Ki-Woong Park

Orcid: 0000-0002-3377-223X

According to our database1, Ki-Woong Park authored at least 68 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Pwnable-Sherpa: An interactive coaching system with a case study of pwnable challenges.
Comput. Secur., 2023

CO-TRIS: Container Orchestration - Transforming container using Resource Inspection System.
Proceedings of the Sixth IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2023

I Know Where You Are: A Non-intrusive Geospatial-Electrical Authentication System.
Proceedings of the Sixth IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2023

Side-Channel Based Device Authentication in Wireless Charging: An Experimental Study.
Proceedings of the Sixth IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2023

2022
<i>iContainer</i>: Consecutive checkpointing with rapid resilience for immortal container-based services.
J. Netw. Comput. Appl., 2022

SD-MTD: Software-Defined Moving-Target Defense for Cloud-System Obfuscation.
KSII Trans. Internet Inf. Syst., 2022

<i>Cloud-BlackBox</i>: Toward practical recording and tracking of VM swarms for multifaceted cloud inspection.
Future Gener. Comput. Syst., 2022

2021
FLEX-IoT: Secure and Resource-Efficient Network Boot System for Flexible-IoT Platform.
Sensors, 2021

2020
Compression-Assisted Adaptive ECC and RAID Scattering for NAND Flash Storage Devices.
Sensors, 2020

CAPTCHA Image Generation: Two-Step Style-Transfer Learning in Deep Neural Networks.
Sensors, 2020

A Durable Hybrid RAM Disk with a Rapid Resilience for Sustainable IoT Devices.
Sensors, 2020

Compatible byte-addressable direct I/O for peripheral memory devices in Linux.
Inf. Syst., 2020

Acoustic-decoy: Detection of adversarial examples through audio modification on speech recognition system.
Neurocomputing, 2020

Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks.
IEICE Trans. Inf. Syst., 2020

Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods.
IEICE Trans. Inf. Syst., 2020

Toward a Fine-Grained Evaluation of the Pwnable CTF.
Proceedings of the Information Security Applications - 21st International Conference, 2020

FriendNet Backdoor: Indentifying Backdoor Attack that is safe for Friendly Deep Neural Network.
Proceedings of the ICSIM '20: The 3rd International Conference on Software Engineering and Information Management, 2020

TargetNet Backdoor: Attack on Deep Neural Network with Use of Different Triggers.
Proceedings of the ICIIT 2020: 5th International Conference on Intelligent Information Technology, 2020

CERT Training Platform over the Event-Recordable Container.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

Blueprint for a Secure Container to Protect Data in Edge Cloud Computing Environment.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

Toward Software-Defined Moving Target Defense for Secure Service Deployment Enhanced with a User-Defined Orchestration.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

Suicidal Risk Detection for Military Personnel.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020

2019
UAV-Undertaker: Securely Verifiable Remote Erasure Scheme with a Countdown-Concept for UAV via Randomized Data Synchronization.
Wirel. Commun. Mob. Comput., 2019

Selective Poisoning Attack on Deep Neural Networks <sup>†</sup>.
Symmetry, 2019

Anomaly Detection Technology Using Potential Difference Displacement Detection of Data Bus.
J. Internet Serv. Inf. Secur., 2019

CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Reduction of Data Leakage Using Software Streaming.
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019

Developing an OpenSHMEM Model Over a Switchless PCIe Non-Transparent Bridge Interface.
Proceedings of the IEEE International Parallel and Distributed Processing Symposium Workshops, 2019

Face Friend-Safe Adversarial Example on Face Recognition System.
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019

POSTER: Detecting Audio Adversarial Example through Audio Modification.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Selective Poisoning Attack on Deep Neural Network to Induce Fine-Grained Recognition Error.
Proceedings of the 2nd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2019

2018
Estimating Resident Registration Numbers of Individuals in Korea: Revisited.
KSII Trans. Internet Inf. Syst., 2018

Advanced Ensemble Adversarial Example on Unknown Deep Neural Network Classifiers.
IEICE Trans. Inf. Syst., 2018

Efficient machine learning over encrypted data with non-interactive communication.
Comput. Stand. Interfaces, 2018

Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier.
Comput. Secur., 2018

Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network.
IEEE Access, 2018

Applying Time-Lapse Concepts onto Storage System for Long-Term System Trace Analysis: Technical Challenges and Blueprints.
Proceedings of the First IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2018

2017
Energy-Efficient Hosting Rich Content from Mobile Platforms with Relative Proximity Sensing.
Sensors, 2017

OPERA: A Complete Offline and Anonymous Digital Cash Transaction System with a One-Time Readable Memory.
IEICE Trans. Inf. Syst., 2017

Doc-Trace: Tracing Secret Documents in Cloud Computing via Steganographic Marking.
IEICE Trans. Inf. Syst., 2017

An efficient stream cipher for resistive RAM.
IEICE Electron. Express, 2017

2016
A fully persistent and consistent read/write cache using flash-based general SSDs for desktop workloads.
Inf. Syst., 2016

2015
Reference Pattern-Aware Instant Memory Balancing for Consolidated Virtual Machineson Manycores.
IEEE Trans. Parallel Distributed Syst., 2015

Parity Resynchronization using a Block-level Journaling for Software RAID.
Inf. Syst., 2015

MalCore: Toward a Practical Malware Identification System Enhanced with Manycore Technology.
Proceedings of the Information Systems Security and Privacy, 2015

Malfinder: Accelerated Malware Classification System through Filtering on Manycore System.
Proceedings of the ICISSP 2015, 2015

2014
Adaptive wear-leveling algorithm for PRAM main memory with a DRAM buffer.
ACM Trans. Embed. Comput. Syst., 2014

I-Filter: Identical Structured Control Flow String filter for accelerated malware variant classification.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

2013
THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment.
IEEE Trans. Serv. Comput., 2013

Microscopic Bit-Level Wear-Leveling for NAND Flash Memory.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

2012
Resource Management of Manycores with a Hierarchical and a Hybrid Main Memory for MN-MATE Cloud Node.
Proceedings of the Eighth IEEE World Congress on Services, 2012

Efficient memory management of a hierarchical and a hybrid main memory for MN-MATE platform.
Proceedings of the 2012 PPOPP International Workshop on Programming Models and Applications for Multicores and Manycores, 2012

GHOST: GPGPU-offloaded high performance storage I/O deduplication for primary storage system.
Proceedings of the 2012 PPOPP International Workshop on Programming Models and Applications for Multicores and Manycores, 2012

OPAMP: Evaluation Framework for Optimal Page Allocation of Hybrid Main Memory Architecture.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

2011
ACCENT: Cognitive cryptography plugged compression for SSL/TLS-based cloud computing services.
ACM Trans. Internet Techn., 2011

MN-GEMS: A Timing-Aware Simulator for a Cloud Node with Manycore, DRAM, and Non-volatile Memories.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
BLAST: Applying Streaming Ciphers Into Outsourced Cloud Storage.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

MN-Mate: Resource Management of Manycores with DRAM and Nonvolatile Memories.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010

PokerFace: Game players themselves are truly memorable.
Proceedings of the 2010 International IEEE Consumer Electronics Society's Games Innovations Conference, 2010

Enabling sportive games with a do-it-yourself wearable computing platform.
Proceedings of the 2010 International IEEE Consumer Electronics Society's Games Innovations Conference, 2010

FalconEye: Data Center Status Extraction via Vision Transformation Techniques.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

THEMIS: Towards Mutually Verifiable Billing Transactions in the Cloud Computing Environment.
Proceedings of the IEEE International Conference on Cloud Computing, 2010

HyperDealer: Reference-Pattern-Aware Instant Memory Balancing for Consolidated Virtual Machines.
Proceedings of the IEEE International Conference on Cloud Computing, 2010

2009
An intuitive data transfer technique using bartender's gestures.
Proceedings of the 17th International Conference on Multimedia 2009, 2009

2008
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices.
IEEE Trans. Computers, 2008

2007
U-TOPIA: A Ubiquitous Environment with a Wearable Platform, UFC and Its Security Infrastructure, pKASSO.
Proceedings of the Constructing Ambient Intelligence, 2007

pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

A Ubiquitous Fashionable Computer with an i-Throw Device on a Location-Based Service Environment.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007


  Loading...