Follow
Daeseon Choi
Daeseon Choi
Dept. of Medical Information, Kongju National Univ.
Verified email at kongju.ac.kr
Title
Cited by
Cited by
Year
Trust evaluation model for wireless sensor networks
J Hur, Y Lee, H Yoon, D Choi, S Jin
The 7th International Conference on Advanced Communication Technology, 2005 …, 2005
1032005
Apparatus and Method for Providing Personal Information Sharing Service Using Signed Callback Url Message
SH Kim, DS Choi, JH Noh, SR Cho, YS Cho, SH Jin
US Patent App. 12/096,415, 2008
882008
Selective audio adversarial example in evasion attack on speech recognition system
H Kwon, Y Kim, H Yoon, D Choi
IEEE Transactions on Information Forensics and Security 15, 526-538, 2019
742019
Cluster‐Based Trust Evaluation Scheme in an Ad Hoc Network
S Jin, C Park, D Choi, K Chung, H Yoon
ETRI journal 27 (4), 465-468, 2005
592005
Method of validating certificate by certificate validation server using certificate policies and certificate policy mapping in public key infrastructure
JH Roh, YS Cho, SR Cho, DS Choi, TS Kim, HS Kim, SH Jin
US Patent 7,478,236, 2009
512009
Multi-targeted adversarial example in evasion attack on deep neural network
H Kwon, Y Kim, KW Park, H Yoon, D Choi
IEEE Access 6, 46084-46096, 2018
442018
Accurate indoor proximity zone detection based on time window and frequency with bluetooth low energy
DY Kim, SH Kim, D Choi, SH Jin
Procedia Computer Science 56, 88-95, 2015
412015
Method for modifying validity of a certificate using biometric information in public key infrastructure-based authentication system
JH Roh, T Kim, HS Kim, DS Choi, YS Cho, SR Cho, SH Jin
US Patent 7,366,904, 2008
362008
Portable USB storage device
DS Choi, HS Kim, T Kim, JH Roh, SR Cho, YS Cho, SH Jin
US Patent 7,133,296, 2006
282006
Classification score approach for detecting adversarial example in deep neural network
H Kwon, Y Kim, H Yoon, D Choi
Multimedia Tools and Applications 80, 10339-10360, 2021
262021
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier
H Kwon, Y Kim, KW Park, H Yoon, D Choi
computers & security 78, 380-397, 2018
252018
Random untargeted adversarial example on deep neural network
H Kwon, Y Kim, H Yoon, D Choi
Symmetry 10 (12), 738, 2018
242018
Restricted evasion attack: Generation of restricted-area adversarial example
H Kwon, H Yoon, D Choi
IEEE Access 7, 60908-60919, 2019
232019
Forged signature distinction using convolutional neural network for feature extraction
S Nam, H Park, C Seo, D Choi
Applied Sciences 8 (2), 153, 2018
222018
Advanced ensemble adversarial example on unknown deep neural network classifiers
H Kwon, Y Kim, KW Park, H Yoon, D Choi
IEICE TRANSACTIONS on Information and Systems 101 (10), 2485-2500, 2018
212018
Captcha image generation systems using generative adversarial networks
H Kwon, Y Kim, H Yoon, D Choi
IEICE TRANSACTIONS on Information and Systems 101 (2), 543-546, 2018
212018
Eavesdropping {One-Time} Tokens Over Magnetic Secure Transmission in Samsung Pay
D Choi, Y Lee
10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016
212016
Geo-location based QR-Code authentication scheme to defeat active real-time phishing attack
S Kim, D Choi, S Jin, S Lee
Proceedings of the 2013 ACM workshop on Digital identity management, 51-62, 2013
212013
Method and apparatus for transmitting message in heterogeneous federated environment, and method and apparatus for providing service using the message
SH Kim, DS Choi, JH Noh, SR Cho, YS Cho, SH Jin
US Patent App. 12/095,560, 2010
212010
Apparatus and method for inputting user password
SH Kim, T Kwon, SH Kim, DS Choi, JH Noh, S Cho, YS Cho, SH Jin
US Patent App. 13/286,772, 2012
202012
The system can't perform the operation now. Try again later.
Articles 1–20