Boosting the guessing attack performance on android lock patterns with smudge attacks S Cha, S Kwag, H Kim, JH Huh Proceedings of the 2017 ACM on Asia conference on computer and …, 2017 | 55 | 2017 |
ResMax: Detecting voice spoofing attacks with residual network and max feature map IY Kwak, S Kwag, J Lee, JH Huh, CH Lee, Y Jeon, J Hwang, JW Yoon 2020 25th International Conference on Pattern Recognition (ICPR), 4837-4844, 2021 | 23 | 2021 |
Voice spoofing detection through residual network, max feature map, and depthwise separable convolution IY Kwak, S Kwag, J Lee, Y Jeon, J Hwang, HJ Choi, JH Yang, SY Han, ... IEEE Access 11, 49140-49152, 2023 | 11 | 2023 |
Towards usable and secure location-based smartphone authentication G Cho, S Kwag, JH Huh, B Kim, CH Lee, H Kim Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 1-16, 2021 | 10 | 2021 |
On the long-term effects of continuous keystroke authentication: Keeping user frustration low through behavior adaptation JH Huh, S Kwag, I Kim, A Popov, Y Park, G Cho, J Lee, H Kim, CH Lee Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2023 | 3 | 2023 |