Daeseon Choi
Orcid: 0000-0002-1438-0265
According to our database1,
Daeseon Choi
authored at least 48 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Int. J. Inf. Sec., February, 2024
Judgment of Thoughts: Courtroom of the Binary Logical Reasoning in Large Language Models.
CoRR, 2024
IEEE Access, 2024
Proceedings of the ICT Systems Security and Privacy Protection, 2024
2023
A hybrid adversarial training for deep learning model and denoising network resistant to adversarial examples.
Appl. Intell., April, 2023
A Study on the Interoperability Technology of Digital Identification Based on WACI Protocol with Multiparty Distributed Signature.
Sensors, 2023
Systematic Evaluation of Robustness Against Model Inversion Attacks on Split Learning.
Proceedings of the Information Security Applications - 24th International Conference, 2023
2022
Feature-Based Adversarial Training for Deep Learning Models Resistant to Transferable Adversarial Examples.
IEICE Trans. Inf. Syst., 2022
Extracting a Minimal Trigger for an Efficient Backdoor Poisoning Attack Using the Activation Values of a Deep Neural Network.
Proceedings of the WDC@AsiaCCS '22: Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes, 2022
2021
Classification score approach for detecting adversarial example in deep neural network.
Multim. Tools Appl., 2021
Data Correction For Enhancing Classification Accuracy By Unknown Deep Neural Network Classifiers.
KSII Trans. Internet Inf. Syst., 2021
Adversarial attacks by attaching noise markers on the face against deep face recognition.
J. Inf. Secur. Appl., 2021
Adversarial Attack Based on Perturbation of Contour Region to Evade Steganalysis-Based Detection.
IEEE Access, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
2019
UAV-Undertaker: Securely Verifiable Remote Erasure Scheme with a Countdown-Concept for UAV via Randomized Data Synchronization.
Wirel. Commun. Mob. Comput., 2019
IEEE Access, 2019
Selective Untargeted Evasion Attack: An Adversarial Example That Will Not Be Classified as Certain Avoided Classes.
IEEE Access, 2019
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2019
2018
KSII Trans. Internet Inf. Syst., 2018
Hidden Singer: Distinguishing Imitation Singers Based on Training with Only the Original Song.
IEICE Trans. Inf. Syst., 2018
IEICE Trans. Inf. Syst., 2018
IEICE Trans. Inf. Syst., 2018
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier.
Comput. Secur., 2018
IEEE Access, 2018
Eavesdropping of Magnetic Secure Transmission Signals and Its Security Implications for a Mobile Payment Protocol.
IEEE Access, 2018
Proceedings of the Information Security Applications - 19th International Conference, 2018
Fooling a Neural Network in Military Environments: Random Untargeted Adversarial Example.
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Applying Time-Lapse Concepts onto Storage System for Long-Term System Trace Analysis: Technical Challenges and Blueprints.
Proceedings of the First IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2018
2017
Private attribute inference from Facebook's public text metadata: a case study of Korean users.
Ind. Manag. Data Syst., 2017
Detecting Online Game Chargeback Fraud Based on Transaction Sequence Modeling Using Recurrent Neural Network.
Proceedings of the Information Security Applications - 18th International Conference, 2017
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
2016
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016
2015
IEICE Trans. Commun., 2015
Effects of Contextual Properties on Users' Privacy Preferences in Mobile Computing Environments.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Security Standardisation Research - Second International Conference, 2015
Accurate Indoor Proximity Zone Detection Based on Time Window and Frequency with Bluetooth Low Energy.
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015
2013
Geo-location based QR-Code authentication scheme to defeat active real-time phishing attack.
Proceedings of the DIM'13, 2013
2010
Gatekeeper: providing secure interoperability between mobile web-browser and local resources.
Proceedings of the 6th Workshop on Digital Identity Management, 2010
2009
Digital ID Wallet: Provide Selective Disclosure and Users Control of Identity Information.
Proceedings of the 2009 International Conference on Security & Management, 2009
2008
Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks.
IEICE Trans. Commun., 2008
2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
Proceedings of the Information Networking, 2003