Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 11-18 of 18 (Search time: 0.005 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
11
Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods

Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.4, 2020-04

12
Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks

Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.4, 2020-04

13
Acoustic-decoy: Detection of adversarial examples through audio modification on speech recognition system

Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, NEUROCOMPUTING, v.417, pp.357 - 370, 2020-12

14
Classification Score Approach for Detecting Adversarial Example in Deep Neural Network

Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, MULTIMEDIA TOOLS AND APPLICATIONS, v.80, no.7, pp.10339 - 10360, 2021-03

15
Rootkit inside GPU Kernel Execution

Kwon, Ohmin; Kwon, Hyun; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E102D, no.11, pp.2261 - 2264, 2019-11

16
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System

Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.15, pp.526 - 538, 2020-01

17
Data Correction For Enhancing Classification Accuracy By Unknown Deep Neural Network Classifiers

Kwon, Hyun; Yoon, Hyunsoo; Choi, Daeseon, KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, v.15, no.9, pp.3243 - 3257, 2021-09

18
Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants

Lee, Minsoo; Kwon, Hyun; Yoon, Hyunsoo, SECURITY AND COMMUNICATION NETWORKS, v.2022, 2022-01

rss_1.0 rss_2.0 atom_1.0