|
1 |
The Impact of Various Degrees of Composite Minimax ApproximatePolynomials on Convolutional Neural Networks over Fully HomomorphicEncryption
Junghyun Lee;Jong-Seon No;
/
Korea Institute of Information Security and Cryptology
, v.33, no.6, pp.861-868,
|
|
2 |
New Distinguishing Attacks on Sparkle384 Reduced to 6 Rounds and Sparkle512 Reduced to 7 Rounds
Deukjo Hong;Donghoon Chang;
/
Korea Institute of Information Security and Cryptology
, v.33, no.6, pp.869-879,
|
|
3 |
DL-ML Fusion Hybrid Model for Malicious Web Site URL Detection Based on URL Lexical Features
Dae-yeob Kim;
/
Korea Institute of Information Security and Cryptology
, v.33, no.6, pp.881-891,
|
|
4 |
A Study on the Risks of Technology Leakage Using Smartwatch and Its Countermeasures Focusing on Galaxy Watch
Seungjae Jeon;Jaehyun Chung;Doowon Jeong;
/
Korea Institute of Information Security and Cryptology
, v.33, no.6, pp.893-906,
|
|
5 |
Secure Self-Driving Car System Resistant to the Adversarial Evasion Attacks
Seungyeol Lee;Hyunro Lee;Jaecheol Ha;
/
Korea Institute of Information Security and Cryptology
, v.33, no.6, pp.907-917,
|
|
6 |
Weight Recovery Attacks for DNN-Based MNIST Classifier Using Side Channel Analysis and Implementation of Countermeasures
Youngju Lee;Seungyeol Lee;Jeacheol Ha;
/
Korea Institute of Information Security and Cryptology
, v.33, no.6, pp.919-928,
|
|
7 |
Detection of TrustZone Rootkits Using ARM PMU Events
Jimin Choi;Youngjoo Shin;
/
Korea Institute of Information Security and Cryptology
, v.33, no.6, pp.929-938,
|
|
8 |
A Study on the Impact of Applying Network Address Mutation Technology within the Network Protection System
Suwon Lee;Seyoung Hwang;SeukGue Hong;
/
Korea Institute of Information Security and Cryptology
, v.33, no.6, pp.939-946,
|
|
9 |
Anonymous Electronic Promissory Note System Based on Blockchain
HyunJoo Woo;Hyoseung Kim;Dong Hoon Lee;
/
Korea Institute of Information Security and Cryptology
, v.33, no.6, pp.947-960,
|
|
10 |
Analysis of Network Security Policy Enforcement in Container Environments
Bom Kim;Seungsoo Lee;
/
Korea Institute of Information Security and Cryptology
, v.33, no.6, pp.961-973,
|
|
11 |
A Study on the Improvement of Domestic Policies and Guidelines for Secure AI Services
Jiyoun Kim;Byougjin Seok;Yeog Kim;Changhoon Lee;
/
Korea Institute of Information Security and Cryptology
, v.33, no.6, pp.975-987,
|
|
12 |
Secure Boot Security Requirements for Cryptographic Modules against Supply Chain Threats
Jong Wook Park;Sanghan Lee;Bonseok Koo;Seon Yeob Baek;Sang Yun Han;
/
Korea Institute of Information Security and Cryptology
, v.33, no.6, pp.989-1000,
|
|
13 |
A Study on Applying Zero Trust Architecture: Focusing on Implementing Remote Work System
Jaewoo Do;Keumseok Kang;
/
Korea Institute of Information Security and Cryptology
, v.33, no.6, pp.1001-1020,
|
|
14 |
Reinforcement Learning-Based APT Attack Response Technique Utilizing the Availability Status of Assets
Hyoung Rok Kim;Changhee Choi;
/
Korea Institute of Information Security and Cryptology
, v.33, no.6, pp.1021-1031,
|
|
15 |
Intrusion Detection System Utilizing Stack Ensemble and Adjacent Netflow
Ji-Hyun Sung;Kwon-Yong Lee;Sang-Won Lee;Min-Jae Seok;Se-Rin Kim;Harksu Cho;
/
Korea Institute of Information Security and Cryptology
, v.33, no.6, pp.1033-1042,
|
|
16 |
De-Obfuscated Scheme for Obfuscation Techniques Based on Trampoline Code
Minho Kim;Jeong Hyun Yi;Haehyun Cho;
/
Korea Institute of Information Security and Cryptology
, v.33, no.6, pp.1043-1053,
|
|
17 |
Federated Deep Reinforcement Learning Based on Privacy Preserving for Industrial Internet of Things
Chae-Rim Han;Sun-Jin Lee;Il-Gu Lee;
/
Korea Institute of Information Security and Cryptology
, v.33, no.6, pp.1055-1065,
|
|
18 |
Classification of Malware Families Using Hybrid Datasets
Seo-Woo Choi;Myeong-Jin Han;Yeon-Ji Lee;Il-Gu Lee;
/
Korea Institute of Information Security and Cryptology
, v.33, no.6, pp.1067-1076,
|
|
19 |
Protecting Multi Ranked Searchable Encryption in Cloud Computing from Honest-but-Curious Trapdoor Generating Center
YeEun Kim;Heekuck Oh;
/
Korea Institute of Information Security and Cryptology
, v.33, no.6, pp.1077-1086,
|
|
20 |
Autoencoder-Based Defense Technique against One-Pixel Adversarial Attacks in Image Classification
Jeong-hyun Sim;Hyun-min Song;
/
Korea Institute of Information Security and Cryptology
, v.33, no.6, pp.1087-1098,
|
|
21 |
Scaling Attack Method for Misalignment Error of Camera-LiDAR Calibration Model
Yi-ji Im;Dae-seon Choi;
/
Korea Institute of Information Security and Cryptology
, v.33, no.6, pp.1099-1110,
|
|
22 |
Membership Inference Attack against Text-to-Image Model Based on Generating Adversarial Prompt Using Textual Inversion
Yoonju Oh;Sohee Park;Daeseon Choi;
/
Korea Institute of Information Security and Cryptology
, v.33, no.6, pp.1111-1123,
|
|