Yongchul Kim

Orcid: 0000-0003-1393-8711

According to our database1, Yongchul Kim authored at least 24 papers between 2000 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Toward Selective Membership Inference Attack against Deep Learning Model.
IEICE Trans. Inf. Syst., November, 2022

BlindNet backdoor: Attack on deep neural network using blind watermark.
Multim. Tools Appl., 2022

2021
Classification score approach for detecting adversarial example in deep neural network.
Multim. Tools Appl., 2021

2020
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System.
IEEE Trans. Inf. Forensics Secur., 2020

2019
Selective Untargeted Evasion Attack: An Adversarial Example That Will Not Be Classified as Certain Avoided Classes.
IEEE Access, 2019

2018
Random Untargeted Adversarial Example on Deep Neural Network.
Symmetry, 2018

Asynchronous Channel-Hopping Scheme under Jamming Attacks.
Mob. Inf. Syst., 2018

Hybrid Rendezvous Algorithm against Jamming Attacks for Cognitive Radio Networks.
J. Commun., 2018

CAPTCHA Image Generation Systems Using Generative Adversarial Networks.
IEICE Trans. Inf. Syst., 2018

Advanced Ensemble Adversarial Example on Unknown Deep Neural Network Classifiers.
IEICE Trans. Inf. Syst., 2018

Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier.
Comput. Secur., 2018

Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network.
IEEE Access, 2018

One-Pixel Adversarial Example that Is Safe for Friendly Deep Neural Networks.
Proceedings of the Information Security Applications - 19th International Conference, 2018

Fooling a Neural Network in Military Environments: Random Untargeted Adversarial Example.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

2017
The Effect of Increasing the Number of Transceivers in an Anti-jamming Channel-Hopping Scheme.
J. Commun., 2017

2013
Generalized Hybrid Scheduling Scheme for Multihop Relaying WiMAX Networks.
J. Commun., 2013

MAC prioritization scheme resolving unfairness problem.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013

2012
Hybrid resource allocation scheme in two-hop relaying WiMAX networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

2011
Optimal Max-Min Fair Resource Allocation in Multihop Relay-Enhanced WiMAX Networks.
IEEE Trans. Veh. Technol., 2011

Optimal Placement of Transparent Relay Stations in 802.16j Mobile Multihop Relay Networks.
IEICE Trans. Commun., 2011

Optimal resource allocation in multihop relay-enhanced WiMAX networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

2010
Cost Effective Coverage Extension in 802.16j Mobile Multihop Relay Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Fairness Schemes in 802.16j Mobile Multihop Relay Networks.
Proceedings of the Global Communications Conference, 2010

2000
Mobile Agents for Reliable Migration in Networks.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2000


  Loading...