Alert button
Picture for Hyoungshick Kim

Hyoungshick Kim

Alert button

Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice

Add code
Bookmark button
Alert button
Mar 28, 2024
Jake Hesford, Daniel Cheng, Alan Wan, Larry Huynh, Seungho Kim, Hyoungshick Kim, Jin B. Hong

Viaarxiv icon

Single-Class Target-Specific Attack against Interpretable Deep Learning Systems

Add code
Bookmark button
Alert button
Jul 12, 2023
Eldor Abdukhamidov, Mohammed Abuhamad, George K. Thiruvathukal, Hyoungshick Kim, Tamer Abuhmed

Figure 1 for Single-Class Target-Specific Attack against Interpretable Deep Learning Systems
Figure 2 for Single-Class Target-Specific Attack against Interpretable Deep Learning Systems
Figure 3 for Single-Class Target-Specific Attack against Interpretable Deep Learning Systems
Figure 4 for Single-Class Target-Specific Attack against Interpretable Deep Learning Systems
Viaarxiv icon

Tracking Dataset IP Use in Deep Neural Networks

Add code
Bookmark button
Alert button
Nov 24, 2022
Seonhye Park, Alsharif Abuadbba, Shuo Wang, Kristen Moore, Yansong Gao, Hyoungshick Kim, Surya Nepal

Figure 1 for Tracking Dataset IP Use in Deep Neural Networks
Figure 2 for Tracking Dataset IP Use in Deep Neural Networks
Figure 3 for Tracking Dataset IP Use in Deep Neural Networks
Figure 4 for Tracking Dataset IP Use in Deep Neural Networks
Viaarxiv icon

Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World

Add code
Bookmark button
Alert button
Jan 21, 2022
Hua Ma, Yinshan Li, Yansong Gao, Alsharif Abuadbba, Zhi Zhang, Anmin Fu, Hyoungshick Kim, Said F. Al-Sarawi, Nepal Surya, Derek Abbott

Figure 1 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 2 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 3 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 4 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Viaarxiv icon

Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things

Add code
Bookmark button
Alert button
Mar 03, 2021
Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit A. Camtepe, Hyoungshick Kim, Surya Nepal

Figure 1 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Figure 2 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Figure 3 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Figure 4 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Viaarxiv icon

DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN

Add code
Bookmark button
Alert button
Jan 12, 2021
Alsharif Abuadbba, Hyoungshick Kim, Surya Nepal

Figure 1 for DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN
Figure 2 for DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN
Figure 3 for DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN
Figure 4 for DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN
Viaarxiv icon

Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks

Add code
Bookmark button
Alert button
Oct 08, 2020
Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Hyoungshick Kim, Surya Nepal

Figure 1 for Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks
Figure 2 for Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks
Figure 3 for Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks
Figure 4 for Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks
Viaarxiv icon

Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review

Add code
Bookmark button
Alert button
Aug 02, 2020
Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Jiliang Zhang, Anmin Fu, Surya Nepal, Hyoungshick Kim

Figure 1 for Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review
Figure 2 for Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review
Figure 3 for Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review
Figure 4 for Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review
Viaarxiv icon