Results 11-18 of 18 (Search time: 0.005 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.4, 2020-04 | |
Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.4, 2020-04 | |
Acoustic-decoy: Detection of adversarial examples through audio modification on speech recognition system Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, NEUROCOMPUTING, v.417, pp.357 - 370, 2020-12 | |
Classification Score Approach for Detecting Adversarial Example in Deep Neural Network Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, MULTIMEDIA TOOLS AND APPLICATIONS, v.80, no.7, pp.10339 - 10360, 2021-03 | |
Rootkit inside GPU Kernel Execution Kwon, Ohmin; Kwon, Hyun; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E102D, no.11, pp.2261 - 2264, 2019-11 | |
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.15, pp.526 - 538, 2020-01 | |
Data Correction For Enhancing Classification Accuracy By Unknown Deep Neural Network Classifiers Kwon, Hyun; Yoon, Hyunsoo; Choi, Daeseon, KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, v.15, no.9, pp.3243 - 3257, 2021-09 | |
Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants Lee, Minsoo; Kwon, Hyun; Yoon, Hyunsoo, SECURITY AND COMMUNICATION NETWORKS, v.2022, 2022-01 |
Discover