If you made any changes in Pure these will be visible here soon.

Personal profile

Education/Academic qualification

PHD, George Mason University

… → 2000

Fingerprint Fingerprint is based on mining the text of the experts' scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 10 Similar Profiles
Access control Engineering & Materials Science
Cloud computing Engineering & Materials Science
Specifications Engineering & Materials Science
Internet Engineering & Materials Science
Industry Engineering & Materials Science
Cryptography Engineering & Materials Science
Accreditation Engineering & Materials Science
Authorization Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1999 2018

  • 4294 Citations
  • 32 h-Index
  • 129 Conference contribution
  • 67 Article
  • 4 Chapter
  • 3 Editorial

Defining and detecting environment discrimination in android apps

Hong, Y., Hu, Y., Lai, C. M., Felix Wu, S., Neamtiu, I., McDaniel, P., Yu, P., Cam, H. & Ahn, G. J. Jan 1 2018 Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Springer Verlag, p. 510-529 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Malware
Android (operating system)
Application programming interfaces (API)
Dynamic analysis

Efficient Anonymous Message Submission

Zhao, X., Li, L., Xue, G. & Ahn, G. J. Mar 1 2018 In : IEEE Transactions on Dependable and Secure Computing. 15, 2, p. 217-230 14 p.

Research output: Contribution to journalArticle

Computation theory
Electrical engineering
Cryptography

A game theoretic approach to strategy generation for moving target defense in web applications

Sengupta, S., Vadlamudi, S. G., Kambhampati, S., Doupé, A., Zhao, Z., Taguinod, M. & Ahn, G. J. Jan 1 2017 16th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2017. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), Vol. 1, p. 178-186 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Autonomous agents
Multi agent systems
Costs
Uncertainty
5 Citations

Deep android malware detection

McLaughlin, N., Del Rincon, J. M., Kang, B. J., Yerima, S., Miller, P., Sezer, S., Safaei, Y., Trickel, E., Zhao, Z., Doupe, A. & Ahn, G. J. Mar 22 2017 CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 301-308 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Static analysis
Pipelines
Malware
Neural networks
Graphics processing unit

Foreword

Ghinita, G., Pretschner, A. & Ahn, G. J. Mar 22 2017 In : CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. p. iii-iv

Research output: Contribution to journalEditorial

Projects 2008 2027