Picture for Hyoungshick Kim

Hyoungshick Kim

Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice

Add code
Mar 28, 2024
Figure 1 for Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice
Figure 2 for Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice
Figure 3 for Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice
Figure 4 for Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice
Viaarxiv icon

Single-Class Target-Specific Attack against Interpretable Deep Learning Systems

Add code
Jul 12, 2023
Figure 1 for Single-Class Target-Specific Attack against Interpretable Deep Learning Systems
Figure 2 for Single-Class Target-Specific Attack against Interpretable Deep Learning Systems
Figure 3 for Single-Class Target-Specific Attack against Interpretable Deep Learning Systems
Figure 4 for Single-Class Target-Specific Attack against Interpretable Deep Learning Systems
Viaarxiv icon

Tracking Dataset IP Use in Deep Neural Networks

Add code
Nov 24, 2022
Figure 1 for Tracking Dataset IP Use in Deep Neural Networks
Figure 2 for Tracking Dataset IP Use in Deep Neural Networks
Figure 3 for Tracking Dataset IP Use in Deep Neural Networks
Figure 4 for Tracking Dataset IP Use in Deep Neural Networks
Viaarxiv icon

Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World

Add code
Jan 21, 2022
Figure 1 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 2 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 3 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 4 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Viaarxiv icon

Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things

Add code
Mar 03, 2021
Figure 1 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Figure 2 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Figure 3 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Figure 4 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Viaarxiv icon

DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN

Add code
Jan 12, 2021
Figure 1 for DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN
Figure 2 for DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN
Figure 3 for DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN
Figure 4 for DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN
Viaarxiv icon

Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks

Add code
Oct 08, 2020
Figure 1 for Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks
Figure 2 for Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks
Figure 3 for Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks
Figure 4 for Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks
Viaarxiv icon

Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review

Add code
Aug 02, 2020
Figure 1 for Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review
Figure 2 for Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review
Figure 3 for Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review
Figure 4 for Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review
Viaarxiv icon

DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation

Add code
Jun 16, 2020
Figure 1 for DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation
Figure 2 for DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation
Figure 3 for DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation
Figure 4 for DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation
Viaarxiv icon

Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks

Add code
Apr 22, 2020
Figure 1 for Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks
Figure 2 for Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks
Figure 3 for Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks
Figure 4 for Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks
Viaarxiv icon