Login / Signup
Jeman Park
ORCID
Publication Activity (10 Years)
Years Active: 2015-2024
Publications (10 Years): 34
Top Topics
Deep Learning
Clinical Data
Dos Attacks
Malware Detection
Top Venues
CoRR
Comput. Networks
USENIX Security Symposium
ICTC
</>
Publications
</>
Haichuan Xu
,
Mingxuan Yao
,
Runze Zhang
,
Mohamed Moustafa Dawoud
,
Jeman Park
,
Brendan Saltaformaggio
DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware.
USENIX Security Symposium
(2024)
David Oygenblik
,
Carter Yagemann
,
Joseph Zhang
,
Arianna Mastali
,
Jeman Park
,
Brendan Saltaformaggio
AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images.
USENIX Security Symposium
(2024)
Jeman Park
,
Rhongho Jang
,
Manar Mohaisen
,
David Mohaisen
A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet.
IEEE/ACM Trans. Netw.
30 (1) (2022)
Ranjita Pai Kasturi
,
Jonathan Fuller
,
Yiting Sun
,
Omar Chabklo
,
Andres Rodriguez
,
Jeman Park
,
Brendan Saltaformaggio
Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces.
USENIX Security Symposium
(2022)
Aminollah Khormali
,
Jeman Park
,
Hisham Alasmary
,
Afsah Anwar
,
Muhammad Saad
,
David Mohaisen
Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699.
Comput. Networks
188 (2021)
Aminollah Khormali
,
Jeman Park
,
Hisham Alasmary
,
Afsah Anwar
,
Muhammad Saad
,
David Mohaisen
Domain name system security and privacy: A contemporary survey.
Comput. Networks
185 (2021)
Aminollah Khormali
,
Jeman Park
,
Hisham Alasmary
,
Afsah Anwar
,
David Mohaisen
Domain Name System Security and Privacy: A Contemporary Survey.
CoRR
(2020)
Soohyun Park
,
Jeman Park
,
David Mohaisen
,
Joongheon Kim
Reinforced Edge Selection using Deep Learning for Robust Surveillance in Unmanned Aerial Vehicles.
ICTC
(2020)
Jaesung Yoo
,
Jeman Park
,
An Wang
,
David Mohaisen
,
Joongheon Kim
On the Performance of Generative Adversarial Network (GAN) Variants: A Clinical Data Study.
ICTC
(2020)
SooHyun Park
,
Jeman Park
,
David Mohaisen
,
Joongheon Kim
Reinforced Edge Selection using Deep Learning for Robust Surveillance in Unmanned Aerial Vehicles.
CoRR
(2020)
SooHyun Park
,
Yeongeun Kang
,
Jeman Park
,
Joongheon Kim
Self-Controllable Super-Resolution Deep Learning Framework for Surveillance Drones in Security Applications.
EAI Endorsed Trans. Security Safety
7 (23) (2020)
Jinchun Choi
,
Mohammed Abuhamad
,
Ahmed Abusnaina
,
Afsah Anwar
,
Sultan Alshamrani
,
Jeman Park
,
Daehun Nyang
,
David Mohaisen
Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet.
IEEE Access
8 (2020)
Jaesung Yoo
,
Jeman Park
,
An Wang
,
David Mohaisen
,
Joongheon Kim
On the Performance of Generative Adversarial Network (GAN) Variants: A Clinical Data Study.
CoRR
(2020)
Jeman Park
,
Manar Mohaisen
,
DaeHun Nyang
,
Aziz Mohaisen
Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions.
Comput. Networks
173 (2020)
Afsah Anwar
,
Hisham Alasmary
,
Jeman Park
,
An Wang
,
Songqing Chen
,
David Mohaisen
Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection.
ICICS
(2020)
Jeman Park
,
Manar Mohaisen
,
Aziz Mohaisen
Investigating DNS Manipulation by Open DNS Resolvers.
CoNEXT Companion
(2019)
Hisham Alasmary
,
Aminollah Khormali
,
Afsah Anwar
,
Jeman Park
,
Jinchun Choi
,
DaeHun Nyang
,
Aziz Mohaisen
Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach.
CoRR
(2019)
Jeffrey Spaulding
,
Jeman Park
,
Joongheon Kim
,
DaeHun Nyang
,
Aziz Mohaisen
Thriving on chaos: Proactive detection of command and control domains in internet of things-scale botnets using DRIFT.
Trans. Emerg. Telecommun. Technol.
30 (4) (2019)
Ahmed Abusnaina
,
Aminollah Khormali
,
Hisham Alasmary
,
Jeman Park
,
Afsah Anwar
,
Ulku Meteriz
,
Aziz Mohaisen
Breaking graph-based IoT malware detection systems using adversarial examples: poster.
WiSec
(2019)
Aziz Mohaisen
,
Omar Alrawi
,
Jeman Park
,
Joongheon Kim
,
DaeHun Nyang
,
Manar Mohaisen
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering.
CoRR
(2019)
Amirali Sanatinia
,
Jeman Park
,
Erik-Oliver Blass
,
Aziz Mohaisen
,
Guevara Noubir
A Privacy-Preserving Longevity Study of Tor's Hidden Services.
CoRR
(2019)
Hisham Alasmary
,
Aminollah Khormali
,
Afsah Anwar
,
Jeman Park
,
Jinchun Choi
,
Ahmed Abusnaina
,
Amro Awad
,
DaeHun Nyang
,
Aziz Mohaisen
Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach.
IEEE Internet Things J.
6 (5) (2019)
Jeman Park
,
Jinchun Choi
,
DaeHun Nyang
,
Aziz Mohaisen
Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service.
IEEE Trans. Netw. Serv. Manag.
16 (4) (2019)
Ahmed Abusnaina
,
Aminollah Khormali
,
Hisham Alasmary
,
Jeman Park
,
Afsah Anwar
,
Aziz Mohaisen
Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems.
ICDCS
(2019)
Jeman Park
,
Aziz Mohaisen
,
Charles A. Kamhoua
,
Michael J. Weisman
,
Nandi O. Leslie
,
Laurent Njilla
Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments.
WISA
(2019)
Ahmed Abusnaina
,
Aminollah Khormali
,
Hisham Alasmary
,
Jeman Park
,
Afsah Anwar
,
Ulku Meteriz
,
Aziz Mohaisen
Examining Adversarial Learning against Graph-based IoT Malware Detection Systems.
CoRR
(2019)
Jeman Park
,
Aminollah Khormali
,
Manar Mohaisen
,
Aziz Mohaisen
Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers.
DSN
(2019)
Jeffrey Spaulding
,
Jeman Park
,
Joongheon Kim
,
Aziz Mohaisen
Proactive detection of algorithmically generated malicious domains.
ICOIN
(2018)
Jeman Park
,
Hisham Alasmary
,
Omar Al-Ibrahim
,
Charles A. Kamhoua
,
Kevin A. Kwiat
,
Laurent Njilla
,
Aziz Mohaisen
QOI: Assessing Participation in Threat Information Sharing.
ICASSP
(2018)
Hisham Alasmary
,
Afsah Anwar
,
Jeman Park
,
Jinchun Choi
,
DaeHun Nyang
,
Aziz Mohaisen
Graph-Based Comparison of IoT and Android Malware.
CSoNet
(2018)
Aziz Mohaisen
,
Omar Alrawi
,
Jeman Park
,
Joongheon Kim
,
DaeHun Nyang
,
Manar Mohaisen
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering.
EAI Endorsed Trans. Security Safety
5 (16) (2018)
Jeman Park
,
DaeHun Nyang
,
Aziz Mohaisen
Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks.
PST
(2018)
Jeman Park
,
Jihye Kim
,
Seungho Kuk
,
Yongtae Park
,
Hyogon Kim
Exploring Smartphones as WAVE Devices.
VTC Fall
(2015)
Song Gun Lee
,
Jeman Park
,
Hyogon Kim
A User-Side Energy-Saving Video Streaming Scheme for LTE Devices.
IEEE Commun. Lett.
19 (6) (2015)