https://scholar.google.com/citations?user=PyQC2ckAAAAJ&hl=ko
Gyuyoung Lee, Changjo Yun, Sungjin Kim, and Brent Byunghoon Kang, "Discriminator to grade classification results of neural networks via Prediction Error Tracking Method" (Accepted Jan. 2025) (Knowledge-Based Systems, SCIE, IF: 7.2)
Kyu Bum Lee, Jae Eun Kim, Eun Seong Park, Hyeog Soo Ko, and Sungjin Kim, "LQE-Net: Hybrid Deep Network for Enhancing Low-Light and Low-Quality CCTV Footage" (October 2024, corresponding author) (Journal of Korea Multimedia Society )
Sungjin Kim, et al. "Enhanced WGAN Model for Diagnosing Laryngeal Carcinoma" (Accepted, October 2024) (Cancers, SCIE, IF: 4.5)
Sungjin Kim "A Method to Find the Core Node Engaged in Malware Propagation in the Malware Distribution Network Hidden in Web" (Accepted, June 2023) (Korea Information Assurance Society, KCI)
Hun Joe, Sungjin Kim and Byunghoon Kang, "Quantitative Server Sizing Model for Performance Satisfaction in Secure U2L Migration" (Accepted, 2021-10-11) (IEEE Access, SCIE, IF: 3.367)
"Container Image Access Control Architecture to Protect Applications," (Accepted, 2020-08-22) (IEEE Access, SCIE, IF: 3.367), 4th author
Sungjin Kim, Suyeon Yoo, Seungjae Kim and Brent Byunghoon Kang, “AI-HydRa: Advanced hybrid approach using random forest and deep learning for malware classification”, (Accepted, 2020-08-23) (Information Sciences, SCIE, IF: 6.795 ), co-first author
"Empirical Study on Anti-virus Architecture for Container Platforms", (Accepted, 2020-06) (IEEE Access, SCIE, IF: 4.098), corresponding author
Sungjin Kim, “Anatomy on Malware Distribution Networks”, (Accepted, 2020-03-23) (IEEE Access, SCIE, IF: 4.098), first author
Sungjin Kim, Suyeon Yoo, and Byunghoon Kang, “The Image Game: Exploit Kit Detection Based on Recursive Convolutional Neural Networks”, (Accepted, 2020-01) (IEEE Access, SCIE, IF: 4.098), co-first author
Hun Joe and Sungjin Kim, "Quantitative Capacity Measurement Model for Performance Satisfaction in U2L Migration", KINGC, (Accepted, 2019-12-18), corresponding author
Asif Mehmood, Chaehoon Yoon, Seungjae Kim, Sungjin Kim, "MobilePill: Accurate Pill Image Classification via Deep Learning on Mobile", ICTC 2019 (http://2019.ictc.org/). corresponding author
S. Kim, J. Kim and B. Kang. "Malicious URL protection based on attackers' habitual behavioral analysis", Computers and Security, 2018 (SCIE, IF: 4.438 ), 1st author
S. Kim and B. Kang. "FriSM: Malicious Exploit Kit Detection via a Feature-based String-Similarity Matching", SecureComm 2018 (acceptance rate = 30.5%), 1st author
S. Kim, J. Kim, S. Nam and D. Kim. "WebMon: ML-and YARA-based Malicious Webpage Detection", Computer Networks, 2018 (SCIE, IF: 4.474), 1st author
Seungjae Kim, Suyeon Yoo, Seokwoo Nam and Sungjin Kim. "Implementation of CNN Model for Exploit Kit Detection", (Post AI 2018), corresponding author
S. Kim, S. K. Kim, S. Nam and D. Kim. "LoGos: Internet-Explorer-Based Malicious Webpage Detection", ETRI Journal, 2017 (SCI, IF:1.347 ), 1st author
S. Kim, S. Kim, J. Son, S. Nam and C. Lim. "A Practical Decision-Making Model for Security Products Preference", International Journal of Security and Its Applications, 2014, 1st author
Sungjin Kim and Byunghoon Kang, “Who is Winner? You or Attacker”, (Submitted, SCIE, IF: 6.404), 1st author
"Robust architecture for controlling access to container files", submitted, SCIE