2024 | Evaluation of Malware Classification Models for Heterogeneous Data | 배호 | Article |
2024 | 5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy | 김종길 | Article |
2023 | Oracle Indistinguishability and Its Applications | 윤아람 | Article |
2023 | Studies on Inspecting Encrypted Data: Trends and Challenges | 김종길 | Article |
2023 | Backward Compatible Identity-Based Encryption | 김종길 | Article |
2022 | WBC image classification and generative models based on convolutional neural network | 양대헌 | Article |
2022 | ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation | 양대헌 | Article |
2022 | A One-Page Text Entry Method Optimized for Rectangle Smartwatches | 양대헌 | Article |
2022 | Understanding Internet of Things malware by analyzing endpoints in their static artifacts | 양대헌 | Article |
2022 | Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions | 양대헌 | Article |
2022 | DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification | 양대헌 | Article |
2022 | Investigating the effect of traffic sampling on machine learning-based network intrusion detection approaches | 양대헌 | Article |
2022 | Data Embedding Scheme for Efficient Program Behavior Modeling With Neural Networks | 배호 | Article |
2022 | Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns | 김종길 | Article |
2021 | Secure Fully Homomorphic Authenticated Encryption | 윤아람 | Article |
2021 | A network-independent tool-based usable authentication system for Internet of Things devices | 양대헌 | Article |
2021 | Contra-∗: Mechanisms for countering spam attacks on blockchain's memory pools | 양대헌 | Article |
2021 | E-PoS: Making Proof-of-Stake Decentralized and Fair | 양대헌 | Article |
2021 | Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey | 양대헌 | Article |
2021 | SSD-Assisted Ransomware Detection and Data Recovery Techniques | 양대헌 | Article |