Showing
1 - 12
results of
12
for search '
Daeseon Choi
'
Skip to content
Home
High Impact Articles
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
Jawi Collection
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Daeseon Choi
Showing
1 - 12
results of
12
for search '
Daeseon Choi
'
, query time: 0.10s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Eavesdropping of Magnetic Secure Transmission Signals and Its Security Implications for a Mobile Payment Protocol
by
Daeseon
Choi
,
Younho Lee
Published 2018-01-01
Get full text
Article
2
Partial Retraining Substitute Model for Query-Limited Black-Box Attacks
by
Hosung Park
,
Gwonsang Ryu
,
Daeseon
Choi
Published 2020-10-01
Get full text
Article
3
Address Authentication Method for Sustainable Social Qualification
by
Hosung Park
,
Seungsoo Nam
,
Daeseon
Choi
Published 2020-02-01
Get full text
Article
4
Adversarial Attack Based on Perturbation of Contour Region to Evade Steganalysis-Based Detection
by
Hyunsik Na
,
Gwonsang Ryu
,
Daeseon
Choi
Published 2021-01-01
Get full text
Article
5
Restricted Evasion Attack: Generation of Restricted-Area Adversarial Example
by
Hyun Kwon
,
Hyunsoo Yoon
,
Daeseon
Choi
Published 2019-01-01
Get full text
Article
6
Random Untargeted Adversarial Example on Deep Neural Network
by
Hyun Kwon
,
Yongchul Kim
,
Hyunsoo Yoon
,
Daeseon
Choi
Published 2018-12-01
Get full text
Article
7
Forged Signature Distinction Using Convolutional Neural Network for Feature Extraction
by
Seungsoo Nam
,
Hosung Park
,
Changho Seo
,
Daeseon
Choi
Published 2018-01-01
Get full text
Article
8
Optimal Cluster Expansion-Based Intrusion Tolerant System to Prevent Denial of Service Attacks
by
Hyun Kwon
,
Yongchul Kim
,
Hyunsoo Yoon
,
Daeseon
Choi
Published 2017-11-01
Get full text
Article
9
Selective Untargeted Evasion Attack: An Adversarial Example That Will Not Be Classified as Certain Avoided Classes
by
Hyun Kwon
,
Yongchul Kim
,
Hyunsoo Yoon
,
Daeseon
Choi
Published 2019-01-01
Get full text
Article
10
UAV-Undertaker: Securely Verifiable Remote Erasure Scheme with a Countdown-Concept for UAV via Randomized Data Synchronization
by
Sieun Kim
,
Taek-Young Youn
,
Daeseon
Choi
,
Ki-Woong Park
Published 2019-01-01
Get full text
Article
11
Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network
by
Hyun Kwon
,
Yongchul Kim
,
Ki-Woong PARK
,
Hyunsoo Yoon
,
Daeseon
Choi
Published 2018-01-01
Get full text
Article
12
Context-Aware Multimodal FIDO Authenticator for Sustainable IT Services
by
Seung-Hyun Kim
,
Daeseon
Choi
,
Soo-Hyung Kim
,
Sangrae Cho
,
Kyung-Soo Lim
Published 2018-05-01
Get full text
Article
Search Tools:
Get RSS Feed
—
Email this Search
Loading...