Follow
Daeseon Choi
Daeseon Choi
Dept. of Medical Information, Kongju National Univ.
Verified email at kongju.ac.kr
Title
Cited by
Cited by
Year
Trust evaluation model for wireless sensor networks
J Hur, Y Lee, H Yoon, D Choi, S Jin
The 7th International Conference on Advanced Communication Technology, 2005 …, 2005
1032005
Apparatus and Method for Providing Personal Information Sharing Service Using Signed Callback Url Message
SH Kim, DS Choi, JH Noh, SR Cho, YS Cho, SH Jin
US Patent App. 12/096,415, 2008
852008
Cluster‐Based Trust Evaluation Scheme in an Ad Hoc Network
S Jin, C Park, D Choi, K Chung, H Yoon
ETRI journal 27 (4), 465-468, 2005
602005
Selective audio adversarial example in evasion attack on speech recognition system
H Kwon, Y Kim, H Yoon, D Choi
IEEE Transactions on Information Forensics and Security 15, 526-538, 2019
572019
Method of validating certificate by certificate validation server using certificate policies and certificate policy mapping in public key infrastructure
JH Roh, YS Cho, SR Cho, DS Choi, TS Kim, HS Kim, SH Jin
US Patent 7,478,236, 2009
502009
Multi-targeted adversarial example in evasion attack on deep neural network
H Kwon, Y Kim, KW Park, H Yoon, D Choi
IEEE Access 6, 46084-46096, 2018
432018
Accurate indoor proximity zone detection based on time window and frequency with bluetooth low energy
DY Kim, SH Kim, D Choi, SH Jin
Procedia Computer Science 56, 88-95, 2015
382015
Method for modifying validity of a certificate using biometric information in public key infrastructure-based authentication system
JH Roh, T Kim, HS Kim, DS Choi, YS Cho, SR Cho, SH Jin
US Patent 7,366,904, 2008
352008
Portable USB storage device
DS Choi, HS Kim, T Kim, JH Roh, SR Cho, YS Cho, SH Jin
US Patent 7,133,296, 2006
272006
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier
H Kwon, Y Kim, KW Park, H Yoon, D Choi
computers & security 78, 380-397, 2018
242018
Classification score approach for detecting adversarial example in deep neural network
H Kwon, Y Kim, H Yoon, D Choi
Multimedia Tools and Applications 80, 10339-10360, 2021
222021
Method and apparatus for transmitting message in heterogeneous federated environment, and method and apparatus for providing service using the message
SH Kim, DS Choi, JH Noh, SR Cho, YS Cho, SH Jin
US Patent App. 12/095,560, 2010
212010
Random untargeted adversarial example on deep neural network
H Kwon, Y Kim, H Yoon, D Choi
Symmetry 10 (12), 738, 2018
202018
Advanced ensemble adversarial example on unknown deep neural network classifiers
H Kwon, Y Kim, KW Park, H Yoon, D Choi
IEICE TRANSACTIONS on Information and Systems 101 (10), 2485-2500, 2018
202018
Forged signature distinction using convolutional neural network for feature extraction
S Nam, H Park, C Seo, D Choi
Applied Sciences 8 (2), 153, 2018
202018
Apparatus and method for inputting user password
SH Kim, T Kwon, SH Kim, DS Choi, JH Noh, S Cho, YS Cho, SH Jin
US Patent App. 13/286,772, 2012
202012
Effects of hormone therapy on ambulatory blood pressure in postmenopausal Korean women
DY Lee, JY Kim, JH Kim, DS Choi, DK Kim, KK Koh, BK Yoon
Climacteric 14 (1), 92-99, 2011
202011
Internet Access Time Control Method Using Authentication Assertion
JH Noh, T Kim, SH Kim, DS Choi, SR Cho, YS Cho, SH Jin
US Patent App. 11/720,911, 2008
202008
Captcha image generation systems using generative adversarial networks
H Kwon, Y Kim, H Yoon, D Choi
IEICE TRANSACTIONS on Information and Systems 101 (2), 543-546, 2018
192018
Restricted evasion attack: Generation of restricted-area adversarial example
H Kwon, H Yoon, D Choi
IEEE Access 7, 60908-60919, 2019
182019
The system can't perform the operation now. Try again later.
Articles 1–20