Showing results 1 to 5 of 5
Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks Lee, Suyoung; Song, Wonho; Jana, Suman; Cha, Meeyoung; Son, Sooel, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.20, no.4, pp.3434 - 3448, 2023-07 |
FuzzDocs: An Automated Security Evaluation Framework for IoT You, Myoungsung; Kim, Yeonkeun; Kim, Jaehan; Seo, Minjae; Son, Sooel; Shin, Seungwon; Lee, Seungsoo, IEEE ACCESS, v.10, no.0, pp.102406 - 102420, 2022-09 |
Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned Kim, Dongkwan; Kim, Eunsoo; Cha, Sang Kil; Son, Sooel; Kim, Yongdae, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, v.49, no.4, pp.1661 - 1682, 2023-04 |
RoleCast: Finding Missing Security Checks When You Do Not Know What Checks Are Son, Sooel; McKinley, Kathryn S.; Shmatikov, Vitaly, ACM SIGPLAN NOTICES, v.46, no.10, pp.1069 - 1083, 2011-10 |
Scalable and Secure Virtualization of HSM With ScaleTrust Han, Juhyeng; Yun, Insu; Kim, Seongmin; Kim, Taesoo; Son, Sooel; Han, Dongsu, IEEE-ACM TRANSACTIONS ON NETWORKING, v.31, no.4, pp.1595 - 1610, 2023-08 |
Discover