| Protecting intellectual property of deep neural networks with watermarking J Zhang, Z Gu, J Jang, H Wu, MP Stoecklin, H Huang, I Molloy Proceedings of the 2018 on Asia conference on computer and communications …, 2018 | 788 | 2018 |
| Bitshred: feature hashing malware for scalable triage and semantic analysis J Jang, D Brumley, S Venkataraman Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 409 | 2011 |
| ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions J Jang, M Woo, D Brumley USENIX ;login:, 2012 | 342 | 2012 |
| The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics BJ Kwon, J Mondal, J Jang, L Bilge, T Dumitras ACM Conference on Computer and Communications Security, 2015 | 194 | 2015 |
| Towards automatic software lineage inference J Jang, M Woo, D Brumley 22nd USENIX Security Symposium (USENIX Security 13), 81-96, 2013 | 133 | 2013 |
| SplitScreen: Enabling Efficient, Distributed Malware Detection SK Cha, I Moraru, J Jang, J Truelove, D Brumley, DG Andersen USENIX Symposium on Networked Systems Design and Implementation, 2010 | 133 | 2010 |
| Android malware clustering through malicious payload mining Y Li, J Jang, X Hu, X Ou International symposium on research in attacks, intrusions, and defenses …, 2017 | 120 | 2017 |
| Experimental Study of Fuzzy Hashing in Malware Clustering Analysis Y Li, SC Sundaramurthy, AG Bardas, X Ou, D Caragea, X Hu, J Jang Workshop on Cyber Security Experimentation and Test, 2015 | 115 | 2015 |
| Threat intelligence computing X Shu, F Araujo, DL Schales, MP Stoecklin, J Jang, H Huang, JR Rao Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 93 | 2018 |
| Deeplocker-concealing targeted attacks with ai locksmithing D Kirat, J Jang, M Stoecklin Black Hat USA, 2018 | 79 | 2018 |
| Intrusion detection in micro-services through container telemetry and behavior modeling F Araujo, TP Taylor, J Jang, W Blair US Patent 11,748,473, 2023 | 78 | 2023 |
| A Time-based Key Management Protocol for Wireless Sensor Networks J Jang Yonsei University, 2007 | 68 | 2007 |
| Detecting web exploit kits by tree-based structural similarity search X Hu, J Jang, F Monrose, MP Stoecklin, T Taylor, T Wang US Patent 9,723,016, 2017 | 66 | 2017 |
| Deeplocker: How AI can power a stealthy new breed of malware MP Stoecklin, J Jang, D Kirat Security Intelligence 8 (2018), 2018, 2018 | 59 | 2018 |
| Consolidating structured and unstructured security and threat intelligence with knowledge graphs Y Park, J Jang, DH Kirat, JR Rao, MP Stoecklin US Patent App. 15/368,845, 2018 | 51 | 2018 |
| BAYWATCH: robust beaconing detection to identify infected hosts in large-scale enterprise networks X Hu, J Jang, MP Stoecklin, T Wang, DL Schales, D Kirat, JR Rao 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016 | 48 | 2016 |
| Cognitive offense analysis using contextual data and knowledge graphs WA Bird, SC Deffeyes, J Jang, D Kirat, Y Park, JR Rao, MP Stoecklin US Patent 10,542,015, 2020 | 47 | 2020 |
| Detecting malicious exploit kits using tree-based similarity searches T Taylor, X Hu, T Wang, J Jang, MP Stoecklin, F Monrose, R Sailer proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016 | 41 | 2016 |
| Automated semantic modeling of system events Z Zhu, X Shu, DH Kirat, J Jang, MP Stoecklin US Patent App. 16/711,688, 2021 | 36 | 2021 |
| Identifying malicious web infrastructures X Hu, J Jang, T Wang, J Zhang US Patent 9,578,042, 2017 | 36 | 2017 |