Picture for DaeHun Nyang

DaeHun Nyang

Enhancing Vulnerability Reports with Automated and Augmented Description Summarization

Add code
Apr 29, 2025
Viaarxiv icon

Untargeted Code Authorship Evasion with Seq2Seq Transformation

Add code
Nov 26, 2023
Viaarxiv icon

SHIELD: Thwarting Code Authorship Attribution

Add code
Apr 26, 2023
Viaarxiv icon

Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions

Add code
Jan 03, 2022
Figure 1 for Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions
Figure 2 for Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions
Figure 3 for Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions
Figure 4 for Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions
Viaarxiv icon

Generating Adversarial Examples with an Optimized Quality

Add code
Jun 30, 2020
Figure 1 for Generating Adversarial Examples with an Optimized Quality
Figure 2 for Generating Adversarial Examples with an Optimized Quality
Figure 3 for Generating Adversarial Examples with an Optimized Quality
Figure 4 for Generating Adversarial Examples with an Optimized Quality
Viaarxiv icon

Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey

Add code
Jan 23, 2020
Figure 1 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Figure 2 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Figure 3 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Figure 4 for Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
Viaarxiv icon

W-Net: A CNN-based Architecture for White Blood Cells Image Classification

Add code
Oct 02, 2019
Figure 1 for W-Net: A CNN-based Architecture for White Blood Cells Image Classification
Figure 2 for W-Net: A CNN-based Architecture for White Blood Cells Image Classification
Figure 3 for W-Net: A CNN-based Architecture for White Blood Cells Image Classification
Figure 4 for W-Net: A CNN-based Architecture for White Blood Cells Image Classification
Viaarxiv icon

COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection

Add code
Sep 20, 2019
Figure 1 for COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
Figure 2 for COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
Figure 3 for COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
Figure 4 for COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection
Viaarxiv icon