2024 | 5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy | 김종길 | Article |
2021 | A network-independent tool-based usable authentication system for Internet of Things devices | 양대헌 | Article |
2022 | A One-Page Text Entry Method Optimized for Rectangle Smartwatches | 양대헌 | Article |
2020 | Anomaly Detection by Learning Dynamics From a Graph | 배호 | Article |
2020 | Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions | 양대헌 | Article |
2020 | AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors | 양대헌 | Article |
2023 | Backward Compatible Identity-Based Encryption | 김종길 | Article |
2021 | Contra-∗: Mechanisms for countering spam attacks on blockchain's memory pools | 양대헌 | Article |
2022 | Data Embedding Scheme for Efficient Program Behavior Modeling With Neural Networks | 배호 | Article |
2022 | Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns | 김종길 | Article |
2022 | DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification | 양대헌 | Article |
2021 | E-PoS: Making Proof-of-Stake Decentralized and Fair | 양대헌 | Article |
2024 | Evaluation of Malware Classification Models for Heterogeneous Data | 배호 | Article |
2020 | Exploring the Attack Surface of Blockchain: A Comprehensive Survey | 양대헌 | Article |
2021 | Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube | 양대헌 | Conference Paper |
2022 | Investigating the effect of traffic sampling on machine learning-based network intrusion detection approaches | 양대헌 | Article |
2021 | Large-scale and Robust Code Authorship Identification with Deep Feature Learning | 양대헌 | Article |
2020 | Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation | 양대헌 | Article |
2023 | Oracle Indistinguishability and Its Applications | 윤아람 | Article |
2021 | Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems | 양대헌 | Conference Paper |