关注
Hyun Kwon
Hyun Kwon
Associate Professor, Korea Military Academy
在 kaist.ac.kr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Selective audio adversarial example in evasion attack on speech recognition system
H Kwon, Y Kim, H Yoon, D Choi
IEEE Transactions on Information Forensics and Security 15, 526-538, 2019
822019
POSTER: Detecting audio adversarial example through audio modification
H Kwon, H Yoon, KW Park
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
602019
Instruction2vec: Efficient preprocessor of assembly code to detect software weakness with CNN
Y Lee, H Kwon, SH Choi, SH Lim, SH Baek, KW Park
Applied Sciences 9 (19), 4086, 2019
502019
Multi-targeted adversarial example in evasion attack on deep neural network
H Kwon, Y Kim, KW Park, H Yoon, D Choi
IEEE Access 6, 46084-46096, 2018
462018
Acoustic-decoy: Detection of adversarial examples through audio modification on speech recognition system
H Kwon, H Yoon, KW Park
Neurocomputing 417, 357-370, 2020
422020
BlindNet backdoor: Attack on deep neural network using blind watermark
H Kwon, Y Kim
Multimedia Tools and Applications 81 (5), 6217-6234, 2022
372022
Detecting backdoor attacks via class difference in deep neural networks
H Kwon
IEEE Access 8, 191049-191056, 2020
312020
Multi-targeted backdoor: Indentifying backdoor attack for multiple deep neural networks
H Kwon, H Yoon, KW Park
IEICE TRANSACTIONS on Information and Systems 103 (4), 883-887, 2020
312020
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier
H Kwon, Y Kim, KW Park, H Yoon, D Choi
computers & security 78, 380-397, 2018
282018
Classification score approach for detecting adversarial example in deep neural network
H Kwon, Y Kim, H Yoon, D Choi
Multimedia Tools and Applications 80, 10339-10360, 2021
262021
Random untargeted adversarial example on deep neural network
H Kwon, Y Kim, H Yoon, D Choi
Symmetry 10 (12), 738, 2018
242018
Ensemble transfer attack targeting text classification systems
H Kwon, S Lee
Computers & Security 117, 102695, 2022
232022
Restricted evasion attack: Generation of restricted-area adversarial example
H Kwon, H Yoon, D Choi
IEEE Access 7, 60908-60919, 2019
232019
Captcha image generation systems using generative adversarial networks
H Kwon, Y Kim, H Yoon, D Choi
IEICE TRANSACTIONS on Information and Systems 101 (2), 543-546, 2018
232018
Defending deep neural networks against backdoor attack by using de-trigger autoencoder
H Kwon
IEEE Access, 2021
222021
Textual backdoor attack for the text classification system
H Kwon, S Lee
Security and Communication Networks 2021 (1), 2938386, 2021
212021
Advanced ensemble adversarial example on unknown deep neural network classifiers
H Kwon, Y Kim, KW Park, H Yoon, D Choi
IEICE TRANSACTIONS on Information and Systems 101 (10), 2485-2500, 2018
212018
Robust captcha image generation enhanced with adversarial example methods
H Kwon, H Yoon, KW Park
IEICE TRANSACTIONS on Information and Systems 103 (4), 879-882, 2020
202020
SqueezeFace: Integrative face recognition methods with LiDAR sensors
K Ko, H Gwak, N Thoummala, H Kwon, SH Kim
Journal of Sensors 2021 (1), 4312245, 2021
192021
Optimal cluster expansion-based intrusion tolerant system to prevent denial of service attacks
H Kwon, Y Kim, H Yoon, D Choi
Applied Sciences 7 (11), 1186, 2017
192017
系统目前无法执行此操作,请稍后再试。
文章 1–20