Sanghyun Hong

Orcid: 0000-0003-4154-7611

Affiliations:
  • Oregon State University, Corvallis, OR, USA
  • University of Maryland, College Park, MD, USA (PhD 2021)


According to our database1, Sanghyun Hong authored at least 41 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Visualizationary: Automating Design Feedback for Visualization Designers using LLMs.
CoRR, 2024

Hard Work Does Not Always Pay Off: Poisoning Attacks on Neural Architecture Search.
CoRR, 2024

Privacy Backdoors: Enhancing Membership Inference through Poisoning Pre-trained Models.
CoRR, 2024

Diffusion Denoising as a Certified Defense against Clean-label Poisoning.
CoRR, 2024

Parameterized Physics-informed Neural Networks for Parameterized PDEs.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

LeaPformer: Enabling Linear Transformers for Autoregressive and Simultaneous Tasks via Learned Proportions.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

PAC-FNO: Parallel-Structured All-Component Fourier Neural Operators for Recognizing Low-Quality Images.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Message from the DSML Workshop Chairs; DSN-W 2024.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

When Do "More Contexts" Help with Sarcasm Recognition?
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024

Identifying Contemporaneous and Lagged Dependence Structures by Promoting Sparsity in Continuous-time Neural Networks.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

Operator-Learning-Inspired Modeling of Neural Ordinary Differential Equations.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
A Scanner Deeply: Predicting Gaze Heatmaps on Visualizations Using Crowdsourced Eye Movement Data.
IEEE Trans. Vis. Comput. Graph., 2023

Perceptual Pat: A Virtual Human System for Iterative Visualization Design.
CoRR, 2023

Publishing Efficient On-device Models Increases Adversarial Vulnerability.
Proceedings of the 2023 IEEE Conference on Secure and Trustworthy Machine Learning, 2023

BERT Lost Patience Won't Be Robust to Adversarial Slowdown.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Learning Unforeseen Robustness from Out-of-distribution Data Using Equivariant Domain Translator.
Proceedings of the International Conference on Machine Learning, 2023

Perceptual Pat: A Virtual Human Visual System for Iterative Visualization Design.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Time Series Forecasting with Hypernetworks Generating Parameters in Advance.
CoRR, 2022

Mining Causality from Continuous-time Dynamics Models: An Application to Tsunami Forecasting.
CoRR, 2022

AdamNODEs: When Neural ODE Meets Adaptive Moment Estimation.
CoRR, 2022

Handcrafted Backdoors in Deep Neural Networks.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Improving cross-platform binary analysis using representation learning via graph alignment.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

Data Poisoning Won't Save You From Facial Recognition.
Proceedings of the Tenth International Conference on Learning Representations, 2022

Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Building Secure and Reliable Deep Learning Systems from a Systems Security Perspective.
PhD thesis, 2021

Qu-ANTI-zation: Exploiting Quantization Artifacts for Achieving Adversarial Outcomes.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Inference.
Proceedings of the 9th International Conference on Learning Representations, 2021

Certified Malware in South Korea: A Localized Study of Breaches of Trust in Code-Signing PKI Ecosystem.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
On the Effectiveness of Regularization Against Membership Inference Attacks.
CoRR, 2020

On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping.
CoRR, 2020

How to 0wn the NAS in Your Spare Time.
Proceedings of the 8th International Conference on Learning Representations, 2020

2019
Poster: On the Feasibility of Training Neural Networks with Visibly Watermarked Dataset.
CoRR, 2019

Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks.
Proceedings of the 28th USENIX Security Symposium, 2019

Shallow-Deep Networks: Understanding and Mitigating Network Overthinking.
Proceedings of the 36th International Conference on Machine Learning, 2019

2018
Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks.
CoRR, 2018

Peek-a-boo: Inferring program behaviors in a virtualized infrastructure without introspection.
Comput. Secur., 2018

On Integrating Knowledge Graph Embedding into SPARQL Query Processing.
Proceedings of the 2018 IEEE International Conference on Web Services, 2018

Go Serverless: Securing Cloud via Serverless Design Patterns.
Proceedings of the 10th USENIX Workshop on Hot Topics in Cloud Computing, 2018

PAGE: Answering Graph Pattern Queries via Knowledge Graph Embedding.
Proceedings of the Big Data - BigData 2018, 2018

2017
Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning.
CoRR, 2017

SENA: Preserving Social Structure for Network Embedding.
Proceedings of the 28th ACM Conference on Hypertext and Social Media, 2017


  Loading...