Trust evaluation model for wireless sensor networks J Hur, Y Lee, H Yoon, D Choi, S Jin The 7th International Conference on Advanced Communication Technology, 2005 …, 2005 | 103 | 2005 |
Apparatus and Method for Providing Personal Information Sharing Service Using Signed Callback Url Message SH Kim, DS Choi, JH Noh, SR Cho, YS Cho, SH Jin US Patent App. 12/096,415, 2008 | 85 | 2008 |
Cluster‐Based Trust Evaluation Scheme in an Ad Hoc Network S Jin, C Park, D Choi, K Chung, H Yoon ETRI journal 27 (4), 465-468, 2005 | 60 | 2005 |
Selective audio adversarial example in evasion attack on speech recognition system H Kwon, Y Kim, H Yoon, D Choi IEEE Transactions on Information Forensics and Security 15, 526-538, 2019 | 57 | 2019 |
Method of validating certificate by certificate validation server using certificate policies and certificate policy mapping in public key infrastructure JH Roh, YS Cho, SR Cho, DS Choi, TS Kim, HS Kim, SH Jin US Patent 7,478,236, 2009 | 50 | 2009 |
Multi-targeted adversarial example in evasion attack on deep neural network H Kwon, Y Kim, KW Park, H Yoon, D Choi IEEE Access 6, 46084-46096, 2018 | 43 | 2018 |
Accurate indoor proximity zone detection based on time window and frequency with bluetooth low energy DY Kim, SH Kim, D Choi, SH Jin Procedia Computer Science 56, 88-95, 2015 | 38 | 2015 |
Method for modifying validity of a certificate using biometric information in public key infrastructure-based authentication system JH Roh, T Kim, HS Kim, DS Choi, YS Cho, SR Cho, SH Jin US Patent 7,366,904, 2008 | 35 | 2008 |
Portable USB storage device DS Choi, HS Kim, T Kim, JH Roh, SR Cho, YS Cho, SH Jin US Patent 7,133,296, 2006 | 27 | 2006 |
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier H Kwon, Y Kim, KW Park, H Yoon, D Choi computers & security 78, 380-397, 2018 | 24 | 2018 |
Classification score approach for detecting adversarial example in deep neural network H Kwon, Y Kim, H Yoon, D Choi Multimedia Tools and Applications 80, 10339-10360, 2021 | 22 | 2021 |
Method and apparatus for transmitting message in heterogeneous federated environment, and method and apparatus for providing service using the message SH Kim, DS Choi, JH Noh, SR Cho, YS Cho, SH Jin US Patent App. 12/095,560, 2010 | 21 | 2010 |
Random untargeted adversarial example on deep neural network H Kwon, Y Kim, H Yoon, D Choi Symmetry 10 (12), 738, 2018 | 20 | 2018 |
Advanced ensemble adversarial example on unknown deep neural network classifiers H Kwon, Y Kim, KW Park, H Yoon, D Choi IEICE TRANSACTIONS on Information and Systems 101 (10), 2485-2500, 2018 | 20 | 2018 |
Forged signature distinction using convolutional neural network for feature extraction S Nam, H Park, C Seo, D Choi Applied Sciences 8 (2), 153, 2018 | 20 | 2018 |
Apparatus and method for inputting user password SH Kim, T Kwon, SH Kim, DS Choi, JH Noh, S Cho, YS Cho, SH Jin US Patent App. 13/286,772, 2012 | 20 | 2012 |
Effects of hormone therapy on ambulatory blood pressure in postmenopausal Korean women DY Lee, JY Kim, JH Kim, DS Choi, DK Kim, KK Koh, BK Yoon Climacteric 14 (1), 92-99, 2011 | 20 | 2011 |
Internet Access Time Control Method Using Authentication Assertion JH Noh, T Kim, SH Kim, DS Choi, SR Cho, YS Cho, SH Jin US Patent App. 11/720,911, 2008 | 20 | 2008 |
Captcha image generation systems using generative adversarial networks H Kwon, Y Kim, H Yoon, D Choi IEICE TRANSACTIONS on Information and Systems 101 (2), 543-546, 2018 | 19 | 2018 |
Restricted evasion attack: Generation of restricted-area adversarial example H Kwon, H Yoon, D Choi IEEE Access 7, 60908-60919, 2019 | 18 | 2019 |