Researcher Page

사진
Yoon, Hyunsoo (윤현수)
교수, School of Computing(전산학부)
Research Area
Computer Network and Information Security
Co-researchers
    Similar researchers

    Keyword Cloud

    Reload 더보기
    NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
    1
    Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System

    Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsooresearcher; et al, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.15, pp.526 - 538, 2020-01

    2
    Rootkit inside GPU Kernel Execution

    Kwon, Ohmin; Kwon, Hyun; Yoon, Hyunsooresearcher, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E102D, no.11, pp.2261 - 2264, 2019-11

    3
    A practical challenge-response authentication mechanism for a Programmable Logic Controller control system with one-time password in nuclear power plants

    Son, Junyoung; Noh, Sangkyun; Choi, JongGyun; et al, NUCLEAR ENGINEERING AND TECHNOLOGY, v.51, no.7, pp.1791 - 1798, 2019-10

    4
    Hybrid approach of parallel implementation on CPU-GPU for high-speed ECDSA verification

    Lee, Sokjoon; Seo, Hwajeong; Kwon, Hyeokchan; et al, JOURNAL OF SUPERCOMPUTING, v.75, no.8, pp.4329 - 4349, 2019-08

    5
    Selective Poisoning Attack on Deep Neural Networks

    Kwon, Hyun; Yoon, Hyunsooresearcher; Park, Ki-Woong, SYMMETRY-BASEL, v.11, no.7, 2019-07

    6
    Selective Untargeted Evasion Attack: An Adversarial Example That Will Not Be Classified as Certain Avoided Classes

    Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsooresearcher; et al, IEEE ACCESS, v.7, pp.73493 - 73503, 2019-06

    7
    New Complementary Points of Cyber Security Schemes for Critical Digital Assets at Nuclear Power Plants

    Son, Junyoung; Choi, Jonggyun; Yoon, Hyunsooresearcher, IEEE ACCESS, v.7, pp.78379 - 78390, 2019-06

    8
    Restricted Evasion Attack: Generation of Restricted-Area Adversarial Example

    Kwon, Hyun; Yoon, Hyunsooresearcher; Choi, Daeseon, IEEE ACCESS, v.7, pp.60908 - 60919, 2019-05

    9
    An efficient multi-path pipeline transmission for a bulk data transfer in IEEE 802.15.4 multi-hop networks

    Pyeon, Dohoo; Yoon, Hyunsooresearcher, WIRELESS NETWORKS, v.25, no.1, pp.117 - 130, 2019-01

    10
    Secure mobile device structure for trust IoT

    Lee, Yun Kyung; Kim, J.-N.; Lim, K.-S.; et al, JOURNAL OF SUPERCOMPUTING, v.74, no.12, pp.6646 - 6664, 2018-12

    11
    Random Untargeted Adversarial Example on Deep Neural Network

    Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsooresearcher; et al, SYMMETRY-BASEL, v.10, no.12, 2018-12

    12
    Advanced Ensemble Adversarial Example on Unknown Deep Neural Network Classifiers

    Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; et al, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E101D, no.10, pp.2485 - 2500, 2018-10

    13
    Efficient Approach for Mitigating Mobile Phishing Attacks

    Lee, Hyungkyu; Lee, Younho; Seo, Changho; et al, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E101B, no.9, pp.1982 - 1996, 2018-09

    14
    Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier

    Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; et al, COMPUTERS & SECURITY, v.78, pp.380 - 397, 2018-08

    15
    Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network

    Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; et al, IEEE ACCESS, v.6, pp.46084 - 46096, 2018-08

    16
    Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption

    Kim, J.; Koo, D.; Kim, Y.; et al, ACM TRANSACTIONS ON PRIVACY AND SECURITY, v.21, no.4, 2018-07

    17
    A Simple and Enriched Closed-Form Formula for Cell Residence Time in 5G Heterogeneous Networks

    Jeong, Byung Jin; Kim, Namgi; Lee, Byoung-Dai; et al, WIRELESS PERSONAL COMMUNICATIONS, v.101, no.1, pp.491 - 509, 2018-07

    18
    Evasion attack에 대한 인공지능 보안이슈

    권현; 윤현수researcher; 최대선, 정보과학회지, v.36, no.2, pp.32 - 36, 2018-02

    19
    CAPTCHA image generation systems using generative adversarial networks

    Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsooresearcher; et al, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E101D, no.2, pp.543 - 546, 2018-02

    20
    Duo: Software Defined Intrusion Tolerant System Using Dual Cluster

    Lee, Yongjae; Lee, Seunghyeon; Seo, Hyunmin; et al, SECURITY AND COMMUNICATION NETWORKS, 2018-01

    Load more items
    Loading...

    rss_1.0 rss_2.0 atom_1.0