Heejo Lee

5.9k total citations · 2 hit papers
123 papers, 3.9k citations indexed

About

Heejo Lee is a scholar working on Computer Networks and Communications, Artificial Intelligence and Signal Processing. According to data from OpenAlex, Heejo Lee has authored 123 papers receiving a total of 3.9k indexed citations (citations by other indexed papers that have themselves been cited), including 85 papers in Computer Networks and Communications, 46 papers in Artificial Intelligence and 44 papers in Signal Processing. Recurrent topics in Heejo Lee's work include Network Security and Intrusion Detection (49 papers), Advanced Malware Detection Techniques (40 papers) and Internet Traffic Analysis and Secure E-voting (31 papers). Heejo Lee is often cited by papers focused on Network Security and Intrusion Detection (49 papers), Advanced Malware Detection Techniques (40 papers) and Internet Traffic Analysis and Secure E-voting (31 papers). Heejo Lee collaborates with scholars based in South Korea, United States and Switzerland. Heejo Lee's co-authors include Ki‐Hong Park, Adrian Perrig, Hyun-Sang Choi, Bruno Sinopoli, Yilin Mo, Tiffany Hyun‐Jin Kim, Hyogon Kim, Hakjoo Oh, Seulbae Kim and Seunghoon Woo and has published in prestigious journals such as SHILAP Revista de lepidopterología, Proceedings of the IEEE and IEEE Access.

In The Last Decade

Heejo Lee

114 papers receiving 3.6k citations

Hit Papers

Cyber–Physical Security o... 2011 2026 2016 2021 2011 2017 250 500 750

Author Peers

Peers are selected by citation overlap in the author's most active subfields. citations · hero ref

Author Last Decade Papers Cites
Heejo Lee 2.8k 1.6k 1.2k 1.0k 777 123 3.9k
Ehab Al‐Shaer 3.5k 1.2× 1.7k 1.1× 861 0.7× 1.1k 1.1× 466 0.6× 206 4.3k
Karl Levitt 3.2k 1.1× 1.9k 1.2× 1.5k 1.2× 1.1k 1.0× 375 0.5× 123 4.7k
Angelos Stavrou 3.2k 1.1× 2.1k 1.3× 2.3k 1.8× 1.5k 1.4× 264 0.3× 175 4.5k
Sakir Sezer 3.5k 1.2× 1.1k 0.7× 2.0k 1.6× 1.3k 1.2× 736 0.9× 97 4.3k
Dan Pei 5.0k 1.8× 3.4k 2.1× 1.0k 0.8× 996 1.0× 352 0.5× 212 6.1k
Raheem Beyah 1.6k 0.6× 1.3k 0.8× 793 0.6× 794 0.8× 348 0.4× 181 3.1k
Mohammad Zulkernine 1.7k 0.6× 1.4k 0.9× 984 0.8× 1.1k 1.1× 167 0.2× 173 2.8k
Asaf Shabtai 2.8k 1.0× 1.8k 1.1× 2.5k 2.0× 1.6k 1.5× 394 0.5× 169 4.4k
Dongyan Xu 3.8k 1.3× 2.1k 1.3× 2.2k 1.7× 2.2k 2.2× 184 0.2× 200 5.4k
Avishai Wool 2.3k 0.8× 1.2k 0.7× 475 0.4× 644 0.6× 385 0.5× 102 3.2k

Countries citing papers authored by Heejo Lee

Since Specialization
Citations

This map shows the geographic impact of Heejo Lee's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Heejo Lee with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Heejo Lee more than expected).

Fields of papers citing papers by Heejo Lee

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Heejo Lee. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Heejo Lee. The network helps show where Heejo Lee may publish in the future.

Co-authorship network of co-authors of Heejo Lee

This figure shows the co-authorship network connecting the top 25 collaborators of Heejo Lee. A scholar is included among the top collaborators of Heejo Lee based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Heejo Lee. Heejo Lee is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Woo, Seunghoon, Eun‐Jin Choi, & Heejo Lee. (2024). A large-scale analysis of the effectiveness of publicly reported security patches. Computers & Security. 148. 104181–104181. 1 indexed citations
3.
Woo, Seunghoon, et al.. (2022). xVDB: A High-Coverage Approach for Constructing a Vulnerability Database. IEEE Access. 10. 85050–85063. 5 indexed citations
4.
Woo, Seunghoon, et al.. (2022). Circuit: A JavaScript Memory Heap-Based Approach for Precisely Detecting Cryptojacking Websites. IEEE Access. 10. 95356–95368. 2 indexed citations
5.
Kim, Yong‐Hyun, et al.. (2020). Automated Cyber Threat Emulation Based on ATT&CK for Cyber Security Training. Journal of the Korea Society of Computer and Information. 25(9). 71–80. 5 indexed citations
6.
Kim, Seulbae, Seunghoon Woo, Heejo Lee, & Hakjoo Oh. (2017). VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery. 595–614. 226 indexed citations breakdown →
7.
Lee, Heejo, et al.. (2016). An Automated Technique for Illegal Site Detection using the Sequence of HTML Tags. Journal of KIISE. 43(10). 1173–1178. 1 indexed citations
8.
Kim, Seulbae, et al.. (2016). SIGMATA: Storage Integrity Guaranteeing Mechanism against Tampering Attempts for Video Event Data Recorders. SHILAP Revista de lepidopterología. 2 indexed citations
9.
Lee, Heejo, et al.. (2016). FassKey: A secure and convenient authentication system. 489–495.
10.
Park, Hyundo, et al.. (2016). Entropy analysis to classify unknown packing algorithms for malware detection. International Journal of Information Security. 16(3). 227–248. 40 indexed citations
11.
Kwon, Jonghoon, et al.. (2015). An incrementally deployable anti-spoofing mechanism for software-defined networks. Computer Communications. 64. 1–20. 17 indexed citations
12.
Kim, Yongdae, Heejo Lee, & Adrian Perrig. (2014). Information security applications : 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013 : revised selected papers. DIAL (Catholic University of Leuven). 4 indexed citations
13.
Kwon, Jonghoon, Je-Hyun Lee, Hyun-Cheol Jeong, & Heejo Lee. (2011). Metamorphic Malware Detection using Subgraph Matching. Information Security and Cryptology. 21(2). 37–47. 1 indexed citations
14.
Kim, Hyogon, et al.. (2011). Minimum-Energy Semi-Static Scheduling of a Periodic Real-Time Task on DVFS-Enabled Multi-Core Processors. IEICE Transactions on Information and Systems. E94-D(12). 2389–2392. 1 indexed citations
15.
Lee, Heejo, et al.. (2010). Generic unpacking using entropy analysis. 98–105. 27 indexed citations
16.
Lee, Je-Hyun, Heejo Lee, & Hoh Peter In. (2009). Scalable attack graph for risk assessment. 78–82. 13 indexed citations
17.
Lee, Heejo, et al.. (2009). Dynamic multimedia scheduling against Motion based DoS attacks. 200–204. 1 indexed citations
18.
Choi, Hyun-Sang, et al.. (2007). Botnet Detection by Monitoring Group Activities in DNS Traffic. 715–720. 170 indexed citations
19.
Choi, Hyun-Sang & Heejo Lee. (2005). PCAV: Parallel Coordinates Attack Visualizer. 130–132. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026