Recovering architectural design decisions A Shahbazian, YK Lee, D Le, Y Brun, N Medvidovic 2018 IEEE international conference on software architecture (ICSA), 95-9509, 2018 | 94 | 2018 |
A SEALANT for Inter-App Security Holes in Android YK Lee, J young Bang, G Safi, A Shahbazian, Y Zhao, N Medvidovic International Conference on Software Engineering (ICSE), 312--323, 2017 | 57 | 2017 |
Securing biometric authentication system using blockchain YK Lee, J Jeong ICT Express 7 (3), 322-326, 2021 | 40 | 2021 |
A consortium blockchain-based secure and trusted electronic portfolio management scheme MM Merlec, MM Islam, YK Lee, HP In Sensors 22 (3), 1271, 2022 | 25 | 2022 |
Customer requirements elicitation based on social network service Y Lee, N Kim, D Kim, D Lee, HP In KSII Transactions on Internet and Information Systems 5 (10), 1733-1750, 2011 | 25 | 2011 |
Eva: A tool for visualizing software architectural evolution D Nam, YK Lee, N Medvidovic Proceedings of the 40th international conference on software engineering …, 2018 | 24 | 2018 |
Adaptive real-time offloading decision-making for mobile edges: deep reinforcement learning framework and simulation results S Park, D Kwon, J Kim, YK Lee, S Cho Applied Sciences 10 (5), 1663, 2020 | 22 | 2020 |
Smartbuilder: A block-based visual programming framework for smart contract development MM Merlec, YK Lee, HP In 2021 IEEE International Conference on Blockchain (Blockchain), 90-94, 2021 | 17 | 2021 |
Customer Requirements Validation Method Based on Mental Models YK Lee, HP In, R Kazman Software Engineering Conference (APSEC), 2014 21st Asia-Pacific, 199-206, 2014 | 13 | 2014 |
ViVA: a visualization and analysis tool for distributed event-based systems YK Lee, J Bang, J Garcia, N Medvidovic ICSE Companion 2014, 580-583, 2014 | 12 | 2014 |
SEALANT: A detection and visualization tool for inter-app security vulnerabilities in android YK Lee, P Yoodee, A Shahbazian, D Nam, N Medvidovic Automated Software Engineering (ASE), 2017 32nd IEEE/ACM International …, 2017 | 11 | 2017 |
Trends in neural architecture search: Towards the acceleration of search Y Kim, WJ Yun, YK Lee, S Jung, J Kim 2021 International Conference on Information and Communication Technology …, 2021 | 9 | 2021 |
Towards context-aware smart contracts for Blockchain IoT systems L Ngwira, MM Merlec, YK Lee, HP In 2021 International Conference on Information and Communication Technology …, 2021 | 8 | 2021 |
Generative adversarial attacks on fingerprint recognition systems H won Kwon, JW Nam, J Kim, YK Lee 2021 International Conference on Information Networking (ICOIN), 483-485, 2021 | 8 | 2021 |
Machine-learning based analog and mixed-signal circuit design and optimization JW Nam, YK Lee 2021 International Conference on Information Networking (ICOIN), 874-876, 2021 | 8 | 2021 |
Making well-informed software design decisions A Shahbazian, YK Lee, Y Brun, N Medvidovic Proceedings of the 40th International Conference on Software Engineering …, 2018 | 7 | 2018 |
A Comparative Study on Deepfake Detection using Gray Channel Analysis SB Son, HH Jo, HY Kang, BG Lee, YK Lee Journal of Korea Multimedia Society 24 (9), 1224-1241, 2021 | 6 | 2021 |
A study on the concept of using efficient lightweight hash chain to improve authentication in VMF military standard D Kim, S Seo, H Kim, WG Lim, YK Lee Applied Sciences 10 (24), 8999, 2020 | 6 | 2020 |
A sealant for inter-app security holes in android. In 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE) YK Lee, JY Bang, G Safi, A Shahbazian, Y Zhao, N Medvidovic IEEE, 312ś323, 2017 | 5 | 2017 |
EQuaTE: Efficient Quantum Train Engine for Run-Time Dynamic Analysis and Visual Feedback in Autonomous Driving S Park, H Feng, C Park, YK Lee, S Jung, J Kim IEEE Internet Computing, 2023 | 4 | 2023 |