74 | [SCI paper] Hyoeun Kang, et al., "A new fluid flow approximation method using a vision transformer and a U-shaped convolutional neural network", AIP Advances, 20230206 | infosec | 14 |
89 | [국제학회] Iqbal, et al., "The Sky's Betrayal: Drone Hijacking on DJI Enhanced WiFi Protocol", WISA2023, 20230823 | infosec | 15 |
49 | [SCI paper] J. KIM, J. SHIN, S. CHOI and Y. CHOI, "A Study on Prevention and Automatic Recovery of Blockchain Networks Against Persistent Censorship Attacks", IEEE Access 10, 202210 | infosec | 28 |
81 | [국제학회] Jaehyun Kim, et al., "Improving Voting of Block Producers for Delegated Proof-of-Stake with Quadratic Delegate", Platcon2023, 20230816 | infosec | 15 |
20 | [SCI paper] Jinjae Lee, et al., "CoMeT: Configurable Tagged Memory Extension", sensors, 21(22), 202111 | infosec | 29 |
78 | [국제학회] Jiwin Seo, et al., "Sfitag: Efficient Software Fault Isolation with Memory Tagging for ARM Kernel Extensions", ACMASIACC23, 20230710 | infosec | 12 |
44 | [SCI paper] Junseok Yang, Seokjun Lee and Sungyong Ahn, "Selective Power-Loss-Protection Method for Write Buffer in ZNS SSDs", electronics 11(7), 202203 | infosec | 20 |
18 | [SCI paper] Ludia Eka Feri, et al., "A Three-Dimensional Microstructure Reconstruction Framework for Permeable Pavement Analysis Based on 3D-IWGAN with Enhanced Gradient Penalty", Sensors 21(11), 202105 | infosec | 32 |
80 | [국제학회] Muhammad Iqbal, et al., "Enhancing IoT Security: Integrating MQTT with ARIA Cipher 256 Algorithm Cryptography and mbedTLS ", Platcon2023, 20230816 | infosec | 12 |
24 | [국제학회] Myoung Jong Kim, "Geometric Mean-based Optimization Boosting for Bankruptcy Prediction", ISIS 2021, 202112 | infosec | 33 |
2 | [SCI paper] Naufal Suryanto, et al., "A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization", Sensors 20(24), 202012 | infosec | 33 |
공지 | [국제학회] Naufal Suryanto, et al., "ACTIVE: Towards Highly Transferable 3D Physical Camouflage for Universal and Robust Vehicle Evasion", ICCV2023, 20231002 | infosec | 9 |
52 | [국제학회] Naufal Suryanto, et al., "DTA: Physical Camouflage Attacks using Differentiable Transformation Network", IEEE/CVF Conference on Computer Vision and Pattern Recognition, 202206 | infosec | 23 |
4 | [국제학회] Naufal Suryanto, et al., "Together We Can Fool Them: A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization", CCSW 2020, 202011 | infosec | 23 |
23 | [국제학회] Passaniti Davide, et al, "Realistic Indoor Trajectory Generation Based on Delaunay Graph", 2021 IEEE International Conference on Big Data and Smart Computing, 202101 | infosec | 32 |
84 | [국제학회] Rini Wisnu Wardhani, et al., "The RSA Algorithm’s Quantum Cryptanalysis Posture". WISA2023, 20230823 | infosec | 5 |
94 | [국제학회] Rini, et al., "Quantum Circuit for High-degree and half-Multiplcation For Post-Quantum Analysis", ICISC2023, 20231130 | infosec | 12 |
45 | [SCI paper] S. CHOI, J. SHIN, P. LIU and Y. CHOI, "ARGAN: Adversarially Robust Generative Adversarial Networks for Deep Neural Networks Against Adversarial Examples", IEEE Access 10, 202203 | infosec | 28 |
46 | [SCI paper] Seok-Hwan Choi, Tae-u Bahk, Sungyong Ahn and Yoon-Ho Choi, "Clustering Approach for Detecting Multiple Types of Adversarial Examples", sensors 22(10), 202205 | infosec | 28 |
110 | [SCI paper] Seon-Jin Hwang, Assem Utaliyeva, Jae-Seok Kim, Yoon-Ho Choi, "Bypassing Heaven’s Gate Technique Using Black-Box Testing", sensors, 20231124 | infosec | 3 |