Selective audio adversarial example in evasion attack on speech recognition system H Kwon, Y Kim, H Yoon, D Choi IEEE Transactions on Information Forensics and Security 15, 526-538, 2019 | 82 | 2019 |
POSTER: Detecting audio adversarial example through audio modification H Kwon, H Yoon, KW Park Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 60 | 2019 |
Instruction2vec: Efficient preprocessor of assembly code to detect software weakness with CNN Y Lee, H Kwon, SH Choi, SH Lim, SH Baek, KW Park Applied Sciences 9 (19), 4086, 2019 | 50 | 2019 |
Multi-targeted adversarial example in evasion attack on deep neural network H Kwon, Y Kim, KW Park, H Yoon, D Choi IEEE Access 6, 46084-46096, 2018 | 46 | 2018 |
Acoustic-decoy: Detection of adversarial examples through audio modification on speech recognition system H Kwon, H Yoon, KW Park Neurocomputing 417, 357-370, 2020 | 42 | 2020 |
BlindNet backdoor: Attack on deep neural network using blind watermark H Kwon, Y Kim Multimedia Tools and Applications 81 (5), 6217-6234, 2022 | 37 | 2022 |
Detecting backdoor attacks via class difference in deep neural networks H Kwon IEEE Access 8, 191049-191056, 2020 | 31 | 2020 |
Multi-targeted backdoor: Indentifying backdoor attack for multiple deep neural networks H Kwon, H Yoon, KW Park IEICE TRANSACTIONS on Information and Systems 103 (4), 883-887, 2020 | 31 | 2020 |
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier H Kwon, Y Kim, KW Park, H Yoon, D Choi computers & security 78, 380-397, 2018 | 28 | 2018 |
Classification score approach for detecting adversarial example in deep neural network H Kwon, Y Kim, H Yoon, D Choi Multimedia Tools and Applications 80, 10339-10360, 2021 | 26 | 2021 |
Random untargeted adversarial example on deep neural network H Kwon, Y Kim, H Yoon, D Choi Symmetry 10 (12), 738, 2018 | 24 | 2018 |
Ensemble transfer attack targeting text classification systems H Kwon, S Lee Computers & Security 117, 102695, 2022 | 23 | 2022 |
Restricted evasion attack: Generation of restricted-area adversarial example H Kwon, H Yoon, D Choi IEEE Access 7, 60908-60919, 2019 | 23 | 2019 |
Captcha image generation systems using generative adversarial networks H Kwon, Y Kim, H Yoon, D Choi IEICE TRANSACTIONS on Information and Systems 101 (2), 543-546, 2018 | 23 | 2018 |
Defending deep neural networks against backdoor attack by using de-trigger autoencoder H Kwon IEEE Access, 2021 | 22 | 2021 |
Textual backdoor attack for the text classification system H Kwon, S Lee Security and Communication Networks 2021 (1), 2938386, 2021 | 21 | 2021 |
Advanced ensemble adversarial example on unknown deep neural network classifiers H Kwon, Y Kim, KW Park, H Yoon, D Choi IEICE TRANSACTIONS on Information and Systems 101 (10), 2485-2500, 2018 | 21 | 2018 |
Robust captcha image generation enhanced with adversarial example methods H Kwon, H Yoon, KW Park IEICE TRANSACTIONS on Information and Systems 103 (4), 879-882, 2020 | 20 | 2020 |
SqueezeFace: Integrative face recognition methods with LiDAR sensors K Ko, H Gwak, N Thoummala, H Kwon, SH Kim Journal of Sensors 2021 (1), 4312245, 2021 | 19 | 2021 |
Optimal cluster expansion-based intrusion tolerant system to prevent denial of service attacks H Kwon, Y Kim, H Yoon, D Choi Applied Sciences 7 (11), 1186, 2017 | 19 | 2017 |