Publications

You can also find my articles on my Google Scholar profile.

Preprints / Under Review

  1. Who’s Behind the Code? Zero-/Few-Shot and Scalable Authorship Attribution via LLMs Soohyeon Choi and David Mohaisen Under review, IEEE Transactions on Dependable and Secure Computing (TDSC).

Journal and Conference Papers

  1. Security and Quality in LLM-Generated Code: A Multi-Language, Multi-Model Analysis Mohammed F. Kharma, Soohyeon Choi, Mohammad Alkhanafseh, and David Mohaisen IEEE Transactions on Dependable and Secure Computing (TDSC), 2026.

  2. A Comprehensive Analysis of Evolving Permission Usage in Android Apps: Trends, Threats, and Ecosystem Insights Ali Alkinoon, Trung Cuong Dang, Ahod Alghuried, Abdulaziz Alghamdi, Soohyeon Choi, Manar Mohaisen, An Wang, Saeed Salem, and David Mohaisen Journal of Cybersecurity and Privacy, 5(3), 2025.

  3. Attributing ChatGPT-Transformed Synthetic Code Soohyeon Choi, Ali Alkinoon, Ahod Alghuried, Abdulaziz Alghamdi, and David Mohaisen IEEE International Conference on Distributed Computing Systems (ICDCS), 2025.

  4. Fishing for Phishers: Learning-Based Phishing Detection in Ethereum Transactions Ahod Alghuried, Abdulaziz Alghamdi, Ali Alkinoon, Soohyeon Choi, K Alquonus, Manar Mohaisen, and David Mohaisen Distributed Ledger Technologies: Research and Practice (DLT), 2025.

  5. Evaluating the Vulnerability of ML-Based Ethereum Phishing Detectors to Single-Feature Adversarial Perturbations Ahod Alghuried, Ali Alkinoon, Abdulaziz Alghamdi, Soohyeon Choi, Manar Mohaisen, and David Mohaisen Distributed Ledger Technologies: Research and Practice (DLT), 2025.

  6. Attributing ChatGPT-Generated Source Codes Soohyeon Choi and David Mohaisen IEEE Transactions on Dependable and Secure Computing (TDSC), 22(4), 2025.

  7. I Can Find You in Seconds! Leveraging Large Language Models for Code Authorship Attribution Soohyeon Choi, Yong Kiam Tan, Mark Huasong Meng, Mohamed Ragab, Soumik Mondal, David Mohaisen, and Khin Mi Mi Aung arXiv preprint arXiv:2501.08165, 2025.

  8. Comprehensive Evaluation of Adversarial Perturbations against ML-Based Ethereum Phishing Detection Systems Ahod Alghuried, Ali Alkinoon, Abdulaziz Alghamdi, Soohyeon Choi, S Camarato, Manar Mohaisen, and David Mohaisen Distributed Ledger Technologies: Research and Practice (DLT), 2025.

  9. Authorship Attribution of AI-Generated Codes Soohyeon Choi 2025.

  10. Untargeted Code Authorship Evasion with Seq2Seq-based Code Transformation Soohyeon Choi, Rhongho Jang, Daehun Nyang, and David Mohaisen IEEE International Conference on Distributed Computing Systems (ICDCS), 2025.

  11. Unified API Call-Based Detection of Android and Internet of Things Malware Abdulaziz Alghamdi, Ali Alkinoon, Ahod Alghuried, Soohyeon Choi, Manar Mohaisen, and David Mohaisen Available on SSRN, 2025.

  12. Untargeted Code Authorship Evasion with Seq2Seq Transformation Soohyeon Choi, Rhongho Jang, Daehun Nyang, and David Mohaisen Computational Data and Social Networks: 12th International Conference (CSoNet), 2023.

  13. Revisiting the Deep Learning-based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors Soohyeon Choi, Manar Mohaisen, Daehun Nyang, and David Mohaisen International Conference on Information and Communications Security (ICICS), 2023.

  14. Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions Soohyeon Choi, Malwan Omar, Daehun Nyang, and David Mohaisen IEEE Access, 2022.

  15. Quantifying the Performance of Adversarial Training on Language Models with Distribution Shifts Soohyeon Choi, Malwan Omar, Daehun Nyang, and David Mohaisen Cybersecurity and Social Sciences (CySSS), 2022.

  16. Understanding the Security of Free Content Websites by Analyzing Their SSL Certificates: A Comparative Study Abdulrahman Alabduljabbar, Soohyeon Choi, Runyu Ma, Rhongho Jang, Songqing Chen, and David Mohaisen Cybersecurity and Social Sciences (CySSS), 2022.

  17. Improved Secure and Low Computation Authentication Protocol for Wireless Body Area Network with ECC and 2D Hash Chain Soohyeon Choi M.Sc. Thesis, South Dakota State University, 2021.

  18. Secure and Low Computation Authentication Protocol for Wireless Body Area Network with ECC and 2D Hash Chain Soohyeon Choi, Sangwon Shin, Xiaozhu Jin, and Sung Shin ACM International Conference on Research in Adaptive and Convergent Systems (RACS), 2020.

  19. Human Activity Recognition Based on Wearable Flex Sensor and Pulse Sensor Xiaozhu Jin, Soohyeon Choi, Sangwon Shin, and Sung Shin Asia Pacific International Conference on Information Science and Technology (APIC-IST), 2020.

  20. Preprocessed Symmetric RSA Authentication for Wireless Body Area Networks in Space Sangwon Shin, Soohyeon Choi, Kwanghee Won, and Sung Shin ACM International Conference on Research in Adaptive and Convergent Systems (RACS), 2019.

  21. Instance Segmentation in Urban Scenes Using Inverse Perspective Mapping of 3D Point Clouds and 2D Images Chungyup Lee, Soohyeon Choi, Jung Y. Kim, and Kwanghee Won ACM International Conference on Research in Adaptive and Convergent Systems (RACS), 2019.