Hyoungshick Kim
Sungkyunkwan University
H-index: 39
Asia-South Korea
Top articles of Hyoungshick Kim
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
AdFlush: A Real-World Deployable Machine Learning Solution for Effective Advertisement and Web Tracker Prevention | Kiho Lee Chaejin Lim Beomjin Jin Taeyoung Kim Hyoungshick Kim | 2024 | |
Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice | arXiv preprint arXiv:2403.17458 | Jake Hesford Daniel Cheng Alan Wan Larry Huynh Seungho Kim | 2024/3/26 |
Blind-Touch: Homomorphic Encryption-Based Distributed Neural Network Inference for Privacy-Preserving Fingerprint Authentication | Proceedings of the AAAI Conference on Artificial Intelligence | Hyunmin Choi Simon S Woo Hyoungshick Kim | 2024/3/24 |
Watermarking method for smart contract | 2024/3/21 | ||
UniHENN: Designing More Versatile Homomorphic Encryption-based CNNs without im2col | arXiv preprint arXiv:2402.03060 | Hyunmin Choi Jihun Kim Seungho Kim Seonhye Park Jeongyong Park | 2024/2/5 |
Crumbled Cookie Exploring E-commerce Websites Cookie Policies with Data Protection Regulations | arXiv preprint arXiv:2401.05826 | Nivedita Singh Yejin Do Yongsang Yu Imane Fouad Jungrae Kim Hyoungshick Kim | 2024/1/11 |
MotionID: Towards practical behavioral biometrics-based implicit user authentication on smartphones | Pervasive and Mobile Computing | Mohsen Ali Alawami Tamer AbuHamed Mohammed AbuHamed Hyoungshick Kim | 2024/4/3 |
PP–GSM: Privacy-preserving graphical security model for security assessment as a service | Future Generation Computer Systems | Dongwon Lee Yongwoo Oh Jin B Hong Hyoungshick Kim Dan Dongseong Kim | 2023/5/1 |
Design and evaluation of highly accurate smart contract code vulnerability detection framework | Data Mining and Knowledge Discovery | Sowon Jeon Gilhee Lee Hyoungshick Kim Simon S Woo | 2023/10/13 |
Voice input authentication device and method | 2023/1/10 | ||
AppSniffer: Towards robust mobile app fingerprinting against VPN | Sanghak Oh Minwook Lee Hyunwoo Lee Elisa Bertino Hyoungshick Kim | 2023/4/30 | |
Blindfilter: Privacy-preserving spam email detection using homomorphic encryption | Dongwon Lee Myeonghwan Ahn Hyesun Kwak Jin B Hong Hyoungshick Kim | 2023/9/25 | |
Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers' Coding Practices with Insecure Suggestions from Poisoned AI Models | arXiv preprint arXiv:2312.06227 | Sanghak Oh Kiho Lee Seonhye Park Doowon Kim Hyoungshick Kim | 2023/12/11 |
When social networks meet payment: a security perspective | Nivedita Singh Mohsen Ali Alawami Hyoungshick Kim | 2023/1/3 | |
On the effectiveness of perturbations in generating evasive malware variants | IEEE Access | Beomjin Jin Jusop Choi Jin B Hong Hyoungshick Kim | 2023/3/27 |
Single-Class Target-Specific Attack against Interpretable Deep Learning Systems | arXiv preprint arXiv:2307.06484 | Eldor Abdukhamidov Mohammed Abuhamad George K Thiruvathukal Hyoungshick Kim Tamer Abuhmed | 2023/7/12 |
DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks | Seonhye Park Alsharif Abuadbba Shuo Wang Kristen Moore Yansong Gao | 2023/12/4 | |
MENDEL: Time series anomaly detection using transfer learning for industrial control systems | Jeongyong Park Bedeuro Kim Hyoungshick Kim | 2023/2/13 | |
On the Long-Term Effects of Continuous Keystroke Authentication: Keeping User Frustration Low through Behavior Adaptation | Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies | Jun Ho Huh Sungsu Kwag Iljoo Kim Alexandr Popov Younghan Park | 2023/6/12 |
BTFuzzer: A Profile-Based Fuzzing Framework for Bluetooth Protocols | Min Jang Yuna Hwang Yonghwi Kwon Hyoungshick Kim | 2023/11/29 |