논문 (Publications)

* Implementation of Grover's Iterator for Quantum Searching with an Arbitrary Number of Qubits,

Sihyung Lee and Seung Yeob Nam,

IEEE Access, vol. 12, pp. 43027-43038, Mar. 2024. [SCIe] [code]

# 양자 컴퓨터를 활용한 탐색 알고리즘인 그로버의 알고리즘을 기존 방법보다 더 빠르고 간단하게 (더 적은 수의 operator와 stage를 사용해) 구현하는 방법 제안

* Transfer Learning-based Intrusion Detection System for a Controller Area Network,

Narayan Khatri, Sihyung Lee, and Seung Yeob Nam,

IEEE Access, vol. 11, pp. 120963-120982, Oct. 2023. [SCIe]

* 강의와 팀 활동을 조합한 컴퓨터학 과목의 플립러닝 기반 설계 (Design of Computer Science and Engineering Courses based on Flipped Learning through Integrating Lectures and Team Activities),

Sihyung Lee,

Journal of Internet Computing and Services (한국인터넷정보학회 논문지), vol. 24, no. 4, pp. 117-125, Aug. 2023. [등재지]

# 기존의 플립러닝 방식을 보완하기 위해 수업 전에는 기초 개념을 예습하도록 하고 심화 내용은 수업에서 교수자의 강의와 도움을 통해 익히는 방식 제안. 이를 컴퓨터학 4개 과목에 적용하여 학업 성취도와 만족도의 변화 분석

* Quantum Program Synthesis through Opeartor Learning and Selection,

Sihyung Lee and Seung Yeob Nam,

IEEE Access, vol. 11, pp. 25755-25767, Mar. 2023. [SCIe] [video] [data]

# 양자 컴퓨터 명령어의 의미를 스스로 학습하여 (예: Hadamard, Controlled Not) 사용자가 원하는 양자 프로그램을 자동 생성하는 기법 제안

* Challenges, Issues, and Recommendations for Blockchain- and Cloud-Based Automotive Insurance Systems,

Abdul Mateen, Adia Khalid, Sihyung Lee, and Seung Yeob Nam

Applied Sciences, vol. 13, no. 6, Article no. 3561, Mar. 2023. [SCIe]

* Event Message Clustering Algorithm for Selection of Majority Message in VANETs,

Narayan Khatri, Sihyung Lee, Abdul Mateen, and Seung Yeob Nam,

IEEE Access, vol. 11, pp. 14621-14635, Feb. 2023. [SCIe] [video] [code]

* Program Synthesis through Learning the Input-Output Behavior of Commands,

Sihyung Lee, Seung Yeob Nam, and Jiyeon Kim,

IEEE Access, vol. 10, pp. 63508-63521, June 2022. [SCIe] [video] [data]

# 프로그램 작성에 사용되는 다양한 명령어의 의미를 스스로 학습하고 이를 활용해 사용자가 원하는 프로그램을 자동 생성하는 기법 제안

* Smart Roads for Autonomous Accident Detection and Warning,

Abdul Mateen, Muhammad Zahid Hanif, Narayan Khatri, Sihyung Lee, and Seung Yeob Nam,

Sensors, vol. 22, no. 6, Article no. 2077, Mar. 2022. [SCIe]

* 입출력 예제와 패턴 학습을 통한 프로그램 자동 생성 (Program Synthesis through Input/Output Samples and Pattern Learning),

Sihyung Lee, Kyeongsook Kim, Bogeun Kim, Heemin Park, and Dahyeon Lee,

Proceedings of Korea Computer Congress (한국정보과학회 한국컴퓨터종합학술대회 논문집), pp. 1379-1381, June 2021. [video] [slides] 

# 간단한 신경망 모델을 사용해 기계가 프로그램 작성에 사용하는 다양한 명령어의 의미를 구분해 학습할 있음을 보임

* Reducing Complexity of Server Configuration through Public Cloud Storage,

Sihyung Lee,

Electronics, vol. 10, no. 11, Article no. 1277, June 2021. [SCIe]

# 클라우드 저장공간(예:Dropbox, Google Drive) 활용해 방화벽 설정 없이 편리하게 서버를 호스트하는 방법 제안 

* 온라인 공간에서 관심집단 대상 비정상 정보의 특징 분석과 탐지 (Characterization and Detection of Opinion Manipulation on Common Interest Groups in Online Communities),

Sihyung Lee,

Journal of Internet Computing and Services (한국인터넷정보학회 논문지), vol. 21, no. 6, pp. 57-69, Dec. 2020. [등재지]

# 2020년 총선에서 공통관심집단(인터넷카페)에 대한 맞춤형 의견 조작 기법에 대한 분석 & 탐지 기법 제안

* 온라인 공간에서 비정상 정보 유포 기법의 시간에 따른 변화 분석 (Temporal Analysis of Opinion Manipulation Tactics in Online Communities),

Sihyung Lee,

Journal of Internet Computing and Services (한국인터넷정보학회 논문지), vol. 21, no. 3, pp. 29-39, June 2020. [등재지]

# 2012년 대선~2017년 대선까지 인터넷 의견에 대한 조작 기법의 변화 분석 & 변화 추적 방법 제안

* Detection of Political Manipulation through Unsupervised Learning,

Sihyung Lee,

KSII Transactions on Internet and Information Systems (한국인터넷정보학회 논문지), vol. 13, no. 4, pp. 1825-1844, Apr. 2019. [SCIe]

* Characterization and Detection of Political Manipulation in Online Communities

Sihyung Lee,

Journal of Internet Technology, vol. 19, no. 4, pp. 1131-1142, July 2018. [SCIe]

* Security Analysis and Authentication System for Drones,

So-Hee Kim, Su-Jin Kim, Bo-Yeon Cha, Mi-So Kim, Jeong-A Gu, and Sihyung Lee,

Proceedings of Korea Multimedia Society Conference (한국멀티미디어학회 춘계학술발표대회 논문집), vol. 19, no. 1, pp. 1-3, May 2016. 

* Detection of Political Manipulation in Online Communities through Measures of Effort and Collaboration,

Sihyung Lee,

ACM Transactions on the Web, vol. 9, no. 3, Article no. 16, June 2015. [SCIe] [video-ENG] [video-KOR

* 온라인 공간에서 비정상적 정보 탐지 기술의 동향 및 발전 방향 (Detection of Abnormal Information Flow in Online Social Media),

Sihyung Lee,

Korea Information Processing Society Review (정보처리학회지), vol. 21, no. 6, pp. 17-22, November 2014.

* Network Monitoring: Present and Future,

Sihyung Lee, Kyriaki Levanti, and Hyong S. Kim,

Elsevier Computer Networks, vol. 65, no. 2, pp. 84-98, June 2014. [SCIe]

* Lightweight Resource Management for DDoS Traffic for Isolation in a Cloud Environment,

Ibnu Mubarok, Kiryong Lee, Sihyung Lee, and Heejo Lee,

IFIP International Information Security and Privacy Conference (SEC), pp. 44-51, Marrakech, Morocco, June 2014.

* 인터넷 주소 등록기관을 활용한 피싱 URL 분석 연구 (Detection of Fraudulent Web Sites based on the WHOIS Database),

Ji-Yoon Kang, Eun-Jung Cho, and Sihyung Lee,

Review of KIISC (정보보호학회지), vol. 23, no. 6, pp. 13-20, December 2013. [Extended version published in Journal of Information Technology, vol. 11, pp. 1-10, December 2013]

* Efficient Whitelist Construction for Heavily-Loaded Networks through Packet Monitoring

Eun-Jung Cho, Ji-Yoon Kang, and Sihyung Lee,

Journal of Information Technology, vol. 11, pp. 43-52, December 2013. 

* Estimation of the Available Bandwidth Ratio of a Remote Link or Path Segments

Seung Yeob Nam, Seong Joon Kim, Sihyung Lee, and Hyong S. Kim,

Elsevier Computer Networks, vol. 57, no. 1, pp. 61-77, Jan. 2013. [SCIe]

* Mining Diverse Opinions

Mudhakar Srivatsa, Sihyung Lee, and Tarek Abdelzaher,

IEEE Military Communications Conference (MILCOM), Orlando, FL, Oct. 2012. [SCOPUS]

* Analysis of Operator Errors in Routing Policy Configurations,

Sihyung Lee,

International Journal of Security and Its Applications, vol. 6, no. 4, pp. 33-52, Oct. 2012.

* Improving Manageability through Reorganization of Routing-Policy Configurations

Sihyung Lee, Tina Wong and Hyong S. Kim,

Elsevier Computer Networks, vol. 56, no. 14, pp. 3192-3205, Sep. 2012. [SCIe]

* Impact Analysis of BGP Sessions for Prioritization of Maintenance Operations

Sihyung Lee, Kyriaki Levanti, and Hyong S. Kim,

Elsevier Computer Networks, vol. 56, no. 8, pp. 2206-2220, May 2012. [SCIe]

* End-user Perspectives of Internet Connectivity Problems

Sihyung Lee and Hyong S. Kim,

Elsevier Computer Networks, vol. 56, no. 6, pp. 1710-1722, Apr. 2012. [SCIe]

* Discovering Service Dependencies in Mobile Ad Hoc Networks,

Petr Novotny, Alexander Wolf, Bong Jun Ko, and Sihyung Lee,

Fifth Annual Conference of the International Technology Alliance (ACITA), Maryland, Sep. 2011.

* Demo: Real-time Network Analytics for Sentiment Pattern Mining from Social Network Traffic,

Dakshi Agrawal, Sihyung Lee, Mudhakar Srivatsa, and Petros Zerfos,

Fifth Annual Conference of the International Technology Alliance (ACITA), Maryland, Sep. 2011.

* Impact Analysis of BGP Sessions for Prioritization of Maintenance Operations

Sihyung Lee, Kyriaki Levanti, and Hyong S. Kim,

IFIP/IEEE Symposium on Integrated Network Management (IM), Dublin, Ireland, May 2011. [acceptance rate: ~29.4%]

* On Reducing the Impact of Inter-domain Route Changes,

Kyriaki Levanti, Sihyung Lee, and Hyong S. Kim,

Passive and Active Measurement Conference (PAM), Atlanta, GA, Mar. 2011.

* Correlation, Visualization, and Usability Analysis of Routing Policy Configurations

Sihyung Lee and Hyong S. Kim,

IEEE Transactions on Network and Service Management (TNSM), vol. 7, no. 1, pp. 28-41, Mar. 2010. [SCIe]

* Automatic Detection of Firewall Misconfigurations using Firewall and Network Routing Policies,

Ricardo M. Oliveira, Sihyung Lee, and Hyong S. Kim,

IEEE DSN Workshop on Proactive Failure Avoidance, Recovery, and Maintenance (PFARM), Lisbon, Portugal, Jun. 2009.

* NetPiler: Detection of Ineffective Router Configurations

Sihyung Lee, Tina Wong and Hyong S. Kim,   

IEEE Journal on Selected Areas in Communications (JSAC), vol. 27, no. 3, pp. 291-301, Apr. 2009. [SCI]

* Detecting Network-wide and Router-specific Misconfigurations through Data Mining,

Franck Le, Sihyung Lee, Tina Wong, Hyong S. Kim and Darrell Newcomb,

IEEE/ACM Transactions on Networking (ToN), vol. 17, no. 1, pp. 66-79, Feb. 2009. [SCI]

* Improving Dependability of Network Configuration through Policy Classification, [tech-report]

Sihyung Lee, Tina Wong and Hyong S. Kim,

IEEE Conference on Dependable Systems and Networks (DSN), pp. 297-306, Anchorage, AK, Jun. 2008.  [acceptance rate: ~23.5%]

* To Automate or Not to Automate: On the Complexity of Network Configuration, [tech-report] [slides]

Sihyung Lee, Tina Wong and Hyong S. Kim,

IEEE International Conference on Communications (ICC), pp. 5726-5731, Beijing, China, May 2008. 

* Minerals: Using Data Mining to Detect Router Misconfigurations, [tech-report]

Franck Le, Sihyung Lee, Tina Wong, Hyong S. Kim and Darrell Newcomb,

ACM SIGCOMM Workshop on Mining Network Data (MineNet), Pisa, Italy, Sep. 2006.

* Secure Split Assignment Trajectory Sampling: A Malicious Router Detection System

Sihyung Lee, Tina Wong and Hyong S. Kim,

IEEE Conference on Dependable Systems and Networks (DSN), pp. 333-342, Philadelphia, PA, Jun. 2006. [acceptance rate: ~18.0%]