Dongkwan Kim

ORCID: 0000-0003-3642-0253
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Topic Modeling
  • IPv6, Mobility, Handover, Networks, Security
  • Complex Network Analysis Techniques
  • Advanced Graph Neural Networks
  • Software Testing and Debugging Techniques
  • Internet Traffic Analysis and Secure E-voting
  • RFID technology advancements
  • Advanced Authentication Protocols Security
  • Wireless Body Area Networks
  • Security and Verification in Computing
  • Caching and Content Delivery
  • Distributed systems and fault tolerance
  • User Authentication and Security Systems
  • Advanced MIMO Systems Optimization
  • Digital Rights Management and Security
  • Graph Theory and Algorithms
  • Green IT and Sustainability
  • Bluetooth and Wireless Communication Technologies
  • Software Engineering Research
  • Software Reliability and Analysis Research
  • Blockchain Technology Applications and Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Cryptographic Implementations and Security
  • Natural Language Processing Techniques

Korea Advanced Institute of Science and Technology
2015-2022

Institute of Electrical and Electronics Engineers
2021

Regional Municipality of Niagara
2021

IEEE Computer Society
2021

One approach to assess the security of embedded IoT devices is applying dynamic analysis such as fuzz testing their firmware in scale. To this end, existing approaches aim provide an emulation environment that mimics behavior real hardware/peripherals. Nonetheless, practice, can emulate only a small fraction images. For example, Firmadyne, state-of-the-art tool, run 183 (16.28%) 1,124 wireless router/IP-camera images we collected from top eight manufacturers. Such low success rate caused by...

10.1145/3427228.3427294 article EN Annual Computer Security Applications Conference 2020-12-07

Binary code similarity analysis (BCSA) is widely used for diverse security applications such as plagiarism detection, software license violation and vulnerability discovery. Despite the surging research interest in BCSA, it significantly challenging to perform new this field several reasons. First, most existing approaches focus only on end results, namely, increasing success rate of BCSA by adopting uninterpretable machine learning. Moreover, they utilize their own benchmark sharing neither...

10.1109/tse.2022.3187689 article EN cc-by IEEE Transactions on Software Engineering 2022-07-01

Long Term Evolution (LTE) is becoming the dominant cellular networking technology, shifting network away from its circuit-switched legacy towards a packet-switched that resembles Internet. To support voice calls over LTE network, operators have introduced Voice-over-LTE (VoLTE), which dramatically changes how are handled, both user equipment and infrastructure perspectives. We find this dramatic shift opens up number of new attack surfaces not been previously explored. call attention to...

10.1145/2810103.2813718 article EN 2015-10-06

An overwhelming number of true and false news stories are posted shared in social networks, users diffuse the based on multiple factors. Diffusion from one user to another depends not only stories' content genuineness but also alignment topical interests between users. In this paper, we propose a novel Bayesian nonparametric model that incorporates homogeneity as key component regulates similarity posting sharing users' interests. Our extends hierarchical Dirichlet process topics Gaussian...

10.1145/3289600.3291009 preprint EN 2019-01-30

Cellular basebands play a crucial role in mobile communication.However, it is significantly challenging to assess their security for several reasons.Manual analysis inevitable because of the obscurity and complexity baseband firmware; however, such requires repetitive efforts cover diverse models or versions.Automating also non-trivial firmware large contains numerous functions associated with complex cellular protocols.Therefore, existing approaches on are limited only couple versions...

10.14722/ndss.2021.24365 article EN 2021-01-01

A cellular network is a closed system, and each operator has built unique “walled garden” for their by combining different operation policies, configurations, implementation optimizations. Unfortunately, some of these combinations can induce performance degradation due to misconfiguration or unnecessary procedures. To detect such degradation, thorough understanding even the minor details standards operator-specific implementations important. However, it difficult problems, as control plane...

10.1109/tmc.2018.2804913 article EN IEEE Transactions on Mobile Computing 2018-02-12

While humans naturally develop theory of mind (ToM), the capability to understand other people's mental states and beliefs, state-of-the-art large language models (LLMs) underperform on simple ToM benchmarks. We posit that we can extend our understanding LLMs' abilities by evaluating key human precursors -- perception inference perception-to-belief in LLMs. introduce two datasets, Percept-ToMi Percept-FANToM, evaluate these precursory inferences for LLMs annotating characters' perceptions...

10.48550/arxiv.2407.06004 preprint EN arXiv (Cornell University) 2024-07-08

10.18653/v1/2024.emnlp-main.1105 article EN Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing 2024-01-01

Subgraphs are rich substructures in graphs, and their nodes edges can be partially observed real-world tasks. Under partial observation, existing node- or subgraph-level message-passing produces suboptimal representations. In this paper, we formulate a novel task of learning representations subgraphs. To solve problem, propose Partial Subgraph InfoMax (PSI) framework generalize models, including DGI, InfoGraph, MVGRL, GraphCL, into our framework. These models maximize the mutual information...

10.1145/3511808.3557647 article EN Proceedings of the 31st ACM International Conference on Information & Knowledge Management 2022-10-16

Additive compositionality of word embedding models has been studied from empirical and theoretical perspectives. Existing research on justifying additive existing requires a rather strong assumption uniform distribution. In this paper, we relax that propose more realistic conditions for proving compositionality, develop novel sub-word model satisfies under those conditions. We then empirically show our model’s improved semantic representation performance similarity noisy sentence similarity.

10.18653/v1/d19-5551 article EN cc-by 2019-01-01
Coming Soon ...