Researcher Page

사진
Yoon, Hyunsoo (윤현수)
교수, School of Computing(전산학부)
Research Area
Computer Network and Information Security
Co-researchers
    Similar researchers

    Keyword Cloud

    Reload 더보기
    NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
    1
    Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods

    Kwon, Hyun; Yoon, Hyunsooresearcher; Park, Ki-Woong, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.4, 2020-04

    2
    Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks

    Kwon, Hyun; Yoon, Hyunsooresearcher; Park, Ki-Woong, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.4, 2020-04

    3
    CAPTCHA Image Generation: Two-Step Style-Transfer Learning in Deep Neural Networks

    Kwon, Hyun; Yoon, Hyunsooresearcher; Park, Ki-Woong, SENSORS, v.20, no.5, pp.1495, 2020-03

    4
    Multipath transmission control protocol-based multi-access traffic steering solution for 5G multimedia-centric network: Design and testbed system implementation

    Kang, Yoohwa; Kim, Changki; An, Donghyeok; et al, INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, v.16, no.2, 2020-02

    5
    Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System

    Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsooresearcher; et al, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.15, pp.526 - 538, 2020-01

    6
    Rootkit inside GPU Kernel Execution

    Kwon, Ohmin; Kwon, Hyun; Yoon, Hyunsooresearcher, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E102D, no.11, pp.2261 - 2264, 2019-11

    7
    A practical challenge-response authentication mechanism for a Programmable Logic Controller control system with one-time password in nuclear power plants

    Son, Junyoung; Noh, Sangkyun; Choi, JongGyun; et al, NUCLEAR ENGINEERING AND TECHNOLOGY, v.51, no.7, pp.1791 - 1798, 2019-10

    8
    Hybrid approach of parallel implementation on CPU-GPU for high-speed ECDSA verification

    Lee, Sokjoon; Seo, Hwajeong; Kwon, Hyeokchan; et al, JOURNAL OF SUPERCOMPUTING, v.75, no.8, pp.4329 - 4349, 2019-08

    9
    Selective Poisoning Attack on Deep Neural Networks

    Kwon, Hyun; Yoon, Hyunsooresearcher; Park, Ki-Woong, SYMMETRY-BASEL, v.11, no.7, 2019-07

    10
    New Complementary Points of Cyber Security Schemes for Critical Digital Assets at Nuclear Power Plants

    Son, Junyoung; Choi, Jonggyun; Yoon, Hyunsooresearcher, IEEE ACCESS, v.7, pp.78379 - 78390, 2019-06

    11
    Selective Untargeted Evasion Attack: An Adversarial Example That Will Not Be Classified as Certain Avoided Classes

    Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsooresearcher; et al, IEEE ACCESS, v.7, pp.73493 - 73503, 2019-06

    12
    Restricted Evasion Attack: Generation of Restricted-Area Adversarial Example

    Kwon, Hyun; Yoon, Hyunsooresearcher; Choi, Daeseon, IEEE ACCESS, v.7, pp.60908 - 60919, 2019-05

    13
    An efficient multi-path pipeline transmission for a bulk data transfer in IEEE 802.15.4 multi-hop networks

    Pyeon, Dohoo; Yoon, Hyunsooresearcher, WIRELESS NETWORKS, v.25, no.1, pp.117 - 130, 2019-01

    14
    Random Untargeted Adversarial Example on Deep Neural Network

    Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsooresearcher; et al, SYMMETRY-BASEL, v.10, no.12, 2018-12

    15
    Secure mobile device structure for trust IoT

    Lee, Yun Kyung; Kim, J.-N.; Lim, K.-S.; et al, JOURNAL OF SUPERCOMPUTING, v.74, no.12, pp.6646 - 6664, 2018-12

    16
    Advanced Ensemble Adversarial Example on Unknown Deep Neural Network Classifiers

    Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; et al, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E101D, no.10, pp.2485 - 2500, 2018-10

    17
    Efficient Approach for Mitigating Mobile Phishing Attacks

    Lee, Hyungkyu; Lee, Younho; Seo, Changho; et al, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E101B, no.9, pp.1982 - 1996, 2018-09

    18
    Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network

    Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; et al, IEEE ACCESS, v.6, pp.46084 - 46096, 2018-08

    19
    Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier

    Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; et al, COMPUTERS & SECURITY, v.78, pp.380 - 397, 2018-08

    20
    Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption

    Kim, J.; Koo, D.; Kim, Y.; et al, ACM TRANSACTIONS ON PRIVACY AND SECURITY, v.21, no.4, 2018-07

    Load more items
    Loading...

    rss_1.0 rss_2.0 atom_1.0