Researcher Page

사진
Yoon, Hyunsoo (윤현수)
교수, School of Computing(전산학부)
Research Area
Computer Network and Information Security
Co-researchers
    Similar researchers

    Keyword Cloud

    Reload 더보기
    NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) Altmetrics
    1
    Article
    A practical challenge-response authentication mechanism for a Programmable Logic Controller control system with one-time password in nuclear power plants

    Son, Junyoung; Noh, Sangkyun; Choi, JongGyun; et al, NUCLEAR ENGINEERING AND TECHNOLOGY, v.51, no.7, pp.1791 - 1798, 2019-10

    2
    Article
    Hybrid approach of parallel implementation on CPU-GPU for high-speed ECDSA verification

    Lee, Sokjoon; Seo, Hwajeong; Kwon, Hyeokchan; et al, JOURNAL OF SUPERCOMPUTING, v.75, no.8, pp.4329 - 4349, 2019-08

    3
    Article
    Selective Poisoning Attack on Deep Neural Networks

    Kwon, Hyun; Yoon, Hyunsooresearcher; Park, Ki-Woong, SYMMETRY-BASEL, v.11, no.7, 2019-07

    4
    Article
    New Complementary Points of Cyber Security Schemes for Critical Digital Assets at Nuclear Power Plants

    Son, Junyoung; Choi, Jonggyun; Yoon, Hyunsooresearcher, IEEE ACCESS, v.7, pp.78379 - 78390, 2019-06

    5
    Article
    Selective Untargeted Evasion Attack: An Adversarial Example That Will Not Be Classified as Certain Avoided Classes

    Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsooresearcher; et al, IEEE ACCESS, v.7, pp.73493 - 73503, 2019-06

    6
    Article
    Restricted Evasion Attack: Generation of Restricted-Area Adversarial Example

    Kwon, Hyun; Yoon, Hyunsooresearcher; Choi, Daeseon, IEEE ACCESS, v.7, pp.60908 - 60919, 2019-05

    7
    Article
    An efficient multi-path pipeline transmission for a bulk data transfer in IEEE 802.15.4 multi-hop networks

    Pyeon, Dohoo; Yoon, Hyunsooresearcher, WIRELESS NETWORKS, v.25, no.1, pp.117 - 130, 2019-01

    8
    Article
    Secure mobile device structure for trust IoT

    Lee, Yun Kyung; Kim, J.-N.; Lim, K.-S.; et al, JOURNAL OF SUPERCOMPUTING, v.74, no.12, pp.6646 - 6664, 2018-12

    9
    Article
    Random Untargeted Adversarial Example on Deep Neural Network

    Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsooresearcher; et al, SYMMETRY-BASEL, v.10, no.12, 2018-12

    10
    Article
    Advanced Ensemble Adversarial Example on Unknown Deep Neural Network Classifiers

    Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; et al, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E101D, no.10, pp.2485 - 2500, 2018-10

    11
    Article
    Efficient Approach for Mitigating Mobile Phishing Attacks

    Lee, Hyungkyu; Lee, Younho; Seo, Changho; et al, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E101B, no.9, pp.1982 - 1996, 2018-09

    12
    Article
    Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network

    Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; et al, IEEE ACCESS, v.6, pp.46084 - 46096, 2018-08

    13
    Article
    Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier

    Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; et al, COMPUTERS & SECURITY, v.78, pp.380 - 397, 2018-08

    14
    Article
    Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption

    Kim, J.; Koo, D.; Kim, Y.; et al, ACM TRANSACTIONS ON PRIVACY AND SECURITY, v.21, no.4, 2018-07

    15
    Article
    A Simple and Enriched Closed-Form Formula for Cell Residence Time in 5G Heterogeneous Networks

    Jeong, Byung Jin; Kim, Namgi; Lee, Byoung-Dai; et al, WIRELESS PERSONAL COMMUNICATIONS, v.101, no.1, pp.491 - 509, 2018-07

    16
    Article
    Evasion attack에 대한 인공지능 보안이슈

    권현; 윤현수researcher; 최대선, 정보과학회지, v.36, no.2, pp.32 - 36, 2018-02

    17
    Article
    CAPTCHA image generation systems using generative adversarial networks

    Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsooresearcher; et al, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E101D, no.2, pp.543 - 546, 2018-02

    18
    Article
    Duo: Software Defined Intrusion Tolerant System Using Dual Cluster

    Lee, Yongjae; Lee, Seunghyeon; Seo, Hyunmin; et al, SECURITY AND COMMUNICATION NETWORKS, 2018-01

    19
    Article
    Optimal Cluster Expansion-Based Intrusion Tolerant System to Prevent Denial of Service Attacks

    Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsooresearcher; et al, APPLIED SCIENCES-BASEL, v.7, no.11, 2017-11

    20
    Article
    Designing and Implementing a Diversity Policy for Intrusion-Tolerant Systems

    Heo, Seon Dong; Lee, Soojin; Jang, Bum Soon; et al, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E100D, no.1, pp.118 - 129, 2017-01

    Load more items
    Loading...

    rss_1.0 rss_2.0 atom_1.0