Follow
Sangwoo Ji
Sangwoo Ji
Verified email at postech.ac.kr
Title
Cited by
Cited by
Year
Pinpoint rowhammer: Suppressing unwanted bit flips on rowhammer attacks
S Ji, Y Ko, S Oh, J Kim
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
352019
Detecting audio adversarial examples with logit noising
N Park, S Ji, J Kim
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
72021
Prevention of cross-update privacy leaks on android
B Cho, S Lee, M Xu, S Ji, T Kim, J Kim
Computer Science and Information Systems 15 (1), 111-137, 2018
72018
Unrestricted black-box adversarial attack using gan with limited queries
D Na, S Ji, J Kim
European Conference on Computer Vision, 467-482, 2022
62022
CAPTCHAs are still in danger: An efficient scheme to bypass adversarial CAPTCHAs
D Na, N Park, S Ji, J Kim
Information Security Applications: 21st International Conference, WISA 2020 …, 2020
52020
WearAuth: wristwear-assisted user authentication for smartphones using wavelet-based multi-resolution analysis
T Kang, S Ji, H Jeong, B Zhu, J Kim
IEICE TRANSACTIONS on Information and Systems 102 (10), 1976-1992, 2019
12019
Low-noise llc side-channel attack with perf
Y Ko, S Ji, J Kim
International Workshop on Information Security Applications, 328-340, 2019
12019
Security analysis of mobile web browser hardware accessibility: study with ambient light sensors
S Lee, S Ji, J Kim
Information Security Applications: 19th International Conference, WISA 2018 …, 2019
12019
Defending against attacks tailored to transfer learning via feature distancing
S Ji, N Park, D Na, B Zhu, J Kim
Computer Vision and Image Understanding 223, 103533, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–9