Junyoung Byun

Orcid: 0000-0001-8752-0305

According to our database1, Junyoung Byun authored at least 27 papers between 2018 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Efficient homomorphic encryption framework for privacy-preserving regression.
Appl. Intell., May, 2023

Efficient differentially private kernel support vector classifier for multi-class classification.
Inf. Sci., 2023

Improving the Utility of Differentially Private Clustering through Dynamical Processing.
CoRR, 2023

Fast and Differentially Private Fair Clustering.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Improving Adversarial Transferability Via Feature Translation.
Proceedings of the IEEE International Conference on Image Processing, 2023

Introducing Competition to Boost the Transferability of Targeted Adversarial Examples Through Clean Feature Mixup.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
Variational cycle-consistent imputation adversarial networks for general missing patterns.
Pattern Recognit., 2022

Robust Federated Learning With Noisy Labels.
IEEE Intell. Syst., 2022

Privacy-Preserving Fair Learning of Support Vector Machine with Homomorphic Encryption.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

On the Effectiveness of Small Input Noise for Defending Against Query-based Black-Box Attacks.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022

Geometrically Adaptive Dictionary Attack on Face Recognition.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022

Adaptive Warping Network for Transferable Adversarial Attacks.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Adversarial Training with Channel Attention Regularization.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Hidden Conditional Adversarial Attacks.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Exploiting Doubly Adversarial Examples for Improving Adversarial Robustness.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Improving the Transferability of Targeted Adversarial Examples through Object-Based Diverse Input.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
Atomic cross-chain settlement model for central banks digital currency.
Inf. Sci., 2021

Fair Clustering with Fair Correspondence Distribution.
Inf. Sci., 2021

Small Input Noise is Enough to Defend Against Query-based Black-box Attacks.
CoRR, 2021

Parameter-free HE-friendly Logistic Regression.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Understanding Vqa For Negative Answers Through Visual And Linguistic Inference.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

Fine-Grained Multi-Class Object Counting.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

Rethinking Training Schedules For Verifiably Robust Networks.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

2020
HE-Friendly Algorithm for Privacy-Preserving SVM Training.
IEEE Access, 2020

Multi-Step Quantization Of A Multi-Scale Network For Crowd Counting.
Proceedings of the IEEE International Conference on Image Processing, 2020

2019
Security-preserving Support Vector Machine with Fully Homomorphic Encryption.
Proceedings of the Workshop on Artificial Intelligence Safety 2019 co-located with the Thirty-Third AAAI Conference on Artificial Intelligence 2019 (AAAI-19), 2019

2018
BitNet: Learning-Based Bit-Depth Expansion.
Proceedings of the Computer Vision - ACCV 2018, 2018


  Loading...