safi, A Shahbazian, Y Zhao, N Medvidovic
International Conference on Software Engineering (ICSE), 312--323, 2017
422017
Customer requirements elicitation based on social network service
Y Lee, N Kim, D Kim, D Lee, HP In
KSII Transactions on Internet and Information Systems 5 (10), 1733-1750, 2011
222011
Eva: A tool for visualizing software architectural evolution
D Nam, YK Lee, N Medvidovic
Proceedings of the 40th international conference on software engineering …, 2018
172018
Customer Requirements Validation Method Based on Mental Models
YK Lee, HP In, R Kazman
Software Engineering Conference (APSEC), 2014 21st Asia-Pacific, 199-206, 2014
122014
ViVA: a visualization and analysis tool for distributed event-based systems
YK Lee, J Bang, J Garcia, N Medvidovic
ICSE Companion 2014, 580-583, 2014
122014
SEALANT: A detection and visualization tool for inter-app security vulnerabilities in android
YK Lee, P Yoodee, A Shahbazian, D Nam, N Medvidovic
Automated Software Engineering (ASE), 2017 32nd IEEE/ACM International …, 2017
102017
Adaptive real-time offloading decision-making for mobile edges: deep reinforcement learning framework and simulation results
S Park, D Kwon, J Kim, YK Lee, S Cho
Applied Sciences 10 (5), 1663, 2020
92020
Securing biometric authentication system using blockchain
YK Lee, J Jeong
ICT Express 7 (3), 322-326, 2021
62021
Making well-informed software design decisions
A Shahbazian, YK Lee, Y Brun, N Medvidovic
Proceedings of the 40th International Conference on Software Engineering …, 2018
62018
A study on the concept of using efficient lightweight hash chain to improve authentication in VMF military standard
D Kim, S Seo, H Kim, WG Lim, YK Lee
Applied Sciences 10 (24), 8999, 2020
52020
A sealant for inter-app security holes in android. In 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE)
YK Lee, JY Bang, G Safi, A Shahbazian, Y Zhao, N Medvidovic
IEEE, 312ś323, 2017
42017
Generative adversarial attacks on fingerprint recognition systems
H won Kwon, JW Nam, J Kim, YK Lee
2021 International Conference on Information Networking (ICOIN), 483-485, 2021
32021
A Taxonomy for Security Flaws in Event-Based Systems
YK Lee, D Kim
Applied Sciences 10 (20), 7338, 2020
32020
SmartBuilder: A Block-based Visual Programming Framework for Smart Contract Development
MM Merlec, YK Lee, HP In
2021 IEEE International Conference on Blockchain (Blockchain), 90-94, 2021
22021
Trends in neural architecture search: Towards the acceleration of search
Y Kim, WJ Yun, YK Lee, S Jung, J Kim
2021 International Conference on Information and Communication Technology …, 2021
22021
A study on effective use of bpm information in deepfake detection
SH Lee, GE Yun, MY Lim, YK Lee
2021 International Conference on Information and Communication Technology …, 2021
22021
Machine-learning based analog and mixed-signal circuit design and optimization
JW Nam, YK Lee
2021 International Conference on Information Networking (ICOIN), 874-876, 2021
22021
A Comparative Study on Deepfake Detection using Gray Channel Analysis
SB Son, HH Jo, HY Kang, BG Lee, YK Lee
Journal of Korea Multimedia Society 24 (9), 1224-1241, 2021
22021
Identifying Inter-Component Communication Vulnerabilities in Eventbased Systems
YK Lee, D Nam, N Medvidovic
Technical Report: USC-CSSE-17-801, 2016
22016
The system can't perform the operation now. Try again later.
Articles 1–20