default search action
Daeseon Choi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Daeeol Park, Hyunsik Na, Daeseon Choi:
Performance Comparison and Visualization of AI-Generated-Image Detection Methods. IEEE Access 12: 62609-62627 (2024) - [j26]Sungjune Park, Hyunsik Na, Daeseon Choi:
Verifiable Facial De-Identification in Video Surveillance. IEEE Access 12: 67758-67771 (2024) - [j25]Gwonsang Ryu, Daeseon Choi:
Detection of adversarial attacks based on differences in image entropy. Int. J. Inf. Sec. 23(1): 299-314 (2024) - [c20]Donghyun Kim, Seungmin Kim, Gwonsang Ryu, Daeseon Choi:
Session Replication Attack Through QR Code Sniffing in Passkey CTAP Registration. SEC 2024: 294-307 - [i1]Sungjune Park, Daeseon Choi:
Judgment of Thoughts: Courtroom of the Binary Logical Reasoning in Large Language Models. CoRR abs/2409.16635 (2024) - 2023
- [j24]Gwonsang Ryu, Daeseon Choi:
A hybrid adversarial training for deep learning model and denoising network resistant to adversarial examples. Appl. Intell. 53(8): 9174-9187 (2023) - [j23]Jihwan Kim, Pyung Kim, Daeseon Choi, Younho Lee:
A Study on the Interoperability Technology of Digital Identification Based on WACI Protocol with Multiparty Distributed Signature. Sensors 23(8): 4061 (2023) - [c19]Hyunsik Na, Yoonju Oh, Wonho Lee, Daeseon Choi:
Systematic Evaluation of Robustness Against Model Inversion Attacks on Split Learning. WISA 2023: 107-118 - 2022
- [j22]Gwonsang Ryu, Daeseon Choi:
Feature-Based Adversarial Training for Deep Learning Models Resistant to Transferable Adversarial Examples. IEICE Trans. Inf. Syst. 105-D(5): 1039-1049 (2022) - [c18]Hyunsik Na, Daeseon Choi:
Extracting a Minimal Trigger for an Efficient Backdoor Poisoning Attack Using the Activation Values of a Deep Neural Network. WDC@AsiaCCS 2022: 3-6 - 2021
- [j21]Hyunsik Na, Gwonsang Ryu, Daeseon Choi:
Adversarial Attack Based on Perturbation of Contour Region to Evade Steganalysis-Based Detection. IEEE Access 9: 122308-122321 (2021) - [j20]Gwonsang Ryu, Hosung Park, Daeseon Choi:
Adversarial attacks by attaching noise markers on the face against deep face recognition. J. Inf. Secur. Appl. 60: 102874 (2021) - [j19]Hyun Kwon, Hyunsoo Yoon, Daeseon Choi:
Data Correction For Enhancing Classification Accuracy By Unknown Deep Neural Network Classifiers. KSII Trans. Internet Inf. Syst. 15(9): 3243-3257 (2021) - [j18]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Classification score approach for detecting adversarial example in deep neural network. Multim. Tools Appl. 80(7): 10339-10360 (2021) - 2020
- [j17]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System. IEEE Trans. Inf. Forensics Secur. 15: 526-538 (2020)
2010 – 2019
- 2019
- [j16]Hyun Kwon, Hyunsoo Yoon, Daeseon Choi:
Restricted Evasion Attack: Generation of Restricted-Area Adversarial Example. IEEE Access 7: 60908-60919 (2019) - [j15]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Selective Untargeted Evasion Attack: An Adversarial Example That Will Not Be Classified as Certain Avoided Classes. IEEE Access 7: 73493-73503 (2019) - [j14]Sieun Kim, Taek-Young Youn, Daeseon Choi, Ki-Woong Park:
UAV-Undertaker: Securely Verifiable Remote Erasure Scheme with a Countdown-Concept for UAV via Randomized Data Synchronization. Wirel. Commun. Mob. Comput. 2019: 8913910:1-8913910:11 (2019) - [c17]Hyun Kwon, Hyunsoo Yoon, Daeseon Choi:
Priority Adversarial Example in Evasion Attack on Multiple Deep Neural Networks. ICAIIC 2019: 399-404 - 2018
- [j13]Daeseon Choi, Younho Lee:
Eavesdropping of Magnetic Secure Transmission Signals and Its Security Implications for a Mobile Payment Protocol. IEEE Access 6: 42687-42701 (2018) - [j12]Hyun Kwon, Yongchul Kim, Ki-Woong Park, Hyunsoo Yoon, Daeseon Choi:
Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network. IEEE Access 6: 46084-46096 (2018) - [j11]Hyun Kwon, Yongchul Kim, Ki-Woong Park, Hyunsoo Yoon, Daeseon Choi:
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier. Comput. Secur. 78: 380-397 (2018) - [j10]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
CAPTCHA Image Generation Systems Using Generative Adversarial Networks. IEICE Trans. Inf. Syst. 101-D(2): 543-546 (2018) - [j9]Hyun Kwon, Yongchul Kim, Ki-Woong Park, Hyunsoo Yoon, Daeseon Choi:
Advanced Ensemble Adversarial Example on Unknown Deep Neural Network Classifiers. IEICE Trans. Inf. Syst. 101-D(10): 2485-2500 (2018) - [j8]Hosung Park, Seungsoo Nam, Eun Man Choi, Daeseon Choi:
Hidden Singer: Distinguishing Imitation Singers Based on Training with Only the Original Song. IEICE Trans. Inf. Syst. 101-D(12): 3092-3101 (2018) - [j7]Heeyoul Kim, Ki-Woong Park, Daeseon Choi, Younho Lee:
Estimating Resident Registration Numbers of Individuals in Korea: Revisited. KSII Trans. Internet Inf. Syst. 12(6): 2946-2959 (2018) - [j6]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Random Untargeted Adversarial Example on Deep Neural Network. Symmetry 10(12): 738 (2018) - [c16]Ki-Woong Park, Daeseon Choi, Woo-Jin Jeon:
Applying Time-Lapse Concepts onto Storage System for Long-Term System Trace Analysis: Technical Challenges and Blueprints. AIKE 2018: 201-203 - [c15]Hyun Kwon, Hyunsoo Yoon, Daeseon Choi:
POSTER: Zero-Day Evasion Attack Analysis on Race between Attack and Defense. AsiaCCS 2018: 805-807 - [c14]Hosung Park, Daeyong Kwon, Seungsoo Nam, Daeseon Choi:
POSTER: Address Authentication Based on Location History. AsiaCCS 2018: 845-847 - [c13]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Fooling a Neural Network in Military Environments: Random Untargeted Adversarial Example. MILCOM 2018: 456-461 - [c12]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
One-Pixel Adversarial Example that Is Safe for Friendly Deep Neural Networks. WISA 2018: 42-54 - 2017
- [j5]Daeseon Choi, Younho Lee, Seokhyun Kim, Pilsung Kang:
Private attribute inference from Facebook's public text metadata: a case study of Korean users. Ind. Manag. Data Syst. 117(8): 1687-1706 (2017) - [j4]Jung Yeon Hwang, Boyeon Song, Daeseon Choi, Seung-Hun Jin, Hyun Sook Cho, Mun-Kyu Lee:
Simplified small exponent test for batch verification. Theor. Comput. Sci. 662: 48-58 (2017) - [c11]Hyun Kwon, Hyunsoo Yoon, Daeseon Choi:
Friend-Safe Adversarial Examples in an Evasion Attack on a Deep Neural Network. ICISC 2017: 351-367 - [c10]Namsup Lee, Hyunsoo Yoon, Daeseon Choi:
Detecting Online Game Chargeback Fraud Based on Transaction Sequence Modeling Using Recurrent Neural Network. WISA 2017: 297-309 - 2016
- [c9]Daeseon Choi, Younho Lee:
Eavesdropping One-Time Tokens Over Magnetic Secure Transmission in Samsung Pay. WOOT 2016 - 2015
- [j3]Daeseon Choi, Younho Lee, Yongsu Park, Seokhyun Kim:
Estimating Korean Residence Registration Numbers from Public Information on SNS. IEICE Trans. Commun. 98-B(4): 565-574 (2015) - [j2]Soo-Hyung Kim, Daeseon Choi, Seung-Hun Jin, Hyunsoo Yoon, JinWoo Son, MyungKeun Yoon:
Customer Data Scanner for Hands-Free Mobile Payment. IEICE Trans. Commun. 98-B(11): 2291-2299 (2015) - [c8]Dae-Yeob Kim, Soo-Hyung Kim, Daeseon Choi, Seung-Hun Jin:
Accurate Indoor Proximity Zone Detection Based on Time Window and Frequency with Bluetooth Low Energy. FNC/MobiSPC 2015: 88-95 - [c7]Jung Yeon Hwang, Seung-Hyun Kim, Daeseon Choi, Seung-Hun Jin, Boyeon Song:
Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures. SSR 2015: 43-69 - [c6]Seung-Hyun Kim, Han-Gyu Ko, In-Young Ko, Daeseon Choi:
Effects of Contextual Properties on Users' Privacy Preferences in Mobile Computing Environments. TrustCom/BigDataSE/ISPA (1) 2015: 507-514 - 2013
- [c5]Seung-Hyun Kim, Daeseon Choi, Seung-Hun Jin, Sung-Hoon Lee:
Geo-location based QR-Code authentication scheme to defeat active real-time phishing attack. Digital Identity Management 2013: 51-62 - 2010
- [c4]Seung-Hyun Kim, Daeseon Choi, Seung-Hun Jin:
Gatekeeper: providing secure interoperability between mobile web-browser and local resources. Digital Identity Management 2010: 59-62
2000 – 2009
- 2009
- [c3]Seung-Hyun Kim, Daeseon Choi, Seunghun Jin:
Digital ID Wallet: Provide Selective Disclosure and Users Control of Identity Information. Security and Management 2009: 457-462 - 2008
- [j1]Daeseon Choi, Younho Lee, Yongsu Park, Seunghun Jin, Hyunsoo Yoon:
Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks. IEICE Trans. Commun. 91-B(11): 3574-3583 (2008) - 2003
- [c2]Seunghun Jin, Sangrae Cho, Daeseon Choi, Jae-Cheol Ryou:
New Security Paradigm for Application Security Infrastructure. ICOIN 2003: 793-802 - [c1]Yeongsub Cho, Sangrae Cho, Daeseon Choi, Seunghun Jin, Kyoil Chung, Cheehang Park:
A Location Privacy Protection Mechanism for Smart Space. WISA 2003: 162-173
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint