Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 1-6 of 6 (Search time: 0.005 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
1
Restricted Evasion Attack: Generation of Restricted-Area Adversarial Example

Kwon, Hyun; Yoon, Hyunsoo; Choi, Daeseon, IEEE ACCESS, v.7, pp.60908 - 60919, 2019-05

2
New Complementary Points of Cyber Security Schemes for Critical Digital Assets at Nuclear Power Plants

Son, Junyoung; Choi, Jonggyun; Yoon, Hyunsoo, IEEE ACCESS, v.7, pp.78379 - 78390, 2019-06

3
Selective Untargeted Evasion Attack: An Adversarial Example That Will Not Be Classified as Certain Avoided Classes

Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, IEEE ACCESS, v.7, pp.73493 - 73503, 2019-06

4
A practical challenge-response authentication mechanism for a Programmable Logic Controller control system with one-time password in nuclear power plants

Son, Junyoung; Noh, Sangkyun; Choi, JongGyun; Yoon, Hyunsoo, NUCLEAR ENGINEERING AND TECHNOLOGY, v.51, no.7, pp.1791 - 1798, 2019-10

5
Selective Poisoning Attack on Deep Neural Networks

Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, SYMMETRY-BASEL, v.11, no.7, 2019-07

6
Rootkit inside GPU Kernel Execution

Kwon, Ohmin; Kwon, Hyun; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E102D, no.11, pp.2261 - 2264, 2019-11

rss_1.0 rss_2.0 atom_1.0