Browse "CS-Journal Papers(저널논문)" by Author Kwon, Hyun

Showing results 1 to 18 of 18

1
Acoustic-decoy: Detection of adversarial examples through audio modification on speech recognition system

Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, NEUROCOMPUTING, v.417, pp.357 - 370, 2020-12

2
Advanced Ensemble Adversarial Example on Unknown Deep Neural Network Classifiers

Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; Yoon, Hyunsoo; Choi, Daeseon, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E101D, no.10, pp.2485 - 2500, 2018-10

3
CAPTCHA image generation systems using generative adversarial networks

Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E101D, no.2, pp.543 - 546, 2018-02

4
CAPTCHA Image Generation: Two-Step Style-Transfer Learning in Deep Neural Networks

Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, SENSORS, v.20, no.5, pp.1495, 2020-03

5
Classification Score Approach for Detecting Adversarial Example in Deep Neural Network

Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, MULTIMEDIA TOOLS AND APPLICATIONS, v.80, no.7, pp.10339 - 10360, 2021-03

6
Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants

Lee, Minsoo; Kwon, Hyun; Yoon, Hyunsoo, SECURITY AND COMMUNICATION NETWORKS, v.2022, 2022-01

7
Data Correction For Enhancing Classification Accuracy By Unknown Deep Neural Network Classifiers

Kwon, Hyun; Yoon, Hyunsoo; Choi, Daeseon, KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, v.15, no.9, pp.3243 - 3257, 2021-09

8
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier

Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; Yoon, Hyunsoo; Choi, Daeseon, COMPUTERS & SECURITY, v.78, pp.380 - 397, 2018-08

9
Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network

Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; Yoon, Hyunsoo; Choi, Daeseon, IEEE ACCESS, v.6, pp.46084 - 46096, 2018-08

10
Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks

Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.4, 2020-04

11
Optimal Cluster Expansion-Based Intrusion Tolerant System to Prevent Denial of Service Attacks

Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, APPLIED SCIENCES-BASEL, v.7, no.11, 2017-11

12
Random Untargeted Adversarial Example on Deep Neural Network

Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, SYMMETRY-BASEL, v.10, no.12, 2018-12

13
Restricted Evasion Attack: Generation of Restricted-Area Adversarial Example

Kwon, Hyun; Yoon, Hyunsoo; Choi, Daeseon, IEEE ACCESS, v.7, pp.60908 - 60919, 2019-05

14
Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods

Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.4, 2020-04

15
Rootkit inside GPU Kernel Execution

Kwon, Ohmin; Kwon, Hyun; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E102D, no.11, pp.2261 - 2264, 2019-11

16
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System

Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.15, pp.526 - 538, 2020-01

17
Selective Poisoning Attack on Deep Neural Networks

Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, SYMMETRY-BASEL, v.11, no.7, 2019-07

18
Selective Untargeted Evasion Attack: An Adversarial Example That Will Not Be Classified as Certain Avoided Classes

Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, IEEE ACCESS, v.7, pp.73493 - 73503, 2019-06

Discover

Type

Open Access

Date issued

. next

rss_1.0 rss_2.0 atom_1.0