Browse > Article List

논문
1 The Impact of Various Degrees of Composite Minimax ApproximatePolynomials on Convolutional Neural Networks over Fully HomomorphicEncryption
Junghyun Lee;Jong-Seon No; / Korea Institute of Information Security and Cryptology , v.33, no.6, pp.861-868,
2 New Distinguishing Attacks on Sparkle384 Reduced to 6 Rounds and Sparkle512 Reduced to 7 Rounds
Deukjo Hong;Donghoon Chang; / Korea Institute of Information Security and Cryptology , v.33, no.6, pp.869-879,
3 DL-ML Fusion Hybrid Model for Malicious Web Site URL Detection Based on URL Lexical Features
Dae-yeob Kim; / Korea Institute of Information Security and Cryptology , v.33, no.6, pp.881-891,
4 A Study on the Risks of Technology Leakage Using Smartwatch and Its Countermeasures Focusing on Galaxy Watch
Seungjae Jeon;Jaehyun Chung;Doowon Jeong; / Korea Institute of Information Security and Cryptology , v.33, no.6, pp.893-906,
5 Secure Self-Driving Car System Resistant to the Adversarial Evasion Attacks
Seungyeol Lee;Hyunro Lee;Jaecheol Ha; / Korea Institute of Information Security and Cryptology , v.33, no.6, pp.907-917,
6 Weight Recovery Attacks for DNN-Based MNIST Classifier Using Side Channel Analysis and Implementation of Countermeasures
Youngju Lee;Seungyeol Lee;Jeacheol Ha; / Korea Institute of Information Security and Cryptology , v.33, no.6, pp.919-928,
7 Detection of TrustZone Rootkits Using ARM PMU Events
Jimin Choi;Youngjoo Shin; / Korea Institute of Information Security and Cryptology , v.33, no.6, pp.929-938,
8 A Study on the Impact of Applying Network Address Mutation Technology within the Network Protection System
Suwon Lee;Seyoung Hwang;SeukGue Hong; / Korea Institute of Information Security and Cryptology , v.33, no.6, pp.939-946,
9 Anonymous Electronic Promissory Note System Based on Blockchain
HyunJoo Woo;Hyoseung Kim;Dong Hoon Lee; / Korea Institute of Information Security and Cryptology , v.33, no.6, pp.947-960,
10 Analysis of Network Security Policy Enforcement in Container Environments
Bom Kim;Seungsoo Lee; / Korea Institute of Information Security and Cryptology , v.33, no.6, pp.961-973,
11 A Study on the Improvement of Domestic Policies and Guidelines for Secure AI Services
Jiyoun Kim;Byougjin Seok;Yeog Kim;Changhoon Lee; / Korea Institute of Information Security and Cryptology , v.33, no.6, pp.975-987,
12 Secure Boot Security Requirements for Cryptographic Modules against Supply Chain Threats
Jong Wook Park;Sanghan Lee;Bonseok Koo;Seon Yeob Baek;Sang Yun Han; / Korea Institute of Information Security and Cryptology , v.33, no.6, pp.989-1000,
13 A Study on Applying Zero Trust Architecture: Focusing on Implementing Remote Work System
Jaewoo Do;Keumseok Kang; / Korea Institute of Information Security and Cryptology , v.33, no.6, pp.1001-1020,
14 Reinforcement Learning-Based APT Attack Response Technique Utilizing the Availability Status of Assets
Hyoung Rok Kim;Changhee Choi; / Korea Institute of Information Security and Cryptology , v.33, no.6, pp.1021-1031,
15 Intrusion Detection System Utilizing Stack Ensemble and Adjacent Netflow
Ji-Hyun Sung;Kwon-Yong Lee;Sang-Won Lee;Min-Jae Seok;Se-Rin Kim;Harksu Cho; / Korea Institute of Information Security and Cryptology , v.33, no.6, pp.1033-1042,
16 De-Obfuscated Scheme for Obfuscation Techniques Based on Trampoline Code
Minho Kim;Jeong Hyun Yi;Haehyun Cho; / Korea Institute of Information Security and Cryptology , v.33, no.6, pp.1043-1053,
17 Federated Deep Reinforcement Learning Based on Privacy Preserving for Industrial Internet of Things
Chae-Rim Han;Sun-Jin Lee;Il-Gu Lee; / Korea Institute of Information Security and Cryptology , v.33, no.6, pp.1055-1065,
18 Classification of Malware Families Using Hybrid Datasets
Seo-Woo Choi;Myeong-Jin Han;Yeon-Ji Lee;Il-Gu Lee; / Korea Institute of Information Security and Cryptology , v.33, no.6, pp.1067-1076,
19 Protecting Multi Ranked Searchable Encryption in Cloud Computing from Honest-but-Curious Trapdoor Generating Center
YeEun Kim;Heekuck Oh; / Korea Institute of Information Security and Cryptology , v.33, no.6, pp.1077-1086,
20 Autoencoder-Based Defense Technique against One-Pixel Adversarial Attacks in Image Classification
Jeong-hyun Sim;Hyun-min Song; / Korea Institute of Information Security and Cryptology , v.33, no.6, pp.1087-1098,
21 Scaling Attack Method for Misalignment Error of Camera-LiDAR Calibration Model
Yi-ji Im;Dae-seon Choi; / Korea Institute of Information Security and Cryptology , v.33, no.6, pp.1099-1110,
22 Membership Inference Attack against Text-to-Image Model Based on Generating Adversarial Prompt Using Textual Inversion
Yoonju Oh;Sohee Park;Daeseon Choi; / Korea Institute of Information Security and Cryptology , v.33, no.6, pp.1111-1123,