default search action
Hyoungshick Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j61]Hyunmin Choi, Jihun Kim, Seungho Kim, Seonhye Park, Jeongyong Park, Wonbin Choi, Hyoungshick Kim:
UniHENN: Designing Faster and More Versatile Homomorphic Encryption-Based CNNs Without im2col. IEEE Access 12: 109323-109341 (2024) - [j60]Sowon Jeon, Gilhee Lee, Hyoungshick Kim, Simon S. Woo:
Design and evaluation of highly accurate smart contract code vulnerability detection framework. Data Min. Knowl. Discov. 38(3): 888-912 (2024) - [j59]Mohsen Ali Alawami, Tamer Abuhmed, Mohammed Abuhamad, Hyoungshick Kim:
MotionID: Towards practical behavioral biometrics-based implicit user authentication on smartphones. Pervasive Mob. Comput. 101: 101922 (2024) - [j58]Eldor Abdukhamidov, Mohammed Abuhamad, George K. Thiruvathukal, Hyoungshick Kim, Tamer Abuhmed:
SingleADV: Single-Class Target-Specific Attack Against Interpretable Deep Learning Systems. IEEE Trans. Inf. Forensics Secur. 19: 5985-5998 (2024) - [j57]Jihyeon Ryu, Yifeng Zheng, Yansong Gao, Alsharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang:
Can differential privacy practically protect collaborative deep learning inference for IoT? Wirel. Networks 30(6): 4713-4733 (2024) - [c143]Hyunmin Choi, Simon S. Woo, Hyoungshick Kim:
Blind-Touch: Homomorphic Encryption-Based Distributed Neural Network Inference for Privacy-Preserving Fingerprint Authentication. AAAI 2024: 21976-21985 - [c142]Yurak Choe, Hyungseok Yu, Taeho Kim, Shinjae Lee, Hojoon Lee, Hyoungshick Kim:
(In)visible Privacy Indicator: Security Analysis of Privacy Indicator on Android Devices. AsiaCCS 2024 - [c141]Heewon Baek, Minwook Lee, Hyoungshick Kim:
CryptoLLM: Harnessing the Power of LLMs to Detect Cryptographic API Misuse. ESORICS (1) 2024: 353-373 - [c140]Beomjin Jin, Eunsoo Kim, Hyunwoo Lee, Elisa Bertino, Doowon Kim, Hyoungshick Kim:
Sharing cyber threat intelligence: Does it really help? NDSS 2024 - [c139]Sanghak Oh, Kiho Lee, Seonhye Park, Doowon Kim, Hyoungshick Kim:
Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers' Coding Practices with Insecure Suggestions from Poisoned AI Models. SP 2024: 1141-1159 - [c138]Mingyi Liu, Jun Ho Huh, HyungSeok Han, Jaehyuk Lee, Jihae Ahn, Frank Li, Hyoungshick Kim, Taesoo Kim:
I Experienced More than 10 DeFi Scams: On DeFi Users' Perception of Security Breaches and Countermeasures. USENIX Security Symposium 2024 - [c137]Kiho Lee, Chaejin Lim, Beomjin Jin, Taeyoung Kim, Hyoungshick Kim:
AdFlush: A Real-World Deployable Machine Learning Solution for Effective Advertisement and Web Tracker Prevention. WWW 2024: 1902-1913 - [i33]Nivedita Singh, Yejin Do, Yongsang Yu. Imane Fouad, Jungrae Kim, Hyoungshick Kim:
Crumbled Cookie Exploring E-commerce Websites Cookie Policies with Data Protection Regulations. CoRR abs/2401.05826 (2024) - [i32]Nivedita Singh, Rajkumar Buyya, Hyoungshick Kim:
Securing Cloud-Based Internet of Things: Challenges and Mitigations. CoRR abs/2402.00356 (2024) - [i31]Hyunmin Choi, Jihun Kim, Seungho Kim, Seonhye Park, Jeongyong Park, Wonbin Choi, Hyoungshick Kim:
UniHENN: Designing More Versatile Homomorphic Encryption-based CNNs without im2col. CoRR abs/2402.03060 (2024) - [i30]Jake Hesford, Daniel Cheng, Alan Wan, Larry Huynh, Seungho Kim, Hyoungshick Kim, Jin B. Hong:
Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice. CoRR abs/2403.17458 (2024) - [i29]Fujiao Ji, Kiho Lee, Hyungjoon Koo, Wenhao You, Euijin Choo, Hyoungshick Kim, Doowon Kim:
Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models. CoRR abs/2405.19598 (2024) - [i28]Mingyi Liu, Jun Ho Huh, HyungSeok Han, Jaehyuk Lee, Jihae Ahn, Frank Li, Hyoungshick Kim, Taesoo Kim:
I Experienced More than 10 DeFi Scams: On DeFi Users' Perception of Security Breaches and Countermeasures. CoRR abs/2406.15709 (2024) - [i27]Hyunmin Choi, Jiwon Kim, Chiyoung Song, Simon S. Woo, Hyoungshick Kim:
Blind-Match: Efficient Homomorphic Encryption-Based 1:N Matching for Privacy-Preserving Biometric Identification. CoRR abs/2408.06167 (2024) - 2023
- [j56]Beomjin Jin, Jusop Choi, Jin B. Hong, Hyoungshick Kim:
On the Effectiveness of Perturbations in Generating Evasive Malware Variants. IEEE Access 11: 31062-31074 (2023) - [j55]Dongwon Lee, Yongwoo Oh, Jin B. Hong, Hyoungshick Kim, Dan Dongseong Kim:
PP-GSM: Privacy-preserving graphical security model for security assessment as a service. Future Gener. Comput. Syst. 142: 351-363 (2023) - [j54]Jun Ho Huh, Sungsu Kwag, Iljoo Kim, Alexandr Popov, Younghan Park, Geumhwan Cho, Juwon Lee, Hyoungshick Kim, Choong-Hoon Lee:
On the Long-Term Effects of Continuous Keystroke Authentication: Keeping User Frustration Low through Behavior Adaptation. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(2): 58:1-58:32 (2023) - [j53]Bedeuro Kim, Mohsen Ali Alawami, Eunsoo Kim, Sanghak Oh, Jeongyong Park, Hyoungshick Kim:
A Comparative Study of Time Series Anomaly Detection Models for Industrial Control Systems. Sensors 23(3): 1310 (2023) - [j52]Eunil Seo, Hyoungshick Kim, Bhaskar Krishnamachari, Erik Elmroth:
An ICN-Based Data Marketplace Model Based on a Game Theoretic Approach Using Quality-Data Discovery and Profit Optimization. IEEE Trans. Cloud Comput. 11(2): 2110-2126 (2023) - [j51]Siwon Huh, Myungkyu Shim, Jihwan Lee, Simon S. Woo, Hyoungshick Kim, Hojoon Lee:
DID We Miss Anything?: Towards Privacy-Preserving Decentralized ID Architecture. IEEE Trans. Dependable Secur. Comput. 20(6): 4881-4898 (2023) - [c136]Seonhye Park, Alsharif Abuadbba, Shuo Wang, Kristen Moore, Yansong Gao, Hyoungshick Kim, Surya Nepal:
DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks. ACSAC 2023: 535-549 - [c135]Jeongyong Park, Bedeuro Kim, Hyoungshick Kim:
MENDEL: Time series anomaly detection using transfer learning for industrial control systems. BigComp 2023: 261-268 - [c134]Min Jang, Yuna Hwang, Yonghwi Kwon, Hyoungshick Kim:
BTFuzzer: A Profile-Based Fuzzing Framework for Bluetooth Protocols. ICISC (2) 2023: 20-38 - [c133]Taeyoung Kim, Yunhee Jang, Chanjong Lee, Hyungjoon Koo, Hyoungshick Kim:
Smartmark: Software Watermarking Scheme for Smart Contracts. ICSE 2023: 283-294 - [c132]Nivedita Singh, Mohsen Ali Alawami, Hyoungshick Kim:
When social networks meet payment: a security perspective. IMCOM 2023: 1-6 - [c131]Taeyoung Kim, Seonhye Park, Hyoungshick Kim:
Why Johnny Can't Use Secure Docker Images: Investigating the Usability Challenges in Using Docker Image Vulnerability Scanners through Heuristic Evaluation. RAID 2023: 669-685 - [c130]Dongwon Lee, Myeonghwan Ahn, Hyesun Kwak, Jin B. Hong, Hyoungshick Kim:
BlindFilter: Privacy-Preserving Spam Email Detection Using Homomorphic Encryption. SRDS 2023: 35-45 - [c129]Sanghak Oh, Minwook Lee, Hyunwoo Lee, Elisa Bertino, Hyoungshick Kim:
AppSniffer: Towards Robust Mobile App Fingerprinting Against VPN. WWW 2023: 2318-2328 - [i26]Taeyoung Kim, Yunhee Jang, Chanjong Lee, Hyungjoon Koo, Hyoungshick Kim:
SmartMark: Software Watermarking Scheme for Smart Contracts. CoRR abs/2303.13733 (2023) - [i25]Eldor Abdukhamidov, Mohammed Abuhamad, George K. Thiruvathukal, Hyoungshick Kim, Tamer Abuhmed:
Single-Class Target-Specific Attack against Interpretable Deep Learning Systems. CoRR abs/2307.06484 (2023) - [i24]Sanghak Oh, Kiho Lee, Seonhye Park, Doowon Kim, Hyoungshick Kim:
Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers' Coding Practices with Insecure Suggestions from Poisoned AI Models. CoRR abs/2312.06227 (2023) - [i23]Hyunmin Choi, Simon S. Woo, Hyoungshick Kim:
Blind-Touch: Homomorphic Encryption-Based Distributed Neural Network Inference for Privacy-Preserving Fingerprint Authentication. CoRR abs/2312.11575 (2023) - 2022
- [j50]Mohsen Ali Alawami, Aishwarya Ram Vinay, Hyoungshick Kim:
LocID: A Secure and Usable Location-Based Smartphone Unlocking Scheme Using Wi-Fi Signals and Light Intensity. IEEE Internet Things J. 9(23): 24357-24372 (2022) - [j49]Yansong Gao, Minki Kim, Chandra Thapa, Alsharif Abuadbba, Zhi Zhang, Seyit Camtepe, Hyoungshick Kim, Surya Nepal:
Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things. IEEE Trans. Computers 71(10): 2538-2552 (2022) - [j48]Yansong Gao, Yeonjae Kim, Bao Gia Doan, Zhi Zhang, Gongxuan Zhang, Surya Nepal, Damith C. Ranasinghe, Hyoungshick Kim:
Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks. IEEE Trans. Dependable Secur. Comput. 19(4): 2349-2364 (2022) - [j47]Taegeun Moon, Hyoungshick Kim, Sangwon Hyun:
Mutexion: Mutually Exclusive Compression System for Mitigating Compression Side-Channel Attacks. ACM Trans. Web 16(4): 21:1-21:20 (2022) - [c128]Simon S. Woo, Shahroz Tariq, Hyoungshick Kim:
WDC'22: 1st Workshop on the Security Implications of Deepfakes and Cheapfakes. AsiaCCS 2022: 1269-1270 - [c127]Kiho Lee, Sanghak Oh, Hyoungshick Kim:
Poster: Adversarial Perturbation Attacks on the State-of-the-Art Cryptojacking Detection System in IoT Networks. CCS 2022: 3387-3389 - [c126]Soolin Kim, Jusop Choi, Muhammad Ejaz Ahmed, Surya Nepal, Hyoungshick Kim:
VulDeBERT: A Vulnerability Detection System Using BERT. ISSRE Workshops 2022: 69-74 - [e2]Simon S. Woo, Shahroz Tariq, Hyoungshick Kim:
WDC@AsiaCCS '22: Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes, Nagasaki, Japan, 30 May 2022. ACM 2022, ISBN 978-1-4503-9178-8 [contents] - [i22]Hua Ma, Yinshan Li, Yansong Gao, Alsharif Abuadbba, Zhi Zhang, Anmin Fu, Hyoungshick Kim, Said F. Al-Sarawi, Surya Nepal, Derek Abbott:
Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World. CoRR abs/2201.08619 (2022) - [i21]Jusop Choi, Wonseok Choi, William Aiken, Hyoungshick Kim, Jun Ho Huh, Taesoo Kim, Yongdae Kim, Ross J. Anderson:
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild. CoRR abs/2201.08678 (2022) - [i20]Yansong Gao, Jianrong Yao, Lihui Pang, Zhi Zhang, Anmin Fu, Naixue Xiong, Hyoungshick Kim:
Systematically Evaluation of Challenge Obfuscated APUFs. CoRR abs/2203.15316 (2022) - [i19]Seonhye Park, Alsharif Abuadbba, Shuo Wang, Kristen Moore, Yansong Gao, Hyoungshick Kim, Surya Nepal:
Tracking Dataset IP Use in Deep Neural Networks. CoRR abs/2211.13535 (2022) - 2021
- [j46]Bong Gon Kim, Young-Seob Cho, Seok-Hyun Kim, Hyoungshick Kim, Simon S. Woo:
A Security Analysis of Blockchain-Based Did Services. IEEE Access 9: 22894-22913 (2021) - [j45]Lihui Pang, Hyoungshick Kim, Bin Yang, Xinlin Wang, Yansong Gao:
Security Evaluation of n-Choose-k-Sum PUFs Against Modeling Attacks. IEEE Access 9: 168193-168206 (2021) - [j44]William Aiken, Hyoungshick Kim, Simon S. Woo, Jungwoo Ryoo:
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks. Comput. Secur. 106: 102277 (2021) - [c125]Beom Heyn Kim, Hyoungshick Kim:
Rocky: Replicating Block Devices for Tamper and Failure Resistant Edge-based Virtualized Desktop Infrastructure. ACSAC 2021: 285-296 - [c124]Larry Huynh, Thai Nguyen, Joshua Goh, Hyoungshick Kim, Jin B. Hong:
ARGH!: Automated Rumor Generation Hub. CIKM 2021: 3847-3856 - [c123]Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Surya Nepal, Hyoungshick Kim:
Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN. DSN 2021: 63-74 - [c122]Muhammad Ejaz Ahmed, Hyoungshick Kim, Seyit Camtepe, Surya Nepal:
Peeler: Profiling Kernel-Level Events to Detect Ransomware. ESORICS (1) 2021: 240-260 - [c121]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. ICSE 2021: 1671-1682 - [c120]Alsharif Abuadbba, Hyoungshick Kim, Surya Nepal:
DeepiSign: invisible fragile watermark to protect the integrity and authenticity of CNN. SAC 2021: 952-959 - [c119]Beomjin Jin, Jusop Choi, Hyoungshick Kim, Jin B. Hong:
FUMVar: a practical framework for generating fully-working and unseen malware variants. SAC 2021: 1656-1663 - [c118]Geumhwan Cho, Sungsu Kwag, Jun Ho Huh, Bedeuro Kim, Choong-Hoon Lee, Hyoungshick Kim:
Towards Usable and Secure Location-based Smartphone Authentication. SOUPS @ USENIX Security Symposium 2021: 1-16 - [c117]Jeongseok Choi, Hyoungshick Kim:
On the Robustness of Intrusion Detection Systems for Vehicles Against Adversarial Attacks. WISA 2021: 39-50 - [e1]Hyoungshick Kim:
Information Security Applications - 22nd International Conference, WISA 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13009, Springer 2021, ISBN 978-3-030-89431-3 [contents] - [i18]Alsharif Abuadbba, Hyoungshick Kim, Surya Nepal:
DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN. CoRR abs/2101.04319 (2021) - [i17]Muhammad Ejaz Ahmed, Hyoungshick Kim, Seyit Camtepe, Surya Nepal:
Peeler: Profiling Kernel-Level Events to Detect Ransomware. CoRR abs/2101.12434 (2021) - [i16]Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit Ahmet Çamtepe, Hyoungshick Kim, Surya Nepal:
Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things. CoRR abs/2103.02762 (2021) - [i15]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. CoRR abs/2103.05758 (2021) - [i14]Jihyeon Ryu, Yifeng Zheng, Yansong Gao, Sharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang:
Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things? CoRR abs/2104.03813 (2021) - 2020
- [j43]Younghwan Kim, Huy Kang Kim, Hyoungshick Kim, Jin B. Hong:
Do Many Models Make Light Work? Evaluating Ensemble Solutions for Improved Rumor Detection. IEEE Access 8: 150709-150724 (2020) - [j42]Jaegwan Yu, Eunsoo Kim, Hyoungshick Kim, Jun Ho Huh:
Design of a Framework to Detect Device Spoofing Attacks Using Network Characteristics. IEEE Consumer Electron. Mag. 9(2): 34-40 (2020) - [j41]Jinyong Tim Kim, Eunsoo Kim, Jinhyuk Yang, Jaehoon Jeong, Hyoungshick Kim, Sangwon Hyun, Hyunsik Yang, Jaewook Oh, Younghan Kim, Susan Hares, Linda Dunbar:
IBCS: Intent-Based Cloud Services for Security Applications. IEEE Commun. Mag. 58(4): 45-51 (2020) - [j40]Mohsen Ali Alawami, Hyoungshick Kim:
LocAuth: A fine-grained indoor location-based authentication system using wireless networks characteristics. Comput. Secur. 89 (2020) - [j39]Eunsoo Kim, Young-Seob Cho, Bedeuro Kim, Woojoong Ji, Seok-Hyun Kim, Simon S. Woo, Hyoungshick Kim:
Can We Create a Cross-Domain Federated Identity for the Industrial Internet of Things without Google? IEEE Internet Things Mag. 3(4): 82-87 (2020) - [j38]Hakjun Lee, Dongwoo Kang, Jihyeon Ryu, Dongho Won, Hyoungshick Kim, Youngsook Lee:
A three-factor anonymous user authentication scheme for Internet of Things environments. J. Inf. Secur. Appl. 52: 102494 (2020) - [j37]Seungjin Lee, Hyoungshick Kim:
On the robustness of Lightning Network in Bitcoin. Pervasive Mob. Comput. 61: 101108 (2020) - [j36]Taeyun Kim, Yongwoo Oh, Hyoungshick Kim:
Efficient Privacy-Preserving Fingerprint-Based Authentication System Using Fully Homomorphic Encryption. Secur. Commun. Networks 2020: 4195852:1-4195852:11 (2020) - [j35]Mahdi Daghmehchi Firoozjaei, Ali A. Ghorbani, Hyoungshick Kim, JaeSeung Song:
Hy-Bridge: A Hybrid Blockchain for Privacy-Preserving and Trustful Energy Transactions in Internet-of-Things Platforms. Sensors 20(3): 928 (2020) - [j34]Jihyeon Ryu, Dongwoo Kang, Hakjun Lee, Hyoungshick Kim, Dongho Won:
A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems. Sensors 20(24): 7136 (2020) - [j33]Geumhwan Cho, Jun Ho Huh, Soolin Kim, Junsung Cho, Heesung Park, Yenah Lee, Konstantin Beznosov, Hyoungshick Kim:
On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better? ACM Trans. Priv. Secur. 23(4): 22:1-22:32 (2020) - [c116]Bedeuro Kim, Sharif Abuadbba, Hyoungshick Kim:
DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation. ACISP 2020: 461-475 - [c115]Hanbin Jang, Woojoong Ji, Simon S. Woo, Hyoungshick Kim:
Design and Evaluation of Enumeration Attacks on Package Tracking Systems. ACISP 2020: 543-559 - [c114]Joon Kuy Han, Xiaojun Bi, Hyoungshick Kim, Simon S. Woo:
PassTag: A Graphical-Textual Hybrid Fallback Authentication System. AsiaCCS 2020: 60-72 - [c113]Sharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa, Seyit Ahmet Çamtepe, Yansong Gao, Hyoungshick Kim, Surya Nepal:
Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training? AsiaCCS 2020: 305-318 - [c112]Jihye Woo, Ji-Won Choi, Soyoon Jeon, Joon Kuy Han, Hyoungshick Kim, Simon S. Woo:
Tale of Two Browsers: Understanding Users' Web Browser Choices in South Korea. Financial Cryptography Workshops 2020: 3-17 - [c111]Jihyeon Ryu, Hyoungshick Kim, Youngsook Lee, Dongho Won:
Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment. IMCOM 2020: 1-4 - [c110]Gilhee Lee, Taegeun Moon, Min Jang, Hyoungshick Kim:
eAPT: enhancing APT with a mirror site resolver. ISSRE Workshops 2020: 117-122 - [c109]Jusop Choi, Soolin Kim, Junsung Cho, Kuyju Kim, Seok Hong, Hyoungshick Kim:
ACIDroid: a practical app cache integrity protection system on Android Runtime. SAC 2020: 376-383 - [c108]Eunyong Cheon, Yonghwan Shin, Jun Ho Huh, Hyoungshick Kim, Ian Oakley:
Gesture Authentication for Smartphones: Evaluation of Gesture Password Selection Policies. SP 2020: 249-267 - [c107]Yansong Gao, Minki Kim, Sharif Abuadbba, Yeonjae Kim, Chandra Thapa, Kyuyeon Kim, Seyit Ahmet Çamtepe, Hyoungshick Kim, Surya Nepal:
End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things. SRDS 2020: 91-100 - [c106]Bonha Koo, Taegeun Moon, Hyoungshick Kim:
MurQRI: Encrypted Multi-layer QR Codes for Electronic Identity Management. SVCC 2020: 98-108 - [c105]Aishwarya Ram Vinay, Mohsen Ali Alawami, Hyoungshick Kim:
ConTheModel: Can We Modify Tweets to Confuse Classifier Models? SVCC 2020: 205-219 - [c104]Muhammad Ejaz Ahmed, Il-Youp Kwak, Jun Ho Huh, Iljoo Kim, Taekkyung Oh, Hyoungshick Kim:
Void: A fast and light voice liveness detection system. USENIX Security Symposium 2020: 2685-2702 - [c103]Simon S. Woo, Hanbin Jang, Woojung Ji, Hyoungshick Kim:
I've Got Your Packages: Harvesting Customers' Delivery Order Information using Package Tracking Number Enumeration Attacks. WWW 2020: 2948-2954 - [i13]Sharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa, Seyit Ahmet Çamtepe, Yansong Gao, Hyoungshick Kim, Surya Nepal:
Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training? CoRR abs/2003.12365 (2020) - [i12]Yansong Gao, Minki Kim, Sharif Abuadbba, Yeonjae Kim, Chandra Thapa, Kyuyeon Kim, Seyit Ahmet Çamtepe, Hyoungshick Kim, Surya Nepal:
End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things. CoRR abs/2003.13376 (2020) - [i11]William Aiken, Hyoungshick Kim, Simon S. Woo:
Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks. CoRR abs/2004.11368 (2020) - [i10]Bedeuro Kim, Sharif Abuadbba, Hyoungshick Kim:
DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation. CoRR abs/2006.08885 (2020) - [i9]Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Jiliang Zhang, Anmin Fu, Surya Nepal, Hyoungshick Kim:
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review. CoRR abs/2007.10760 (2020) - [i8]Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Hyoungshick Kim, Surya Nepal:
Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks. CoRR abs/2010.03735 (2020)
2010 – 2019
- 2019
- [j32]Mahdi Daghmehchi Firoozjaei, MinChang Kim, JaeSeung Song, Hyoungshick Kim:
O2TR: Offline OTR messaging system under network disruption. Comput. Secur. 82: 227-240 (2019) - [j31]Jusop Choi, Jaegwan Yu, Sangwon Hyun, Hyoungshick Kim:
Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger. Digit. Investig. 28 Supplement: S50-S59 (2019) - [j30]Keuntae Lee, Seokhwa Kim, Jaehoon (Paul) Jeong, Sejun Lee, Hyoungshick Kim, Jung-Soo Park:
A framework for DNS naming services for Internet-of-Things devices. Future Gener. Comput. Syst. 92: 617-627 (2019) - [j29]Muhammad Ejaz Ahmed, Saeed Ullah, Hyoungshick Kim:
Statistical Application Fingerprinting for DDoS Attack Mitigation. IEEE Trans. Inf. Forensics Secur. 14(6): 1471-1484 (2019) - [j28]Jinyong Kim, Seokhwa Kim, Jaehoon Jeong, Hyoungshick Kim, Jung-Soo Park, Taeho Kim:
CBDN: Cloud-Based Drone Navigation for Efficient Battery Charging in Drone Networks. IEEE Trans. Intell. Transp. Syst. 20(11): 4174-4191 (2019) - [c102]Woojoong Ji, Taeyun Kim, Kuyju Kim, Hyoungshick Kim:
Automated Cash Mining Attacks on Mobile Advertising Networks. ACISP 2019: 679-686 - [c101]Yujin Kwon, Hyoungshick Kim, Yung Yi, Yongdae Kim:
An Eye for an Eye: Economics of Retaliation in Mining Pools. AFT 2019: 169-182 - [c100]Yuri Son, Geumhwan Cho, Hyoungshick Kim, Simon S. Woo:
Understanding Users' Risk Perceptions about Personal Health Records Shared on Social Networking Services. AsiaCCS 2019: 352-365 - [c99]Daehwa Rayer Lee, Yunhee Jang, Hyoungshick Kim:
Poster: A Proof-of-Stake (PoS) Blockchain Protocol using Fair and Dynamic Sharding Management. CCS 2019: 2553-2555 - [c98]Heejun Jang, Beomjin Jin, Sangwon Hyun, Hyoungshick Kim:
Kerberoid: A Practical Android App Decompilation System with Multiple Decompilers. CCS 2019: 2557-2559 - [c97]Joon Kuy Han, Hyoungshick Kim, Simon S. Woo:
Nickel to Lego: Using Foolgle</> to Create Adversarial Examples to Fool Google Cloud Speech-to-Text API. CCS 2019: 2593-2595 - [c96]