Leo Hyun Park

Orcid: 0000-0002-3100-2258

According to our database1, Leo Hyun Park authored at least 14 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Amplifying Training Data Exposure through Fine-Tuning with Pseudo-Labeled Memberships.
CoRR, 2024

Adversarial Feature Alignment: Balancing Robustness and Accuracy in Deep Learning via Adversarial Training.
CoRR, 2024

Coexistence of Deepfake Defenses: Addressing the Poisoning Challenge.
IEEE Access, 2024

2023
GradFuzz: Fuzzing deep neural networks with gradient vector coverage for adversarial examples.
Neurocomputing, 2023

Membership Inference Attacks With Token-Level Deduplication on Korean Language Models.
IEEE Access, 2023

Robust Training for Deepfake Detection Models Against Disruption-Induced Data Poisoning.
Proceedings of the Information Security Applications - 24th International Conference, 2023

2022
Mixed and constrained input mutation for effective fuzzing of deep learning systems.
Inf. Sci., 2022

On Membership Inference Attacks to Generative Language Models Across Language Domains.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

Towards Constructing Consistent Pattern Strength Meters with User's Visual Perception.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

Poster: Adversarial Defense with Deep Learning Coverage on MagNet's Purification.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2020
Birds of a Feature: Intrafamily Clustering for Version Identification of Packed Malware.
IEEE Syst. J., 2020

2019
Draw It As Shown: Behavioral Pattern Lock for Mobile User Authentication.
IEEE Access, 2019

Poster: Effective Layers in Coverage Metrics for Deep Neural Networks.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
A Guided Approach to Behavioral Authentication.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018


  Loading...