Researcher Page

사진
Yoon, Hyunsoo (윤현수)
교수, School of Computing(전산학부)
Research Area
Computer Network and Information Security
Co-researchers
    Similar researchers

    Keyword Cloud

    Reload 더보기
    NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
    1
    Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants

    Lee, Minsoo; Kwon, Hyun; Yoon, Hyunsooresearcher, SECURITY AND COMMUNICATION NETWORKS, v.2022, 2022-01

    2
    Data Correction For Enhancing Classification Accuracy By Unknown Deep Neural Network Classifiers

    Kwon, Hyun; Yoon, Hyunsooresearcher; Choi, Daeseon, KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, v.15, no.9, pp.3243 - 3257, 2021-09

    3
    ZeroKernel: Secure Context-isolated Execution on Commodity GPUs

    Kwon, Ohmin; Kim, Yonggon; Huh, Jaehyukresearcher; et al, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.18, no.4, pp.1974 - 1988, 2021-07

    4
    Mind control attack: Undermining deep learning with GPU memory exploitation

    Park, Sang-Ok; Kwon, Ohmin; Kim, Yonggon; et al, COMPUTERS & SECURITY, v.102, 2021-03

    5
    Classification Score Approach for Detecting Adversarial Example in Deep Neural Network

    Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsooresearcher; et al, MULTIMEDIA TOOLS AND APPLICATIONS, v.80, no.7, pp.10339 - 10360, 2021-03

    6
    딥뉴럴네트워크 기반의 흡연 탐지기법 설계

    이상현; 윤현수researcher; 권현, 융합보안 논문지, v.21, no.1, pp.191 - 200, 2021

    7
    Acoustic-decoy: Detection of adversarial examples through audio modification on speech recognition system

    Kwon, Hyun; Yoon, Hyunsooresearcher; Park, Ki-Woong, NEUROCOMPUTING, v.417, pp.357 - 370, 2020-12

    8
    Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks

    Kwon, Hyun; Yoon, Hyunsooresearcher; Park, Ki-Woong, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.4, 2020-04

    9
    Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods

    Kwon, Hyun; Yoon, Hyunsooresearcher; Park, Ki-Woong, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.4, 2020-04

    10
    CAPTCHA Image Generation: Two-Step Style-Transfer Learning in Deep Neural Networks

    Kwon, Hyun; Yoon, Hyunsooresearcher; Park, Ki-Woong, SENSORS, v.20, no.5, pp.1495, 2020-03

    11
    Multipath transmission control protocol-based multi-access traffic steering solution for 5G multimedia-centric network: Design and testbed system implementation

    Kang, Yoohwa; Kim, Changki; An, Donghyeok; et al, INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, v.16, no.2, 2020-02

    12
    Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System

    Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsooresearcher; et al, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.15, pp.526 - 538, 2020-01

    13
    Rootkit inside GPU Kernel Execution

    Kwon, Ohmin; Kwon, Hyun; Yoon, Hyunsooresearcher, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E102D, no.11, pp.2261 - 2264, 2019-11

    14
    A practical challenge-response authentication mechanism for a Programmable Logic Controller control system with one-time password in nuclear power plants

    Son, Junyoung; Noh, Sangkyun; Choi, JongGyun; et al, NUCLEAR ENGINEERING AND TECHNOLOGY, v.51, no.7, pp.1791 - 1798, 2019-10

    15
    Hybrid approach of parallel implementation on CPU-GPU for high-speed ECDSA verification

    Lee, Sokjoon; Seo, Hwajeong; Kwon, Hyeokchan; et al, JOURNAL OF SUPERCOMPUTING, v.75, no.8, pp.4329 - 4349, 2019-08

    16
    Selective Poisoning Attack on Deep Neural Networks

    Kwon, Hyun; Yoon, Hyunsooresearcher; Park, Ki-Woong, SYMMETRY-BASEL, v.11, no.7, 2019-07

    17
    New Complementary Points of Cyber Security Schemes for Critical Digital Assets at Nuclear Power Plants

    Son, Junyoung; Choi, Jonggyun; Yoon, Hyunsooresearcher, IEEE ACCESS, v.7, pp.78379 - 78390, 2019-06

    18
    Selective Untargeted Evasion Attack: An Adversarial Example That Will Not Be Classified as Certain Avoided Classes

    Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsooresearcher; et al, IEEE ACCESS, v.7, pp.73493 - 73503, 2019-06

    19
    Restricted Evasion Attack: Generation of Restricted-Area Adversarial Example

    Kwon, Hyun; Yoon, Hyunsooresearcher; Choi, Daeseon, IEEE ACCESS, v.7, pp.60908 - 60919, 2019-05

    20
    An efficient multi-path pipeline transmission for a bulk data transfer in IEEE 802.15.4 multi-hop networks

    Pyeon, Dohoo; Yoon, Hyunsooresearcher, WIRELESS NETWORKS, v.25, no.1, pp.117 - 130, 2019-01

    Load more items
    Loading...

    rss_1.0 rss_2.0 atom_1.0