Pinpoint rowhammer: Suppressing unwanted bit flips on rowhammer attacks S Ji, Y Ko, S Oh, J Kim Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 35 | 2019 |
Detecting audio adversarial examples with logit noising N Park, S Ji, J Kim Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 7 | 2021 |
Prevention of cross-update privacy leaks on android B Cho, S Lee, M Xu, S Ji, T Kim, J Kim Computer Science and Information Systems 15 (1), 111-137, 2018 | 7 | 2018 |
Unrestricted black-box adversarial attack using gan with limited queries D Na, S Ji, J Kim European Conference on Computer Vision, 467-482, 2022 | 6 | 2022 |
CAPTCHAs are still in danger: An efficient scheme to bypass adversarial CAPTCHAs D Na, N Park, S Ji, J Kim Information Security Applications: 21st International Conference, WISA 2020 …, 2020 | 5 | 2020 |
WearAuth: wristwear-assisted user authentication for smartphones using wavelet-based multi-resolution analysis T Kang, S Ji, H Jeong, B Zhu, J Kim IEICE TRANSACTIONS on Information and Systems 102 (10), 1976-1992, 2019 | 1 | 2019 |
Low-noise llc side-channel attack with perf Y Ko, S Ji, J Kim International Workshop on Information Security Applications, 328-340, 2019 | 1 | 2019 |
Security analysis of mobile web browser hardware accessibility: study with ambient light sensors S Lee, S Ji, J Kim Information Security Applications: 19th International Conference, WISA 2018 …, 2019 | 1 | 2019 |
Defending against attacks tailored to transfer learning via feature distancing S Ji, N Park, D Na, B Zhu, J Kim Computer Vision and Image Understanding 223, 103533, 2022 | | 2022 |