NEWS
Find a Professional: Explore Experts Across 197 Disciplines in 221 Countries!
Just Updated: Compare Your Institution (Live Data)
Print Your Certificate
New! Young University / Institution Rankings 2025
New! Art & Humanities Rankings 2025
New! Social Sciences and Humanities Rankings 2025
Highly Cited Researchers 2025 (Updated Today)
AD
Scientific Index 2025
Scientist Rankings
University Rankings
Subject Rankings
Country Rankings
Login
Register & Pricing
insights
H-Index Rankings
insights
i10 Productivity Rankings
format_list_numbered
Citation Rankings
subject
University Subject Rankings
school
Young Universities
format_list_numbered
Top 100 Scientists
format_quote
Top 100 Institutions
format_quote
For Students
local_fire_department
Country Reports
person
Find a Professional
Jiyong Jang
IBM Corporation - New York / United States
Engineering & Technology / Computer Science
AD Scientific Index ID: 4464029
Registration, Add Profile,
Premium Membership
Get Your Global Impact Certificate
Ranking &
Analysis
Job
Experiences
Education
Information
Published Books
Book Chapters
Articles
Presentations
Lessons
Projects
Co-Authors
Subject Leaders
Editorship, Referee &
Scientific Board
Patents /
Designs
Academic Grants
& Awards
Artistic
Activities
Certificate / Course
/ Trainings
Association &
Society Memberships
Contact, Office
& Social Media
person_outline
Jiyong Jang's MOST POPULAR ARTICLES
1-)
Protecting intellectual property of deep neural networks with watermarking Proceedings of the 2018 on Asia conference on computer and communications …, 2018
2-)
Bitshred: feature hashing malware for scalable triage and semantic analysis Proceedings of the 18th ACM conference on Computer and communications …, 2011
3-)
ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions USENIX ;login:, 2012
4-)
The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics ACM Conference on Computer and Communications Security, 2015
5-)
Towards automatic software lineage inference 22nd USENIX Security Symposium (USENIX Security 13), 81-96, 2013
ARTICLES
Add your articles
We use cookies to personalize our website and offer you a better experience. If you accept cookies, we can offer you special services.
Cookie Policy
Accept