Publications
(J: journal / C: conference / P: patent)
Under Review
-
(Blind Review)
Sujin Park, Daehyeon Bae, Insup Lee, Jeonghyeok Kim, Haengrok Oh, Heeseok Kim, Seokhie Hong
-
LeakDiT: Diffusion Transformers for Trace-Augmented Side-Channel Analysis
Insup Lee, Daehyeon Bae, Seokhie Hong, and Sangjin Lee
International Journals & Conferences
|
[J8]
Multi-Step LLM Pipeline for Enhancing TTP Extraction in Cyber Threat Intelligence
Hyoungrok Kim, Donghyeon Lee, Insup Lee, Soohan Lee, and Sangjin Lee
IEEE Access 2025 [pdf]
(SCI 2024 Top 34.8% in Engineering, Electrical & Electronic)
|
|
[J7]
Enhancing Modulation Classification via Diffusion Transformers for Drone Video Signal Processing
Insup Lee, Khalifa Alteneiji, and Mohammed Alghfeli
IEEE Signal Processing Letters 2025
[pdf]
(SCI 2024 Top 31.6% in Engineering, Electrical & Electronic)
|
|
[J6]
MuCamp: Generating Cyber Campaign Variants via TTP Synonym Replacement for Group Attribution
Insup Lee and Changhee Choi
IEEE Transactions on Information Forensics and Security (TIFS) 2025
[pdf]
(SCI 2024 I/F Top 7.8% in Computer Science, Theory & Methods)
|
|
[J5]
UniQGAN: Towards Improved Modulation Classification With Adversarial Robustness Using Scalable Generator Design
Insup Lee and Wonjun Lee
IEEE Transactions on Dependable and Secure Computing (TDSC) 2024
[pdf]
(SCI 2023 I/F Top 4.9% in Computer Science, Software Engineering)
|
|
[J4]
Camp2Vec: Embedding Cyber Campaign With ATT&CK Framework for Attack Group Analysis
Insup Lee and Changhee Choi
ICT Express 2023
[pdf]
(SCI 2023 Top 23.0% in Computer Science, Information Systems)
|
|
[J3]
Exploiting TTP Co-occurence via GloVe-Based Embedding With ATT&CK Framework
Chanho Shin, Insup Lee, and Changhee Choi
IEEE Access 2023
[pdf]
(SCI 2023 Top 34.4% in Engineering, Electrical & Electronic)
|
|
[J2]
BAN: Predicting APT Attack Based on Bayesian Network With MITRE ATT&CK Framework
Youngjun Kim, Insup Lee, Hyuk Kwon, Gyeongsik Lee, and Jiwon Yoon
IEEE Access 2023
[pdf]
(SCI 2023 Top 34.4% in Engineering, Electrical & Electronic)
|
|
[J1]
UniQGAN: Unified Generative Adversarial Networks for Augmented Modulation Classification
Insup Lee and Wonjun Lee
IEEE Communications Letters 2022
[pdf]
(SCI 2023 Top 33.2% in Telecommunications)
|
|
[C3]
Encrypted Malware Traffic Detection Using Incremental Learning
Insup Lee, Heejun Roh, and Wonjun Lee
IEEE INFOCOM - Poster Session 2020
[pdf]
|
|
[C2]
Anomaly Dataset Augmentation Using Sequence Generative Models
Sunguk Shin, Insup Lee, and Changhee Choi
IEEE International Conference on Machine Learning and Applications (ICMLA) 2019
[pdf]
|
|
[C1]
Opcode Sequence Amplifier Using Sequence Generative Adversarial Networks
Changhee Choi, Sunguk Shin, and Insup Lee
International Conference on ICT Convergence (ICTC) 2019
[pdf]
|
Patents
-
Method for Augmentating Cyber Attack Campaign Data to Identify Attack Group, and Security System Performing Same
Changhee Choi and Insup Lee
Korea Patent Application Number. 10-2024-0176082, December 2, 2024.
-
Information Identification Method and Electronic Apparatus Thereof
Changhee Cho, Insup Lee, Chanho Shin, and Sungho Lee
Korea Patent Application Number. 10-2024-0006106, January 15, 2024.
-
Method for Training Attack Prediction Model and Device Therefor
Changhee Choi, Chanho Shin, Sunguk Shin, Seongyeon Seo, and Insup Lee
U.S. Patent Number. US20230308462A1, September 28, 2023.
-
Appratus, Method, Computer-readable Storage Medium and Computer Program for Generating Operation Code
Changhee Choi, Sunguk Shin, and Insup Lee
Korea Patent Number. 10-2246797, April 30, 2021.
Domestic Journals & Conferences (Korean)
- Hyunjun Park and Insup Lee, “Enhanced DDoS Detection via Traffic Volume-Based Labeling and Transfer Learning,” Journal of Internet Computing and Services (JICS), vol. 26, no. 4, pp. 1-8, Aug. 2025.
- Kangmun Kim and Insup Lee, “User Behavior Embedding via TF-IDF-BVC for Web Shell Detection,” Journal of The Korea Institute of Information Security & Cryptology (JKIISC), vol. 34, no. 6, pp. 1231-1238, Dec. 2024.
- Insup Lee, Chanho Shin, and Changhee Choi, “Mutating Cyber Camapaign With TTP Word Replacement,” in Proc. of the KIMST Annual Conference, Jun. 2023.
- Chanho Shin, Insup Lee, and Changhee Choi, “Towards GloVe-Based TTP Embedding With ATT&CK Framework,” in Proc. of the KIMST Annual Conference, Jun. 2023.
- Changhee Choi, Insup Lee, Chanho Shin, and Sungho Lee, “Cyber Threat Campaign Analysis Based on PEGASUS and RoBERTa Model,” in Proc. of the KIMST Annual Conference, Jun. 2023.
- Insup Lee, Chanho Shin, Sunguk Shin, Seongyeon Seo, and Changhee Choi, “Analyzing Cyberattack Campaign Similarity via TTP Sequence Embedding,” in Proc. of the KIMST Annual Conference, Jun. 2022.
- Sunguk Shin, Insup Lee, Chanho Shin, Seongyeon Seo, and Changhee Choi, “Cyber Campaign Analysis With TTP Embedding Using TF-IDF,” in Proc. of the KIMST Annual Conference, Jun. 2022.
- Chanho Shin, Sunguk Shin, Insup Lee, Seongyeon Seo, and Changhee Choi, “Classifying TTP Based on CIA Labeling,” in Proc. of the KIMST Annual Conference, Jun. 2022.
- Changhee Choi, Chanho Shin, Sunguk Shin, Seongyeon Seo, and Insup Lee, “Cyber Attack Group Classification Using Siamese LSTM,” in Proc. of the KIMST Annual Conference, Jun. 2022.
- Chanho Shin, Sunguk Shin, Seongyeon Seo, Insup Lee, and Changhee Choi, “Embedding and Training RNN to Estimating the Goal of Cyber Attack,” in Proc. of the KIMST Fall Conference, Nov. 2021.
- Sunguk Shin, Chanho Shin, Seongyeon Seo, Insup Lee, and Changhee Choi, “The Proposed Approach for Country Prediction With TTP-based Cyber Data Using GCN,” in Proc. of the KIMST Fall Conference, Nov. 2021.
- Changhee Choi, Chanho Shin, Sunguk Shin, Seongyeon Seo, and Insup Lee, “Deep Learning for Estimating Next Action of Cyber Attack,” in Proc. of the KIMST Fall Conference, Nov. 2021.
- Yongbin Park, Sunguk Shin, and Insup Lee, “A Study on Evaluation Method of NIDS Datasets in Closed Military Network,” Journal of Internet Computing and Services (JICS), vol. 21, no. 2, pp. 121-130, Apr. 2020.
- Insup Lee, Jingook Kim, and Jeongchan Park, “Analysis of Weight Setting in Incremental Learning to Improve Real-Time Intrusion Detection,” in Proc. of the KIMST Annual Conference, Jun. 2019.
|