Results 1-6 of 6 (Search time: 0.005 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Restricted Evasion Attack: Generation of Restricted-Area Adversarial Example Kwon, Hyun; Yoon, Hyunsoo; Choi, Daeseon, IEEE ACCESS, v.7, pp.60908 - 60919, 2019-05 | |
New Complementary Points of Cyber Security Schemes for Critical Digital Assets at Nuclear Power Plants Son, Junyoung; Choi, Jonggyun; Yoon, Hyunsoo, IEEE ACCESS, v.7, pp.78379 - 78390, 2019-06 | |
Selective Untargeted Evasion Attack: An Adversarial Example That Will Not Be Classified as Certain Avoided Classes Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, IEEE ACCESS, v.7, pp.73493 - 73503, 2019-06 | |
A practical challenge-response authentication mechanism for a Programmable Logic Controller control system with one-time password in nuclear power plants Son, Junyoung; Noh, Sangkyun; Choi, JongGyun; Yoon, Hyunsoo, NUCLEAR ENGINEERING AND TECHNOLOGY, v.51, no.7, pp.1791 - 1798, 2019-10 | |
Selective Poisoning Attack on Deep Neural Networks Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, SYMMETRY-BASEL, v.11, no.7, 2019-07 | |
Rootkit inside GPU Kernel Execution Kwon, Ohmin; Kwon, Hyun; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E102D, no.11, pp.2261 - 2264, 2019-11 |
Discover