关注
Leo Hyun Park
Leo Hyun Park
在 yonsei.ac.kr 的电子邮件经过验证
标题
引用次数
引用次数
年份
Draw it as shown: Behavioral pattern lock for mobile user authentication
Y Ku, LH Park, S Shin, T Kwon
IEEE Access 7, 69363-69378, 2019
492019
Birds of a Feature: Intrafamily Clustering for Version Identification of Packed Malware
LH Park, J Yu, HK Kang, T Lee, T Kwon
IEEE Systems Journal 14 (3), 4545-4556, 2020
162020
Membership inference attacks with token-level deduplication on korean language models
MG Oh, LH Park, J Kim, J Park, T Kwon
IEEE Access 11, 10207-10217, 2023
152023
GradFuzz: Fuzzing deep neural networks with gradient vector coverage for adversarial examples
LH Park, S Chung, J Kim, T Kwon
Neurocomputing 522, 165-180, 2023
52023
Analysis of Deep Learning Model Vulnerability According to Input Mutation
J Kim, LH Park, T Kwon
Journal of the Korea Institute of Information Security & Cryptology 31 (1 …, 2021
42021
Adversarial feature alignment: Balancing robustness and accuracy in deep learning via adversarial training
LH Park, J Kim, MG Oh, J Park, T Kwon
Proceedings of the 2024 Workshop on Artificial Intelligence and Security …, 2024
32024
Mixed and constrained input mutation for effective fuzzing of deep learning systems
LH Park, J Kim, J Park, T Kwon
Information sciences 614, 497-517, 2022
32022
Poster: Effective layers in coverage metrics for deep neural networks
LH Park, S Oh, J Kim, S Chung, T Kwon
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
32019
Coexistence of Deepfake Defenses: Addressing the Poisoning Challenge
J Park, LH Park, HE Ahn, T Kwon
IEEE Access, 2024
22024
Poster: Adversarial Defense with Deep Learning Coverage on MagNet's Purification
LH Park, J Park, S Chung, J Kim, MG Oh, T Kwon
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
22022
A guided approach to behavioral authentication
Y Ku, LH Park, S Shin, T Kwon
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
22018
On the Correlation Between Deepfake Detection Performance and Image Quality Metrics
H Kim, J Lee, LH Park, T Kwon
Proceedings of the 3rd ACM Workshop on the Security Implications of …, 2024
12024
Towards constructing consistent pattern strength meters with user’s visual perception
LH Park, E Hwang, D Lee, T Kwon
International Conference on Information Security and Cryptology, 81-99, 2022
12022
On Membership Inference Attacks to Generative Language Models Across Language Domains
MG Oh, LH Park, J Kim, J Park, T Kwon
International Conference on Information Security Applications, 143-155, 2022
12022
Development Research of An Efficient Malware Classification System Using Hybrid Features And Machine Learning
JB Yu, SJ Oh, LH Park, TK Kwon
Journal of the Korea Institute of Information Security & Cryptology 28 (5 …, 2018
12018
Amplifying Training Data Exposure through Fine-Tuning with Pseudo-Labeled Memberships
MG Oh, HE Ahn, LH Park, T Kwon
arXiv preprint arXiv:2402.12189, 2024
2024
Reverse-Update Adversarial Data for Enhancing Adversarial Attack and Adversarial Training Performance
JY Rhee, W Cho, LH Park, T Kwon
Journal of the Korea Institute of Information Security & Cryptology 34 (5 …, 2024
2024
On the Performance Biases Arising from Inconsistencies in Evaluation Methodologies of Deepfake Detection Models
H Kim, HE Ahn, LH Park, T Kwon
Journal of the Korea Institute of Information Security & Cryptology 34 (5 …, 2024
2024
Robust Training for Deepfake Detection Models Against Disruption-Induced Data Poisoning
J Park, HE Ahn, LH Park, T Kwon
International Conference on Information Security Applications, 175-187, 2023
2023
Improving Adversarial Robustness via Attention
J Kim, MG Oh, LH Park, T Kwon
Journal of the Korea Institute of Information Security & Cryptology 33 (4 …, 2023
2023
系统目前无法执行此操作,请稍后再试。
文章 1–20