Follow
Ki-Woong Park
Title
Cited by
Cited by
Year
THEMIS: A Mutually verifiable billing system for the cloud computing environment
KW Park, J Han, JW Chung, KH Park
IEEE Transactions on Services Computing 6 (3), 300-313, 2012
922012
Character input device using bio radar unit and tilt sensor
KH Park, KW Park, SA Ko
US Patent 8,199,104, 2012
742012
Learning binary code with deep learning to detect software weakness
YJ Lee, SH Choi, C Kim, SH Lim, KW Park
KSII the 9th international conference on internet (ICONI) 2017 symposium, 2017
682017
Efficient page caching algorithm with prediction and migration for a hybrid main memory
H Seok, Y Park, KW Park, KH Park
ACM SIGAPP Applied Computing Review 11 (4), 38-48, 2011
612011
POSTER: Detecting audio adversarial example through audio modification
H Kwon, H Yoon, KW Park
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
562019
Multi-targeted adversarial example in evasion attack on deep neural network
H Kwon, Y Kim, KW Park, H Yoon, D Choi
IEEE Access 6, 46084-46096, 2018
442018
Acoustic-decoy: Detection of adversarial examples through audio modification on speech recognition system
H Kwon, H Yoon, KW Park
Neurocomputing 417, 357-370, 2020
422020
Instruction2vec: Efficient preprocessor of assembly code to detect software weakness with CNN
Y Lee, H Kwon, SH Choi, SH Lim, SH Baek, KW Park
Applied Sciences 9 (19), 4086, 2019
422019
A ubiquitous fashionable computer with an i-Throw device on a location-based service environment
J Lee, SH Lim, JW Yoo, KW Park, HJ Choi, KH Park
21st International Conference on Advanced Information Networking and …, 2007
422007
Computationally efficient PKI-based single sign-on protocol, PKASSO for mobile devices
KW Park, SS Lim, KH Park
IEEE Transactions on Computers 57 (6), 821-834, 2008
402008
Themis: Towards mutually verifiable billing transactions in the cloud computing environment
KW Park, SK Park, J Han, KH Park
2010 IEEE 3rd International Conference on Cloud Computing, 139-147, 2010
322010
Multi-targeted backdoor: Indentifying backdoor attack for multiple deep neural networks
H Kwon, H Yoon, KW Park
IEICE TRANSACTIONS on Information and Systems 103 (4), 883-887, 2020
312020
Efficient machine learning over encrypted data with non-interactive communication
H Park, P Kim, H Kim, KW Park, Y Lee
Computer Standards & Interfaces 58, 87-108, 2018
312018
GHOST: GPGPU-offloaded high performance storage I/O deduplication for primary storage system
C Kim, KW Park, KH Park
Proceedings of the 2012 International Workshop on Programming Models and …, 2012
312012
Mn-mate: Resource management of manycores with dram and nonvolatile memories
KH Park, Y Park, W Hwang, KW Park
2010 IEEE 12th International Conference on High Performance Computing and …, 2010
302010
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier
H Kwon, Y Kim, KW Park, H Yoon, D Choi
computers & security 78, 380-397, 2018
242018
Advanced ensemble adversarial example on unknown deep neural network classifiers
H Kwon, Y Kim, KW Park, H Yoon, D Choi
IEICE TRANSACTIONS on Information and Systems 101 (10), 2485-2500, 2018
212018
Rethinking deduplication in cloud: From data profiling to blueprint
C Kim, KW Park, KS Park, KH Park
The 7th International Conference on Networked Computing and Advanced …, 2011
172011
pKASSO: towards seamless authentication providing non-repudiation on resource-constrained devices
KW Park, H Seok, KH Park
21st International Conference on Advanced Information Networking and …, 2007
172007
Robust captcha image generation enhanced with adversarial example methods
H Kwon, H Yoon, KW Park
IEICE TRANSACTIONS on Information and Systems 103 (4), 879-882, 2020
162020
The system can't perform the operation now. Try again later.
Articles 1–20