Trust evaluation model for wireless sensor networks J Hur, Y Lee, H Yoon, D Choi, S Jin The 7th International Conference on Advanced Communication Technology, 2005 …, 2005 | 103 | 2005 |
Apparatus and Method for Providing Personal Information Sharing Service Using Signed Callback Url Message SH Kim, DS Choi, JH Noh, SR Cho, YS Cho, SH Jin US Patent App. 12/096,415, 2008 | 88 | 2008 |
Selective audio adversarial example in evasion attack on speech recognition system H Kwon, Y Kim, H Yoon, D Choi IEEE Transactions on Information Forensics and Security 15, 526-538, 2019 | 75 | 2019 |
Cluster‐Based Trust Evaluation Scheme in an Ad Hoc Network S Jin, C Park, D Choi, K Chung, H Yoon ETRI journal 27 (4), 465-468, 2005 | 59 | 2005 |
Method of validating certificate by certificate validation server using certificate policies and certificate policy mapping in public key infrastructure JH Roh, YS Cho, SR Cho, DS Choi, TS Kim, HS Kim, SH Jin US Patent 7,478,236, 2009 | 52 | 2009 |
Multi-targeted adversarial example in evasion attack on deep neural network H Kwon, Y Kim, KW Park, H Yoon, D Choi IEEE Access 6, 46084-46096, 2018 | 45 | 2018 |
Accurate indoor proximity zone detection based on time window and frequency with bluetooth low energy DY Kim, SH Kim, D Choi, SH Jin Procedia Computer Science 56, 88-95, 2015 | 42 | 2015 |
Method for modifying validity of a certificate using biometric information in public key infrastructure-based authentication system JH Roh, T Kim, HS Kim, DS Choi, YS Cho, SR Cho, SH Jin US Patent 7,366,904, 2008 | 36 | 2008 |
Portable USB storage device DS Choi, HS Kim, T Kim, JH Roh, SR Cho, YS Cho, SH Jin US Patent 7,133,296, 2006 | 28 | 2006 |
Classification score approach for detecting adversarial example in deep neural network H Kwon, Y Kim, H Yoon, D Choi Multimedia Tools and Applications 80, 10339-10360, 2021 | 26 | 2021 |
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier H Kwon, Y Kim, KW Park, H Yoon, D Choi computers & security 78, 380-397, 2018 | 26 | 2018 |
Random untargeted adversarial example on deep neural network H Kwon, Y Kim, H Yoon, D Choi Symmetry 10 (12), 738, 2018 | 24 | 2018 |
Restricted evasion attack: Generation of restricted-area adversarial example H Kwon, H Yoon, D Choi IEEE Access 7, 60908-60919, 2019 | 23 | 2019 |
Forged signature distinction using convolutional neural network for feature extraction S Nam, H Park, C Seo, D Choi Applied Sciences 8 (2), 153, 2018 | 22 | 2018 |
Geo-location based QR-Code authentication scheme to defeat active real-time phishing attack S Kim, D Choi, S Jin, S Lee Proceedings of the 2013 ACM workshop on Digital identity management, 51-62, 2013 | 22 | 2013 |
Advanced ensemble adversarial example on unknown deep neural network classifiers H Kwon, Y Kim, KW Park, H Yoon, D Choi IEICE TRANSACTIONS on Information and Systems 101 (10), 2485-2500, 2018 | 21 | 2018 |
Captcha image generation systems using generative adversarial networks H Kwon, Y Kim, H Yoon, D Choi IEICE TRANSACTIONS on Information and Systems 101 (2), 543-546, 2018 | 21 | 2018 |
Eavesdropping {One-Time} Tokens Over Magnetic Secure Transmission in Samsung Pay D Choi, Y Lee 10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016 | 21 | 2016 |
Method and apparatus for transmitting message in heterogeneous federated environment, and method and apparatus for providing service using the message SH Kim, DS Choi, JH Noh, SR Cho, YS Cho, SH Jin US Patent App. 12/095,560, 2010 | 21 | 2010 |
Apparatus and method for inputting user password SH Kim, T Kwon, SH Kim, DS Choi, JH Noh, S Cho, YS Cho, SH Jin US Patent App. 13/286,772, 2012 | 20 | 2012 |