Jin-Myeong Shin

Orcid: 0000-0001-8580-6887

According to our database1, Jin-Myeong Shin authored at least 15 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Human-Unrecognizable Differential Private Noised Image Generation Method.
Sensors, May, 2024

Zero-SAD: Zero-Shot Learning Using Synthetic Abnormal Data for Abnormal Behavior Detection on Private Cloud.
Proceedings of the 2024 ACM Symposium on Cloud Computing, 2024

2023
PIHA: Detection method using perceptual image hashing against query-based adversarial attacks.
Future Gener. Comput. Syst., August, 2023

Task-Specific Adaptive Differential Privacy Method for Structured Data.
Sensors, February, 2023

2022
A Study on Prevention and Automatic Recovery of Blockchain Networks Against Persistent Censorship Attacks.
IEEE Access, 2022

CodeNet: Code-Targeted Convolutional Neural Network Architecture for Smart Contract Vulnerability Detection.
IEEE Access, 2022

ARGAN: Adversarially Robust Generative Adversarial Networks for Deep Neural Networks Against Adversarial Examples.
IEEE Access, 2022

2021
EEJE: Two-Step Input Transformation for Robust DNN Against Adversarial Examples.
IEEE Trans. Netw. Sci. Eng., 2021

Is Homomorphic Encryption-Based Deep Learning Secure Enough?
Sensors, 2021

2020
Structural Image De-Identification for Privacy-Preserving Deep Learning.
IEEE Access, 2020

2019
Dynamic Nonparametric Random Forest Using Covariance.
Secur. Commun. Networks, 2019

Unsupervised multi-stage attack detection framework without details on single-stage attacks.
Future Gener. Comput. Syst., 2019

Robustness Analysis of CNN-based Malware Family Classification Methods Against Various Adversarial Attacks.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Privacy-Preserving Compressed Reference-Oriented Alignment Map Using Decentralized Storage.
IEEE Access, 2018

Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018


  Loading...