Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 1-10 of 10 (Search time: 0.004 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
1
Secure mobile device structure for trust IoT

Lee, Yun Kyung; Kim, J.-N.; Lim, K.-S.; Yoon, Hyunsoo, JOURNAL OF SUPERCOMPUTING, v.74, no.12, pp.6646 - 6664, 2018-12

2
Random Untargeted Adversarial Example on Deep Neural Network

Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, SYMMETRY-BASEL, v.10, no.12, 2018-12

3
Advanced Ensemble Adversarial Example on Unknown Deep Neural Network Classifiers

Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; Yoon, Hyunsoo; Choi, Daeseon, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E101D, no.10, pp.2485 - 2500, 2018-10

4
Efficient Approach for Mitigating Mobile Phishing Attacks

Lee, Hyungkyu; Lee, Younho; Seo, Changho; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E101B, no.9, pp.1982 - 1996, 2018-09

5
Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network

Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; Yoon, Hyunsoo; Choi, Daeseon, IEEE ACCESS, v.6, pp.46084 - 46096, 2018-08

6
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier

Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; Yoon, Hyunsoo; Choi, Daeseon, COMPUTERS & SECURITY, v.78, pp.380 - 397, 2018-08

7
Duo: Software Defined Intrusion Tolerant System Using Dual Cluster

Lee, Yongjae; Lee, Seunghyeon; Seo, Hyunmin; Yoon, Changhoon; Shin, Seungwon; Yoon, Hyunsoo, SECURITY AND COMMUNICATION NETWORKS, 2018-01

8
A Simple and Enriched Closed-Form Formula for Cell Residence Time in 5G Heterogeneous Networks

Jeong, Byung Jin; Kim, Namgi; Lee, Byoung-Dai; Yoon, Hyunsoo, WIRELESS PERSONAL COMMUNICATIONS, v.101, no.1, pp.491 - 509, 2018-07

9
CAPTCHA image generation systems using generative adversarial networks

Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E101D, no.2, pp.543 - 546, 2018-02

10
Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption

Kim, J.; Koo, D.; Kim, Y.; Yoon, Hyunsoo; Shin, J.; Kim, S., ACM TRANSACTIONS ON PRIVACY AND SECURITY, v.21, no.4, 2018-07

rss_1.0 rss_2.0 atom_1.0