Selective audio adversarial example in evasion attack on speech recognition system H Kwon, Y Kim, H Yoon, D Choi IEEE Transactions on Information Forensics and Security 15, 526-538, 2019 | 57 | 2019 |
POSTER: Detecting audio adversarial example through audio modification H Kwon, H Yoon, KW Park Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 46 | 2019 |
Multi-targeted adversarial example in evasion attack on deep neural network H Kwon, Y Kim, KW Park, H Yoon, D Choi IEEE Access 6, 46084-46096, 2018 | 43 | 2018 |
Instruction2vec: Efficient preprocessor of assembly code to detect software weakness with CNN Y Lee, H Kwon, SH Choi, SH Lim, SH Baek, KW Park Applied Sciences 9 (19), 4086, 2019 | 37 | 2019 |
Acoustic-decoy: Detection of adversarial examples through audio modification on speech recognition system H Kwon, H Yoon, KW Park Neurocomputing 417, 357-370, 2020 | 36 | 2020 |
Multi-targeted backdoor: Indentifying backdoor attack for multiple deep neural networks H Kwon, H Yoon, KW Park IEICE TRANSACTIONS on Information and Systems 103 (4), 883-887, 2020 | 29 | 2020 |
BlindNet backdoor: Attack on deep neural network using blind watermark H Kwon, Y Kim Multimedia Tools and Applications, 1-18, 2022 | 25 | 2022 |
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier H Kwon, Y Kim, KW Park, H Yoon, D Choi computers & security 78, 380-397, 2018 | 24 | 2018 |
Detecting backdoor attacks via class difference in deep neural networks H Kwon IEEE Access 8, 191049-191056, 2020 | 23 | 2020 |
Classification score approach for detecting adversarial example in deep neural network H Kwon, Y Kim, H Yoon, D Choi Multimedia Tools and Applications 80, 10339-10360, 2021 | 22 | 2021 |
Random untargeted adversarial example on deep neural network H Kwon, Y Kim, H Yoon, D Choi Symmetry 10 (12), 738, 2018 | 21 | 2018 |
Defending deep neural networks against backdoor attack by using de-trigger autoencoder H Kwon IEEE Access, 2021 | 20 | 2021 |
Advanced ensemble adversarial example on unknown deep neural network classifiers H Kwon, Y Kim, KW Park, H Yoon, D Choi IEICE TRANSACTIONS on Information and Systems 101 (10), 2485-2500, 2018 | 20 | 2018 |
Captcha image generation systems using generative adversarial networks H Kwon, Y Kim, H Yoon, D Choi IEICE TRANSACTIONS on Information and Systems 101 (2), 543-546, 2018 | 19 | 2018 |
Restricted evasion attack: Generation of restricted-area adversarial example H Kwon, H Yoon, D Choi IEEE Access 7, 60908-60919, 2019 | 18 | 2019 |
Optimal cluster expansion-based intrusion tolerant system to prevent denial of service attacks H Kwon, Y Kim, H Yoon, D Choi Applied Sciences 7 (11), 1186, 2017 | 18 | 2017 |
CAPTCHA Image Generation: Two-Step Style-Transfer Learning in Deep Neural Networks H Kwon, H Yoon, KW Park Sensors 20 (5), 1495, 2020 | 17 | 2020 |
Diversity adversarial training against adversarial attack on deep neural networks H Kwon, J Lee Symmetry 13 (3), 428, 2021 | 15 | 2021 |
AdvGuard: fortifying deep neural networks against optimized adversarial example attack H Kwon, J Lee IEEE Access, 2020 | 15 | 2020 |
Robust captcha image generation enhanced with adversarial example methods H Kwon, H Yoon, KW Park IEICE TRANSACTIONS on Information and Systems 103 (4), 879-882, 2020 | 15 | 2020 |