Taekyoung Kwon
Orcid: 0000-0002-5513-0836Affiliations:
- Yonsei University, Graduate School of Information, Seoul, South Korea
- Sejong University, Dept. of Computer Engineering, Seoul, South Korea (2001 - 2013)
- University of California, Berkeley (1999 - 2000)
- Yonsei University, Seoul, South Korea (PhD 1999)
According to our database1,
Taekyoung Kwon
authored at least 134 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
CovRL: Fuzzing JavaScript Engines with Coverage-Guided Reinforcement Learning for LLM-based Mutation.
CoRR, 2024
Amplifying Training Data Exposure through Fine-Tuning with Pseudo-Labeled Memberships.
CoRR, 2024
IEEE Access, 2024
On the Impact of Deployment Errors in Location-Based Key Predistribution Protocols for Wireless Sensor Networks.
IEEE Access, 2024
Proceedings of the 3rd ACM Workshop on the Security Implications of Deepfakes and Cheapfakes, 2024
Fuzzing JavaScript Interpreters with Coverage-Guided Reinforcement Learning for LLM-Based Mutation.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
An Approach on Improving the Recommender System: Predicting Movie Genres Based on Plot Summaries.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication , 2024
Adversarial Feature Alignment: Balancing Robustness and Accuracy in Deep Learning via Adversarial Training.
Proceedings of the 2024 Workshop on Artificial Intelligence and Security, 2024
2023
GradFuzz: Fuzzing deep neural networks with gradient vector coverage for adversarial examples.
Neurocomputing, 2023
Membership Inference Attacks With Token-Level Deduplication on Korean Language Models.
IEEE Access, 2023
Robust Training for Deepfake Detection Models Against Disruption-Induced Data Poisoning.
Proceedings of the Information Security Applications - 24th International Conference, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023
2022
Inf. Sci., 2022
On Membership Inference Attacks to Generative Language Models Across Language Domains.
Proceedings of the Information Security Applications - 23rd International Conference, 2022
Towards Constructing Consistent Pattern Strength Meters with User's Visual Perception.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Distributed Watchdogs Based on Blockchain for Securing Industrial Internet of Things.
Sensors, 2021
IEEE Access, 2021
IEEE Access, 2021
2020
Birds of a Feature: Intrafamily Clustering for Version Identification of Packed Malware.
IEEE Syst. J., 2020
A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things.
IEEE Access, 2020
2019
A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes.
Sensors, 2019
Int. J. Ad Hoc Ubiquitous Comput., 2019
IEEE Access, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks.
IEEE Access, 2018
Data Transfusion: Pairing Wearable Devices and Its Implication on Security for Internet of Things.
IEEE Access, 2018
Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks.
IEEE Syst. J., 2017
Experimental performance analysis of lightweight block ciphers and message authentication codes for wireless sensor networks.
Int. J. Distributed Sens. Networks, 2017
A corrupted cloud and corrupted multi-cloud identification method for batch auditing in cloud storage services.
Comput. Syst. Sci. Eng., 2017
Proceedings of the Information Security Applications - 18th International Conference, 2017
Proceedings of the 10th International Symposium on Visual Information Communication and Interaction, 2017
The Fuzzing Awakens: File Format-Aware Mutational Fuzzing on Smartphone Media Server Daemons.
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Here Is Your Fingerprint!: Actual Risk versus User Perception of Latent Fingerprints and Smudges Remaining on Smartphones.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
FlexiCast: Energy-Efficient Software Integrity Checks to Build Secure Industrial Wireless Active Sensor Networks.
IEEE Trans. Ind. Informatics, 2016
SteganoPIN: Two-Faced Human-Machine Interface for Practical Enforcement of PIN Entry Security.
IEEE Trans. Hum. Mach. Syst., 2016
LinkA: A Link Layer Anonymization Method Based on Bloom Filter for Authenticated IoT Devices.
Intell. Autom. Soft Comput., 2016
Secure dissemination of software updates for intelligent mobility in future wireless networks.
EURASIP J. Wirel. Commun. Netw., 2016
2015
Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks.
IEEE Trans. Inf. Forensics Secur., 2015
A Survey of Public Provable Data Possession Schemes with Batch Verification in Cloud Storage.
J. Internet Serv. Inf. Secur., 2015
IACR Cryptol. ePrint Arch., 2015
Identification of Corrupted Cloud Storage in Batch Auditing for Multi-Cloud Environments.
Proceedings of the Information and Communication Technology, 2015
2014
Covert Attentional Shoulder Surfing: Human Adversaries Are More Powerful Than Expected.
IEEE Trans. Syst. Man Cybern. Syst., 2014
Touch pointer: rethink point-and-click for accurate indirect touch interactions on small touchscreens.
IEEE Trans. Consumer Electron., 2014
IEEE Trans. Consumer Electron., 2014
A Method for Hiding Link Layer Addresses Using Bloom Filter in Wireless Sensor Networks.
J. Internet Serv. Inf. Secur., 2014
AAnA: Anonymous authentication and authorization based on short traceable signatures.
Int. J. Inf. Sec., 2014
GENDEP: Location-Aware Key Management for General Deployment of Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014
TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems.
Comput. Secur., 2014
Proceedings of the IEEE International Conference on Consumer Electronics, 2014
Proceedings of the IEEE International Conference on Consumer Electronics, 2014
2013
Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks.
IEEE Syst. J., 2013
2012
Optimal frame structure design using landmarks for interactive light field streaming.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012
2011
IEICE Trans. Commun., 2011
CoRR, 2011
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011
Optimized frame structure for interactive light field streaming with cooperative caching.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011
2010
An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks.
IEEE Trans. Ind. Informatics, 2010
IEEE Trans. Ind. Electron., 2010
IEEE Trans. Computers, 2010
2009
IEEE Trans. Wirel. Commun., 2009
Proceedings of the Universal Access in Human-Computer Interaction. Addressing Diversity, 2009
2008
IEEE Trans. Knowl. Data Eng., 2008
Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications.
IEICE Trans. Inf. Syst., 2008
New Hardware Architecture for Multiplication over <i>GF</i>(2<i><sup>m</sup></i>) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
2007
Efficient and Secure Key Agreement for Merging Clusters in Ad-Hoc Networking Environments.
IEICE Trans. Commun., 2007
IEICE Trans. Commun., 2007
Secure Dynamic Network Reprogramming Using Supplementary Hash in Wireless Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007
Proceedings of the Information Security Practice and Experience, 2007
Biometric Person Authentication for Access Control Scenario Based on Face Recognition.
Proceedings of the Universal Access in Human Computer Interaction. Coping with Diversity, 2007
Biometric Digital Key Mechanisms for Telebiometric Authentication Based on Biometric Certificate.
Proceedings of the Universal Access in Human Computer Interaction. Coping with Diversity, 2007
Proceedings of the Universal Access in Human-Computer Interaction. Ambient Interaction, 2007
Proceedings of the Universal Access in Human Computer Interaction. Coping with Diversity, 2007
2006
Contents distribution system based on MPEG-4 ISMACryp in IP set-top box environments.
IEEE Trans. Consumer Electron., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Proceedings of the Information Security Applications, 7th International Workshop, 2006
Proceedings of the Information Security Applications, 7th International Workshop, 2006
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Proceedings of the Intelligence and Security Informatics, 2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
Security analysis and improvement of the efficient password-based authentication protocol.
IEEE Commun. Lett., 2005
Proceedings of the Fuzzy Logic and Applications, 6th International Workshop, 2005
Proceedings of the Intelligence and Security Informatics, 2005
New Architecture for Multiplication in <i>GF</i>(2<sup><i>m</i></sup>) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography.
Proceedings of the Information Security and Cryptology, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Web and Communication Technologies and Internet-Related Social Issues, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks.
Proceedings of the Applied Cryptography and Network Security, 2005
2004
IEEE Commun. Lett., 2004
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational and Information Science, First International Symposium, 2004
Proceedings of the Artificial Intelligence and Simulation, 2004
2003
Erratum to: "Digital signature algorithm for securing digital identities": [Information Processing Letters 82 (2002) 247-252].
Inf. Process. Lett., 2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
Proceedings of the Computer and Information Sciences, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
Inf. Process. Lett., 2002
IEEE Commun. Lett., 2002
Proceedings of the Information Security, 5th International Conference, 2002
Proceedings of the Infrastructure Security, International Conference, 2002
Proceedings of the Information Security and Cryptology, 2002
2001
IACR Cryptol. ePrint Arch., 2001
Proceedings of the Network and Distributed System Security Symposium, 2001
2000
IACR Cryptol. ePrint Arch., 2000
1999
1998
Efficient and secure password-based authentication protocols against guessing attacks.
Comput. Commun., 1998
1997
Security and efficiency in authentication protocols resistant to password guessing attack.
Proceedings of the 22nd IEEE Conference on Local Computer Networks (LCN '97), 1997
Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), 1997
Proceedings of the Proceedings IEEE INFOCOM '97, 1997
1996
The Design and Verification of Services Feature Interaction Manager on AIN Using Z Schema.
Proceedings of the COMPSAC '96, 1996