2022 | Data Embedding Scheme for Efficient Program Behavior Modeling With Neural Networks | 배호 | Article |
2022 | Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns | 김종길 | Article |
2022 | DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification | 양대헌 | Article |
2021 | E-PoS: Making Proof-of-Stake Decentralized and Fair | 양대헌 | Article |
2024 | Evaluation of Malware Classification Models for Heterogeneous Data | 배호 | Article |
2020 | Exploring the Attack Surface of Blockchain: A Comprehensive Survey | 양대헌 | Article |
2021 | Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube | 양대헌 | Conference Paper |
2022 | Investigating the effect of traffic sampling on machine learning-based network intrusion detection approaches | 양대헌 | Article |
2021 | Large-scale and Robust Code Authorship Identification with Deep Feature Learning | 양대헌 | Article |
2020 | Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation | 양대헌 | Article |
2023 | Oracle Indistinguishability and Its Applications | 윤아람 | Article |
2023 | PCSF: Privacy-Preserving Content-Based Spam Filter | 김종길 | Article |
2021 | Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems | 양대헌 | Conference Paper |
2022 | Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions | 양대헌 | Article |
2021 | Secure Fully Homomorphic Authenticated Encryption | 윤아람 | Article |
2021 | Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey | 양대헌 | Article |
2022 | ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation | 양대헌 | Article |
2021 | SSD-Assisted Ransomware Detection and Data Recovery Techniques | 양대헌 | Article |
2023 | Studies on Inspecting Encrypted Data: Trends and Challenges | 김종길 | Article |
2022 | Understanding Internet of Things malware by analyzing endpoints in their static artifacts | 양대헌 | Article |