논문실적 – 목록
논문실적 – 목록
Home / 논문실적 – 목록
논문실적 – 목록
번호제목작성자날짜조회
318[SCI paper] Haeyoung Kim, Harashta Tatimma Larasati, Jonguk Park, Howon Kim and Donghyun Kwon, "DEMIX: Domain-Enforced Memory Isolation for Embedded System", Sensors 2023, 23(7), 3568; https://doi.org/10.3390/s23073568 Level 102023-06-0818
274[국내학회] 홍윤영,최창우,김호원, "Segmentation 기반 적대적 공격 동향 조사", 2022 한국정보처리학회 춘계학술발표대회, 2022.05 Level 102023-01-1318
271[국내학회] 조현진,김호원, "딥러닝 및 이미지화를 통한 악성코드 분류 시스템", 제2회 한국인공지능학술대회, 2021.09 Level 102023-01-1318
249[국내학회] 윤영여,이진재,김호원, "하드웨어 트로이잔 개요 및 분류", 한국정보보호학회 동계학술대회, 2020.11 Level 102023-01-1318
225[SCI paper] Thi-Thu-Huong Le, Hyoeun Kang, Howon Kim, "Towards Incompressible Laminar Flow Estimation Based on Interpolated Feature Generation and Deep Learning", Sustainability 2022, 14, 11996. https://doi.org/10.3390/su141911996 Level 102022-09-2919
313[국제학회] Naufal Suryanto, Yongsu Kim, Hyoeun Kang, Harashta Tatimma Larasati, Youngyeo Yun, Thi-Thu-Huong Le, Hunmin Yang, Se-Yoon Oh, Howon Kim "DTA: Physical Camouflage Attacks using Differentiable Transformation Network", Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2022, pp. 15305-15314 Level 102023-01-1620
305[국내학회] Renitia Murti Rahayu, Thi-Thu-Huong Le, Howon Kim (Jul 2018), “Implementation of MbedOS- TLS (Transport Layer Security) Applications on a Crypto Hardware”, Korea Institute of Information Security and Cryptology (KIISC). Level 102023-01-1620
298[국내학회] 최창우,홍윤영,신영재,김호원, "TransUNet 기반의 구름 유동 예측", 제3회 한국인공지능학술대회, 2022.09 Level 102023-01-1320
308[국제학회] Jihyun Kim, Jaehyun Kim, Huong Le Thi Thu, and Howon Kim (Feb 2016), “Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection”, In proceeding on the International Conference on Platform Technology and Service, pp.1-5, DOI: 10.1109/PlatCon.2016.7456805, https://ieeexplore.ieee.org/document/7456805. Level 102023-01-1621
259[국내학회] 윤여영,심준석,김호원, "적대적 예제를 이용한 스테가노그래피 이미지", 2021년도 한국정보보호학회 하계학술대회, 2021.06 Level 102023-01-1321