THEMIS: A Mutually verifiable billing system for the cloud computing environment KW Park, J Han, JW Chung, KH Park IEEE Transactions on Services Computing 6 (3), 300-313, 2012 | 95 | 2012 |
Learning binary code with deep learning to detect software weakness YJ Lee, SH Choi, C Kim, SH Lim, KW Park KSII the 9th international conference on internet (ICONI) 2017 symposium, 2017 | 77 | 2017 |
Character input device using bio radar unit and tilt sensor KH Park, KW Park, SA Ko US Patent 8,199,104, 2012 | 74 | 2012 |
Efficient page caching algorithm with prediction and migration for a hybrid main memory H Seok, Y Park, KW Park, KH Park ACM SIGAPP Applied Computing Review 11 (4), 38-48, 2011 | 66 | 2011 |
POSTER: Detecting audio adversarial example through audio modification H Kwon, H Yoon, KW Park Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 60 | 2019 |
Instruction2vec: Efficient preprocessor of assembly code to detect software weakness with CNN Y Lee, H Kwon, SH Choi, SH Lim, SH Baek, KW Park Applied Sciences 9 (19), 4086, 2019 | 50 | 2019 |
Multi-targeted adversarial example in evasion attack on deep neural network H Kwon, Y Kim, KW Park, H Yoon, D Choi IEEE Access 6, 46084-46096, 2018 | 46 | 2018 |
A ubiquitous fashionable computer with an i-Throw device on a location-based service environment J Lee, SH Lim, JW Yoo, KW Park, HJ Choi, KH Park 21st International Conference on Advanced Information Networking and …, 2007 | 43 | 2007 |
Acoustic-decoy: Detection of adversarial examples through audio modification on speech recognition system H Kwon, H Yoon, KW Park Neurocomputing 417, 357-370, 2020 | 42 | 2020 |
Computationally efficient PKI-based single sign-on protocol, PKASSO for mobile devices KW Park, SS Lim, KH Park IEEE Transactions on Computers 57 (6), 821-834, 2008 | 40 | 2008 |
Efficient machine learning over encrypted data with non-interactive communication H Park, P Kim, H Kim, KW Park, Y Lee Computer Standards & Interfaces 58, 87-108, 2018 | 34 | 2018 |
Multi-targeted backdoor: Indentifying backdoor attack for multiple deep neural networks H Kwon, H Yoon, KW Park IEICE TRANSACTIONS on Information and Systems 103 (4), 883-887, 2020 | 31 | 2020 |
GHOST: GPGPU-offloaded high performance storage I/O deduplication for primary storage system C Kim, KW Park, KH Park Proceedings of the 2012 International Workshop on Programming Models and …, 2012 | 31 | 2012 |
Themis: Towards mutually verifiable billing transactions in the cloud computing environment KW Park, SK Park, J Han, KH Park 2010 IEEE 3rd International Conference on Cloud Computing, 139-147, 2010 | 31 | 2010 |
Mn-mate: Resource management of manycores with dram and nonvolatile memories KH Park, Y Park, W Hwang, KW Park 2010 IEEE 12th International Conference on High Performance Computing and …, 2010 | 30 | 2010 |
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier H Kwon, Y Kim, KW Park, H Yoon, D Choi computers & security 78, 380-397, 2018 | 28 | 2018 |
Advanced ensemble adversarial example on unknown deep neural network classifiers H Kwon, Y Kim, KW Park, H Yoon, D Choi IEICE TRANSACTIONS on Information and Systems 101 (10), 2485-2500, 2018 | 21 | 2018 |
Robust captcha image generation enhanced with adversarial example methods H Kwon, H Yoon, KW Park IEICE TRANSACTIONS on Information and Systems 103 (4), 879-882, 2020 | 20 | 2020 |
Rethinking deduplication in cloud: From data profiling to blueprint C Kim, KW Park, KS Park, KH Park The 7th International Conference on Networked Computing and Advanced …, 2011 | 17 | 2011 |
Selective poisoning attack on deep neural networks H Kwon, H Yoon, KW Park Symmetry 11 (7), 892, 2019 | 16 | 2019 |