Simon S. Woo

Orcid: 0000-0002-8983-1542

According to our database1, Simon S. Woo authored at least 134 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Gradient Alignment for Cross-Domain Face Anti-Spoofing.
CoRR, 2024

Continuous Memory Representation for Anomaly Detection.
CoRR, 2024

SoK: Facial Deepfake Detectors.
CoRR, 2024

Source-Free Online Domain Adaptive Semantic Segmentation of Satellite Images under Image Degradation.
CoRR, 2024

Real-Time User-guided Adaptive Colorization with Vision Transformer.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024

Saliency-Aware Time Series Anomaly Detection for Space Applications.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2024

SEE: Spherical Embedding Expansion for Improving Deep Metric Learning.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2024

Relation-Aware Label Smoothing for Self-KD.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2024

STLGRU: Spatio-Temporal Lightweight Graph GRU for Traffic Flow Prediction.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2024

Layer Attack Unlearning: Fast and Accurate Machine Unlearning via Layer Level Attack and Knowledge Distillation.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

All but One: Surgical Concept Erasing with Model Preservation in Text-to-Image Diffusion Models.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Blind-Touch: Homomorphic Encryption-Based Distributed Neural Network Inference for Privacy-Preserving Fingerprint Authentication.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Evaluating Trustworthiness and Racial Bias in Face Recognition APIs Using Deepfakes.
Computer, May, 2023

An overhead-free region-based JPEG framework for task-driven image compression.
Pattern Recognit. Lett., January, 2023

DID We Miss Anything?: Towards Privacy-Preserving Decentralized ID Architecture.
IEEE Trans. Dependable Secur. Comput., 2023

Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks.
CoRR, 2023

Microbial Genetic Algorithm-based Black-box Attack against Interpretable Deep Learning Systems.
CoRR, 2023

OTJR: Optimal Transport Meets Optimal Jacobian Regularization for Adversarial Robustness.
CoRR, 2023

Why Do Deepfake Detectors Fail?
CoRR, 2023

KappaFace: Adaptive Additive Angular Margin Loss for Deep Face Recognition.
IEEE Access, 2023

Expectation-Maximization via Pretext-Invariant Representations.
IEEE Access, 2023

Why Do Facial Deepfake Detectors Fail?
Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes, 2023

Exploiting Inconsistencies in Object Representations for Deepfake Video Detection.
Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes, 2023

CFL-Net: Image Forgery Localization Using Contrastive Learning.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023

Rotated-DETR: an End-to-End Transformer-based Oriented Object Detector for Aerial Images.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

S-ViT: Sparse Vision Transformer for Accurate Face Recognition.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

MGCMA: Multi-scale Generator with Channel-wise Mask Attention to generate Synthetic Contrast-enhanced Chest Computed Tomography.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

IMF: Integrating Matched Features Using Attentive Logit in Knowledge Distillation.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Hand Bone X-rays Segmentation and Congregation for Age Assessment using Deep Learning.
Proceedings of the International Conference on Information Networking, 2023

HRFNet: High-Resolution Forgery Network for Localizing Satellite Image Manipulation.
Proceedings of the IEEE International Conference on Image Processing, 2023

Quality-Agnostic Deepfake Detection with Intra-model Collaborative Learning.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Anomaly and Novelty detection for Satellite and Drone systems (ANSD '23).
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

KID34K: A Dataset for Online Identity Card Fraud Detection.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

UNDO: Effective and Accurate Unlearning Method for Deep Neural Networks.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

SAFE: Sequential Attentive Face Embedding with Contrastive Learning for Deepfake Video Detection.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

Towards Understanding of Deepfake Videos in the Wild.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

2022
ORVAE: One-Class Residual Variational Autoencoder for Voice Activity Detection in Noisy Environment.
Neural Process. Lett., 2022

Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning.
CoRR, 2022

Deepfake Detection for Facial Images with Facemasks.
CoRR, 2022

PasswordTensor: Analyzing and explaining password strength using tensor decomposition.
Comput. Secur., 2022

A Survey of Deep Learning-Based Object Detection Methods and Datasets for Overhead Imagery.
IEEE Access, 2022

Am I a Real or Fake Celebrity? Evaluating Face Recognition and Verification APIs under Deepfake Impersonation Attack.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

BZNet: Unsupervised Multi-scale Branch Zooming Network for Detecting Low-quality Deepfake Videos.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Advanced Machine Learning Techniques to Detect Various Types of Deepfakes.
Proceedings of the WDC@AsiaCCS '22: Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes, 2022

Zoom-DF: A Dataset for Video Conferencing Deepfake.
Proceedings of the WDC@AsiaCCS '22: Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes, 2022

Deepfake Detection for Fake Images with Facemasks.
Proceedings of the WDC@AsiaCCS '22: Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes, 2022

Negative Adversarial Example Generation Against Naver's Celebrity Recognition API.
Proceedings of the WDC@AsiaCCS '22: Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes, 2022

A Face Pre-Processing Approach to Evade Deepfake Detector.
Proceedings of the WDC@AsiaCCS '22: Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes, 2022

Residual size is not enough for anomaly detection: improving detection performance using residual similarity in multivariate time series.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

PTD: privacy-preserving human face processing framework using tensor decomposition.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

Learning Sparse Latent Graph Representations for Anomaly Detection in Multivariate Time Series.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

Evading Deepfake Detectors via High Quality Face Pre-Processing Methods.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

GLAMD: Global and Local Attention Mask Distillation for Object Detectors.
Proceedings of the Computer Vision - ECCV 2022, 2022

Efficient Two-stage Model Retraining for Machine Unlearning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2022

Towards an Awareness of Time Series Anomaly Detection Models' Adversarial Vulnerability.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

Selective Tensorized Multi-layer LSTM for Orbit Prediction.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

Accelerating CNN via Dynamic Pattern-based Pruning Network.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

Sliding Cross Entropy for Self-Knowledge Distillation.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

STL-DP: Differentially Private Time Series Exploring Decomposition and Compression Methods.
Proceedings of the CIKM 2022 Workshops co-located with 31st ACM International Conference on Information and Knowledge Management (CIKM 2022), 2022

Samba: Identifying Inappropriate Videos for Young Children on YouTube.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

RCRL: Replay-based Continual Representation Learning in Multi-task Super-Resolution.
Proceedings of the 18th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2022

WDC'22: 1st Workshop on the Security Implications of Deepfakes and Cheapfakes.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

A<sup>2</sup>: Adaptive Augmentation for Effectively Mitigating Dataset Bias.
Proceedings of the Computer Vision - ACCV 2022, 2022

ADD: Frequency Attention and Multi-View Based Knowledge Distillation to Detect Low-Quality Compressed Deepfake Images.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
DA-FDFtNet: Dual Attention Fake Detection Fine-tuning Network to Detect Various AI-Generated Fake Images.
CoRR, 2021

Exploring the Asynchronous of the Frequency Spectra of GAN-generated Facial Images.
CoRR, 2021

ADD: Frequency Attention and Multi-View based Knowledge Distillation to Detect Low-Quality Compressed Deepfake Images.
CoRR, 2021

FakeAVCeleb: A Novel Audio-Video Multimodal Deepfake Dataset.
CoRR, 2021

Am I a Real or Fake Celebrity? Measuring Commercial Face Recognition Web APIs under Deepfake Impersonation Attack.
CoRR, 2021

Neural network laundering: Removing black-box backdoor watermarks from deep neural networks.
Comput. Secur., 2021

Detecting handcrafted facial image manipulations and GAN-generated facial images using Shallow-FakeFaceNet.
Appl. Soft Comput., 2021

Will EU's GDPR Act as an Effective Enforcer to Gain Consent?
IEEE Access, 2021

A Security Analysis of Blockchain-Based Did Services.
IEEE Access, 2021

One Detector to Rule Them All: Towards a General Deepfake Attack Detection Framework.
Proceedings of the WWW '21: The Web Conference 2021, 2021

TAR: Generalized Forensic Framework to Detect Deepfakes Using Weakly Supervised Learning.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

Revitalizing Self-Organizing Map: Anomaly Detection Using Forecasting Error Patterns.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

BertLoc: duplicate location record detection in a large-scale location dataset.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

FakeAVCeleb: A Novel Audio-Video Multimodal Deepfake Dataset.
Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, 2021

VFP290K: A Large-Scale Benchmark Dataset for Vision-based Fallen Person Detection.
Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, 2021

CoReD: Generalizing Fake Media Detection with Continual Representation using Distillation.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Evaluation of an Audio-Video Multimodal Deepfake Dataset using Unimodal and Multimodal Detectors.
Proceedings of the ADGD '21: Proceedings of the 1st Workshop on Synthetic Multimedia, 2021

IVDR: Imitation learning with Variational inference and Distributional Reinforcement learning to find Optimal Driving Strategy.
Proceedings of the 20th IEEE International Conference on Machine Learning and Applications, 2021

Sarod: Efficient End-To-End Object Detection On SAR Images With Reinforcement Learning.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

FReTAL: Generalizing Deepfake Detection Using Knowledge Distillation and Representation Learning.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2021

Efficient Multi-Scale Feature Generation Adaptive Network.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

DLPNet: Dynamic Loss Parameter Network using Reinforcement Learning for Aerial Imagery Detection.
Proceedings of the AIPR 2021: 4th International Conference on Artificial Intelligence and Pattern Recognition, Xiamen, China, September 24, 2021

2020
Can We Create a Cross-Domain Federated Identity for the Industrial Internet of Things without Google?
IEEE Internet Things Mag., 2020

A Convolutional LSTM based Residual Network for Deepfake Video Detection.
CoRR, 2020

Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks.
CoRR, 2020

CAN-ADF: The controller area network attack detection framework.
Comput. Secur., 2020

Real Time Localized Air Quality Monitoring and Prediction Through Mobile and Fixed IoT Sensing Network.
IEEE Access, 2020

I've Got Your Packages: Harvesting Customers' Delivery Order Information using Package Tracking Number Enumeration Attacks.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

How Do We Create a Fantabulous Password?
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

FDFtNet: Facing Off Fake Images Using Fake Detection Fine-Tuning Network.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

CANTransfer: transfer learning based intrusion detection on a controller area network using convolutional LSTM network.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Forecasting Error Pattern-Based Anomaly Detection in Multivariate Time Series.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Applied Data Science Track, 2020

Reconstructing the Past: Applying Deep Learning to Reconstruct Pottery from Thousands Shards.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science and Demo Track, 2020

T-GD: Transferable GAN-generated Images Detection Framework.
Proceedings of the 37th International Conference on Machine Learning, 2020

Tale of Two Browsers: Understanding Users' Web Browser Choices in South Korea.
Proceedings of the Financial Cryptography and Data Security, 2020

OC-FakeDect: Classifying Deepfakes Using One-class Variational Autoencoder.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Who is Delivering My Food?: Detecting Food Delivery Abusers using Variational Reward Inference Networks.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

ITAD: Integrative Tensor-based Anomaly Detection System for Reducing False Positives of Satellite Systems.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

PassTag: A Graphical-Textual Hybrid Fallback Authentication System.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Design and Evaluation of Enumeration Attacks on Package Tracking Systems.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

Compensating for the Lack of Extra Training Data by Learning Extra Representation.
Proceedings of the Computer Vision - ACCV 2020 - 15th Asian Conference on Computer Vision, Kyoto, Japan, November 30, 2020

2019
Using Episodic Memory for User Authentication.
ACM Trans. Priv. Secur., 2019

Design and evaluation of 3D CAPTCHAs.
Comput. Secur., 2019

Password typographical error resilience in honey encryption.
Comput. Secur., 2019

You Walk, We Authenticate: Lightweight Seamless Authentication Based on Gait in Wearable IoT Systems.
IEEE Access, 2019

What is in Your Password? Analyzing Memorable and Secure Passwords using a Tensor Decomposition.
Proceedings of the World Wide Web Conference, 2019

GAN is a friend or foe?: a framework to detect various fake face images.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Predicting Air Quality using Moving Sensors.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Detecting Anomalies in Space using Multivariate Convolutional LSTM with Mixtures of Probabilistic PCA.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

FakeTalkerDetect: Effective and Practical Realistic Neural Talking Head Detection with a Highly Unbalanced Dataset.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision Workshops, 2019

Designing for Fallible Humans.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

Deep Learning for Blast Furnaces: Skip-Dense Layers Deep Learning Model to Predict the Remaining Time to Close Tap-holes for Blast Furnaces.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

Understanding Users' Risk Perceptions about Personal Health Records Shared on Social Networking Services.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Nickel to Lego: Using Foolgle</> to Create Adversarial Examples to Fool Google Cloud Speech-to-Text API.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Classifying Genuine Face images from Disguised Face Images.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
When George Clooney Is Not George Clooney: Using GenAttack to Deceive Amazon's and Naver's Celebrity Recognition APIs.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

GuidedPass: Helping Users to Create Strong and Memorable Passwords.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Detecting In-vehicle CAN Message Attacks Using Heuristics and RNNs.
Proceedings of the Information and Operational Technology Security Systems, 2018

Leveraging Semantic Transformation to Investigate Password Habits and Their Causes.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Adversarial Product Review Generation with Word Replacements.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Detecting Both Machine and Human Created Fake Face Images In the Wild.
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018

POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2016
Exploration of 3D Texture and Projection for New CAPTCHA Design.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Good Automatic Authentication Question Generation.
Proceedings of the INLG 2016, 2016

Life-experience passwords (LEPs).
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2014
Optimal application allocation on multiple public clouds.
Comput. Networks, 2014

3DOC: 3D object CAPTCHA.
Proceedings of the 23rd International World Wide Web Conference, 2014

2011
Analysis of Proximity-1 Space Link Interleaved Time Synchronization (PITS) Protocol.
Proceedings of the Global Communications Conference, 2011

2009
Efficient File Sharing by Multicast - P2P Protocol using Network Coding and Rank Based Peer Selection.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009

2008
Prioritized LT codes.
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008


  Loading...