CodeNet: Code-targeted convolutional neural network architecture for smart contract vulnerability detection SJ Hwang, SH Choi, J Shin, YH Choi IEEE Access 10, 32595-32607, 2022 | 46 | 2022 |
Unsupervised multi-stage attack detection framework without details on single-stage attacks J Shin, SH Choi, P Liu, YH Choi Future Generation Computer Systems 100, 811-825, 2019 | 19 | 2019 |
ARGAN: Adversarially robust generative adversarial networks for deep neural networks against adversarial examples SH Choi, JM Shin, P Liu, YH Choi IEEE Access 10, 33602-33615, 2022 | 14 | 2022 |
Structural image de-identification for privacy-preserving deep learning DH Ko, SH Choi, JM Shin, P Liu, YH Choi IEEE Access 8, 119848-119862, 2020 | 14 | 2020 |
Wireless intrusion prevention system using dynamic random forest against wireless MAC spoofing attack SH Choi, DH Hwang, YH Choi 2017 IEEE Conference on Dependable and Secure Computing, 131-137, 2017 | 13 | 2017 |
EEJE: Two-step input transformation for robust DNN against adversarial examples SH Choi, J Shin, P Liu, YH Choi IEEE Transactions on Network Science and Engineering 8 (2), 908-920, 2020 | 10 | 2020 |
PIHA: Detection method using perceptual image hashing against query-based adversarial attacks SH Choi, J Shin, YH Choi Future Generation Computer Systems 145, 563-577, 2023 | 8 | 2023 |
Is homomorphic encryption-based deep learning secure enough? J Shin, SH Choi, YH Choi Sensors 21 (23), 7806, 2021 | 8 | 2021 |
Dynamic nonparametric random forest using covariance SH Choi, JM Shin, YH Choi Security and Communication Networks 2019 (1), 3984031, 2019 | 7 | 2019 |
A study on prevention and automatic recovery of blockchain networks against persistent censorship attacks JS Kim, JM Shin, SH Choi, YH Choi IEEE Access 10, 110770-110784, 2022 | 6 | 2022 |
STEAL: Service Time-Aware Load balancer on many-core processors for fast intrusion detection YH Choi, WJ Park, SH Choi, SW Seo 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2016 | 5 | 2016 |
Memory-efficient random forest generation method for network intrusion detection SH Choi, DH Ko, SJ Hwang, YH Choi 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN …, 2018 | 4 | 2018 |
Dynamic analysis framework for cryptojacking site detection DH Ko, IH Jung, SH Choi, YH Choi Journal of the Korea Institute of Information Security & Cryptology 28 (4 …, 2018 | 4 | 2018 |
GAN-based ROI image translation method for predicting image after hair transplant surgery DY Hwang, SH Choi, J Shin, M Kim, YH Choi Electronics 10 (24), 3066, 2021 | 3 | 2021 |
Instance-agnostic and practical clean label backdoor attack method for deep learning based face recognition models TH Kim, SH Choi, YH Choi IEEE Access, 2023 | 2 | 2023 |
Robust Indoor Localization Methods Using Random Forest-Based Filter against MAC Spoofing Attack DH Ko, SH Choi, S Ahn, YH Choi Sensors 20 (23), 6756, 2020 | 2 | 2020 |
회원가입 약관 정보 자동 수집을 통한 웹기반 개인정보보호 영향도 평가 시스템 김형건, 최석환, 윤광욱, 최윤호 정보과학회 컴퓨팅의 실제 논문지 25 (9), 425-435, 2019 | 2 | 2019 |
Robustness analysis of CNN-based Malware Family Classification methods against various adversarial attacks SH Choi, JM Shin, P Liu, YH Choi 2019 IEEE Conference on Communications and Network Security (CNS), 1-6, 2019 | 2 | 2019 |
사회적 배척 상황에 따른 경계선 성격장애 경향군의 공격성 양상 정다연, 정인혁, 최석환, 최윤호 한국심리학회지: 건강 24 (3), 647-667, 2019 | 2 | 2019 |
Implementing a Dedicated WIPS Sensor Using Raspberry Pi KW Yun, SH Choi, SU An, JG Kim, YH Choi KIISE Transactions on Computing Practices 23 (7), 397-407, 2017 | 2 | 2017 |