关注
Seok-Hwan Choi
Seok-Hwan Choi
其他姓名최 석환
부산대학교
在 pusan.ac.kr 的电子邮件经过验证
标题
引用次数
引用次数
年份
CodeNet: Code-targeted convolutional neural network architecture for smart contract vulnerability detection
SJ Hwang, SH Choi, J Shin, YH Choi
IEEE Access 10, 32595-32607, 2022
462022
Unsupervised multi-stage attack detection framework without details on single-stage attacks
J Shin, SH Choi, P Liu, YH Choi
Future Generation Computer Systems 100, 811-825, 2019
192019
ARGAN: Adversarially robust generative adversarial networks for deep neural networks against adversarial examples
SH Choi, JM Shin, P Liu, YH Choi
IEEE Access 10, 33602-33615, 2022
142022
Structural image de-identification for privacy-preserving deep learning
DH Ko, SH Choi, JM Shin, P Liu, YH Choi
IEEE Access 8, 119848-119862, 2020
142020
Wireless intrusion prevention system using dynamic random forest against wireless MAC spoofing attack
SH Choi, DH Hwang, YH Choi
2017 IEEE Conference on Dependable and Secure Computing, 131-137, 2017
132017
EEJE: Two-step input transformation for robust DNN against adversarial examples
SH Choi, J Shin, P Liu, YH Choi
IEEE Transactions on Network Science and Engineering 8 (2), 908-920, 2020
102020
PIHA: Detection method using perceptual image hashing against query-based adversarial attacks
SH Choi, J Shin, YH Choi
Future Generation Computer Systems 145, 563-577, 2023
82023
Is homomorphic encryption-based deep learning secure enough?
J Shin, SH Choi, YH Choi
Sensors 21 (23), 7806, 2021
82021
Dynamic nonparametric random forest using covariance
SH Choi, JM Shin, YH Choi
Security and Communication Networks 2019 (1), 3984031, 2019
72019
A study on prevention and automatic recovery of blockchain networks against persistent censorship attacks
JS Kim, JM Shin, SH Choi, YH Choi
IEEE Access 10, 110770-110784, 2022
62022
STEAL: Service Time-Aware Load balancer on many-core processors for fast intrusion detection
YH Choi, WJ Park, SH Choi, SW Seo
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2016
52016
Memory-efficient random forest generation method for network intrusion detection
SH Choi, DH Ko, SJ Hwang, YH Choi
2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN …, 2018
42018
Dynamic analysis framework for cryptojacking site detection
DH Ko, IH Jung, SH Choi, YH Choi
Journal of the Korea Institute of Information Security & Cryptology 28 (4 …, 2018
42018
GAN-based ROI image translation method for predicting image after hair transplant surgery
DY Hwang, SH Choi, J Shin, M Kim, YH Choi
Electronics 10 (24), 3066, 2021
32021
Instance-agnostic and practical clean label backdoor attack method for deep learning based face recognition models
TH Kim, SH Choi, YH Choi
IEEE Access, 2023
22023
Robust Indoor Localization Methods Using Random Forest-Based Filter against MAC Spoofing Attack
DH Ko, SH Choi, S Ahn, YH Choi
Sensors 20 (23), 6756, 2020
22020
회원가입 약관 정보 자동 수집을 통한 웹기반 개인정보보호 영향도 평가 시스템
김형건, 최석환, 윤광욱, 최윤호
정보과학회 컴퓨팅의 실제 논문지 25 (9), 425-435, 2019
22019
Robustness analysis of CNN-based Malware Family Classification methods against various adversarial attacks
SH Choi, JM Shin, P Liu, YH Choi
2019 IEEE Conference on Communications and Network Security (CNS), 1-6, 2019
22019
사회적 배척 상황에 따른 경계선 성격장애 경향군의 공격성 양상
정다연, 정인혁, 최석환, 최윤호
한국심리학회지: 건강 24 (3), 647-667, 2019
22019
Implementing a Dedicated WIPS Sensor Using Raspberry Pi
KW Yun, SH Choi, SU An, JG Kim, YH Choi
KIISE Transactions on Computing Practices 23 (7), 397-407, 2017
22017
系统目前无法执行此操作,请稍后再试。
文章 1–20