Results 1-10 of 10 (Search time: 0.004 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Secure mobile device structure for trust IoT Lee, Yun Kyung; Kim, J.-N.; Lim, K.-S.; Yoon, Hyunsoo, JOURNAL OF SUPERCOMPUTING, v.74, no.12, pp.6646 - 6664, 2018-12 | |
Random Untargeted Adversarial Example on Deep Neural Network Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, SYMMETRY-BASEL, v.10, no.12, 2018-12 | |
Advanced Ensemble Adversarial Example on Unknown Deep Neural Network Classifiers Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; Yoon, Hyunsoo; Choi, Daeseon, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E101D, no.10, pp.2485 - 2500, 2018-10 | |
Efficient Approach for Mitigating Mobile Phishing Attacks Lee, Hyungkyu; Lee, Younho; Seo, Changho; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E101B, no.9, pp.1982 - 1996, 2018-09 | |
Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; Yoon, Hyunsoo; Choi, Daeseon, IEEE ACCESS, v.6, pp.46084 - 46096, 2018-08 | |
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; Yoon, Hyunsoo; Choi, Daeseon, COMPUTERS & SECURITY, v.78, pp.380 - 397, 2018-08 | |
Duo: Software Defined Intrusion Tolerant System Using Dual Cluster![]() Lee, Yongjae; Lee, Seunghyeon; Seo, Hyunmin; Yoon, Changhoon; Shin, Seungwon; Yoon, Hyunsoo, SECURITY AND COMMUNICATION NETWORKS, 2018-01 | |
A Simple and Enriched Closed-Form Formula for Cell Residence Time in 5G Heterogeneous Networks Jeong, Byung Jin; Kim, Namgi; Lee, Byoung-Dai; Yoon, Hyunsoo, WIRELESS PERSONAL COMMUNICATIONS, v.101, no.1, pp.491 - 509, 2018-07 | |
CAPTCHA image generation systems using generative adversarial networks Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E101D, no.2, pp.543 - 546, 2018-02 | |
Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption Kim, J.; Koo, D.; Kim, Y.; Yoon, Hyunsoo; Shin, J.; Kim, S., ACM TRANSACTIONS ON PRIVACY AND SECURITY, v.21, no.4, 2018-07 |
Discover