papers

Publications by categories in reversed chronological order.

Journal & Conference Papers

2026

  1. DRIFT: Drift-Resilient Invariant-Feature Transformer for DGA Detection
    Chaeyoung Lee, Chaeri Jung, and Seonghoon Jeong
    In 56th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2026), 2026
  2. Lightweight Preprocessing Defenses for Robust Deepfake Detection Against Adversarial Perturbations
    Aoran Zhang, Seonghoon Jeong, Hyunjae Kang, and 1 more author
    In 5th ACM Workshop on the Security Implications of Deepfakes and Cheapfakes (WDC 2026), 2026
  3. A Black-Box Inversion Attack on Small Language Models and Differential Privacy-Based Defense
    Xingyun Wang, Seonghoon Jeong, Hyunjae Kang, and 1 more author
    In AsiaCCS 2026 Workshop on Privacy in Large Language Models (LLM) and Natural Language Processing (NLP) (LM-SHIELD 2026), 2026
  4. The Vehicle May Be Sick: Denial of Diagnostic Services by Exploiting the CAN Transport Protocol
    Seungjin Baek, Seonghoon Jeong, and Huy Kang Kim
    In Embedded Security in Cars (escar USA 2026), 2026

2024

  1. Detecting Domain Names Generated by DGAs with Low False Positives in Chinese Domain Names
    Huiju Lee, Jeong Do Yoo, Seonghoon Jeong, and 1 more author
    IEEE Access, 2024
  2. AERO: Automotive Ethernet Real-Time Observer for Anomaly Detection in In-Vehicle Networks
    Seonghoon Jeong, Huy Kang Kim, Mee Lan Han, and 1 more author
    IEEE Transactions on Industrial Informatics, 2024
  3. X-CANIDS: Signal-Aware Explainable Intrusion Detection System for Controller Area Network-Based In-Vehicle Network
    Seonghoon Jeong, Sangho Lee, Hwejae Lee, and 1 more author
    IEEE Transactions on Vehicular Technology, 2024

2023

  1. Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade Linux
    Seonghoon Jeong, Minsoo Ryu, Hyunjae Kang, and 1 more author
    In ACM Conference on Data and Application Security and Privacy (ACM CODASPY 2023), Apr 2023
  2. Toward Understanding Network Intrusion on Vehicles: An eXplainable IDS Analyzing Signals and Time-series Periodicity
    Seonghoon Jeong
    In Conference on Information Security and Cryptography-Winter 2023 (CISC-W’23), Dec 2023

2022

  1. Trading Behind-the-Scene: Analysis of Online Gold Farming Network in Auction House System
    Yuseung Noh, Seonghoon Jeong, and Huy Kang Kim
    IEEE Transactions on Games, 2022
  2. MUVIDS: False MAVLink Injection Attack Detection in Communication for Unmanned Vehicles
    Seonghoon Jeong, Eunji Park, Kang Uk Seo, and 2 more authors
    In International Workshop on Automotive and Autonomous Vehicle Security (AutoSec 2021 Workshop), Feb 2022

2021

  1. Convolutional Neural Network-based Intrusion Detection System for AVTP Streams in Automotive Ethernet-based Networks
    Seonghoon Jeong, Boosun Jeon, Boheung Chung, and 1 more author
    Vehicular Communications, 2021
  2. Cybersecurity for Autonomous Vehicles: Review of Attacks and Defense
    Kyounggon Kim, Jun Seok Kim, Seonghoon Jeong, and 2 more authors
    Computers & Security, 2021

2018

  1. Automated Reverse Engineering and Attack for CAN using OBD-II
    Tae Un Kang, Hyun Min Song, Seonghoon Jeong, and 1 more author
    In IEEE Vehicular Technology Conference (VTC-Fall 2018), Aug 2018

2017

  1. OTIDS: A Novel Intrusion Detection System for In-vehicle Network by using Remote Frame
    Hyunsung Lee, Seong Hoon Jeong, and Huy Kang Kim
    In Conference on Privacy, Security and Trust (PST 2017), Aug 2017
  2. The Big Data Analysis Framework of Information Security Policy based on Security Incidents
    Seong Hoon Jeong, Huy Kang Kim, and J Woo
    Journal of the Korea Society of Computer and Information, Oct 2017

2016

  1. Multimodal Game Bot Detection using User Behavioral Characteristics
    Ah Reum Kang, S. H. Jeong, A. Mohaisen, and 1 more author
    SpringerPlus, 2016
  2. Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service
    Ah Reum Kang, Seong Hoon Jeong, Steven Y. Ko, and 2 more authors
    In IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb 2016 Workshop), Oct 2016
  3. A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure
    Seong Hoon Jeong, Ah Reum Kang, J. Kim, and 2 more authors
    In ACM SIGCOMM (SIGCOMM 2016), Aug 2016

2015

  1. Analysis of Game Bot’s Behavioral Characteristics in Social Interaction Networks of MMORPG
    Seonghoon Jeong, Ah Reum Kang, and Huy Kang Kim
    ACM SIGCOMM Computer Communication Review, 2015
  2. A Survey of Fraud Detection Research based on Transaction Analysis and Data Mining Technique
    Seong Hoon Jeong, H Kim, S Shin, and 2 more authors
    Journal of The Korea Institute of Information Security & Cryptology, Dec 2015

Datasets

2026

  1. Longitudinal Benign and DGA Domain Name Dataset
    Chaeyoung Lee, Chaeri Jung, and Seonghoon Jeong
    2026

2024

  1. X-CANIDS Dataset (In-Vehicle Signal Dataset)
    Seonghoon Jeong, Hyunjae Kang, and Huy Kang Kim
    2024

2021

  1. Automotive Ethernet Intrusion Dataset
    Seonghoon Jeong, Boosun Jeon, Boheung Chung, and 1 more author
    2021

2018

  1. CAN Dataset for Intrusion Detection (OTIDS)
    Hyunsung Lee, Seonghoon Jeong, and Huy Kang Kim
    2018

Standards & Recommendations

2022

  1. Guidelines for an Intrusion Prevention System for Connected Vehicles
    Seonghoon Jeong, Huy Kang Kim, Seungwook Park, and 1 more author
    Oct 2022

Korean-Language Papers

2023

  1. 가상 개발환경 기반의 차량용 사이버훈련 프레임워크 설계: 공격 중심으로
    Youngbok Jo, Subin Choi, Byeongyun Oh, and 5 more authors
    정보보호학회지 (Review of KIISC), Aug 2023
  2. 차량 네트워크 공격 대응을 위한 가상화 사이버 훈련 개발환경 사례 연구
    Hojun Kim, Youngho Choi, Youngbok Jo, and 5 more authors
    정보보호학회지 (Review of KIISC), Aug 2023