Learn2Evade: Learning-based generative model for evading PDF malware classifiers H Bae, Y Lee, Y Kim, U Hwang, S Yoon, Y Paek IEEE Transactions on Artificial Intelligence 2 (4), 299-313, 2021 | 14 | 2021 |
Hawkware: Network intrusion detection based on behavior analysis with ANNs on an IoT device S Ahn, H Yi, Y Lee, WR Ha, G Kim, Y Paek 2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020 | 14 | 2020 |
Riskim: Toward complete kernel protection with hardware support D Hwang, M Yang, S Jeon, Y Lee, D Kwon, Y Paek 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 740-745, 2019 | 9 | 2019 |
Mimicry resilient program behavior modeling with LSTM based branch models H Yi, G Kim, J Lee, S Ahn, Y Lee, S Yoon, Y Paek arXiv preprint arXiv:1803.09171, 2018 | 8 | 2018 |
Precise extraction of deep learning models via side-channel attacks on edge/endpoint devices Y Lee, S Jun, Y Cho, W Han, H Moon, Y Paek European Symposium on Research in Computer Security, 364-383, 2022 | 3 | 2022 |
Exploring Clustered Federated Learning’s Vulnerability against Property Inference Attack H Kim, Y Cho, Y Lee, H Bae, Y Paek Proceedings of the 26th International Symposium on Research in Attacks …, 2023 | 2 | 2023 |
FLGuard: Byzantine-Robust Federated Learning via Ensemble of Contrastive Models Y Lee, Y Cho, W Han, H Bae, Y Paek European Symposium on Research in Computer Security, 65-84, 2023 | 1 | 2023 |
A Pilot Study of Machine Learning–Based Algorithms to Assist Integrated Care for Older Community-Dwelling Adults S Im Ryu, Y Lee, S Jun, Y Paek, H Kim, BL Cho, YH Park CIN: Computers, Informatics, Nursing 40 (10), 718-724, 2022 | | 2022 |