Showing results 1 to 18 of 18
Acoustic-decoy: Detection of adversarial examples through audio modification on speech recognition system![]() Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, NEUROCOMPUTING, v.417, pp.357 - 370, 2020-12 |
Advanced Ensemble Adversarial Example on Unknown Deep Neural Network Classifiers Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; Yoon, Hyunsoo; Choi, Daeseon, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E101D, no.10, pp.2485 - 2500, 2018-10 |
CAPTCHA image generation systems using generative adversarial networks Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E101D, no.2, pp.543 - 546, 2018-02 |
CAPTCHA Image Generation: Two-Step Style-Transfer Learning in Deep Neural Networks![]() Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, SENSORS, v.20, no.5, pp.1495, 2020-03 |
Classification Score Approach for Detecting Adversarial Example in Deep Neural Network![]() Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, MULTIMEDIA TOOLS AND APPLICATIONS, v.80, no.7, pp.10339 - 10360, 2021-03 |
Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants Lee, Minsoo; Kwon, Hyun; Yoon, Hyunsoo, SECURITY AND COMMUNICATION NETWORKS, v.2022, 2022-01 |
Data Correction For Enhancing Classification Accuracy By Unknown Deep Neural Network Classifiers Kwon, Hyun; Yoon, Hyunsoo; Choi, Daeseon, KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, v.15, no.9, pp.3243 - 3257, 2021-09 |
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; Yoon, Hyunsoo; Choi, Daeseon, COMPUTERS & SECURITY, v.78, pp.380 - 397, 2018-08 |
Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; Yoon, Hyunsoo; Choi, Daeseon, IEEE ACCESS, v.6, pp.46084 - 46096, 2018-08 |
Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.4, 2020-04 |
Optimal Cluster Expansion-Based Intrusion Tolerant System to Prevent Denial of Service Attacks![]() Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, APPLIED SCIENCES-BASEL, v.7, no.11, 2017-11 |
Random Untargeted Adversarial Example on Deep Neural Network Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, SYMMETRY-BASEL, v.10, no.12, 2018-12 |
Restricted Evasion Attack: Generation of Restricted-Area Adversarial Example![]() Kwon, Hyun; Yoon, Hyunsoo; Choi, Daeseon, IEEE ACCESS, v.7, pp.60908 - 60919, 2019-05 |
Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.4, 2020-04 |
Rootkit inside GPU Kernel Execution![]() Kwon, Ohmin; Kwon, Hyun; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E102D, no.11, pp.2261 - 2264, 2019-11 |
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.15, pp.526 - 538, 2020-01 |
Selective Poisoning Attack on Deep Neural Networks![]() Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, SYMMETRY-BASEL, v.11, no.7, 2019-07 |
Selective Untargeted Evasion Attack: An Adversarial Example That Will Not Be Classified as Certain Avoided Classes![]() Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, IEEE ACCESS, v.7, pp.73493 - 73503, 2019-06 |
Discover