Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM
|
2020 |
Park, Kyung Ho |
FSF: Code Coverage-Driven Fuzzing for Software-Defined Networking
|
2020 |
Kim, Hyuntae |
A Blind Ring Signature Based on the Short Integer Solution Problem
|
2020 |
Le, Huy Quoc |
Timed-Release Encryption with Master Time Bound Key
|
2020 |
Choi, Gwangbae |
Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof
|
2020 |
Kim, Jongkil |
CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network
|
2020 |
Kwon, Hyun |
Ring-LWE on 8-Bit AVR Embedded Processor
|
2020 |
Seo, Hwajeong |
DroPPPP: A P4 Approach to Mitigating DoS Attacks in SDN
|
2020 |
Simsek, Goksel |
A Secure and Self-tallying E-voting System Based on Blockchain
|
2020 |
Zeng, Gongxian |
Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing
|
2020 |
Wu, Hao-Tian |
Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression
|
2020 |
Hong, Mi Yeon |
Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments
|
2020 |
Park, Jeman |
Optimized SIKE Round 2 on 64-bit ARM
|
2020 |
Seo, Hwajeong |
Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR
|
2020 |
Perera, Maharage Nisansala Sevwandi |
Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNNs)
|
2020 |
Halgas, Lukas |
Strengthened PAKE Protocols Secure Against Malicious Private Key Generator
|
2020 |
Shin, SeongHan |
RC PUF: A Low-Cost and an Fasy-to-Design PUF for Resource-Constrained IoT Devices
|
2020 |
Lee, Sangjae |
Low-Noise LLC Side-Channel Attack with Perf
|
2020 |
Ko, Youngjoo |
Turn On the Lights: User Behavior in Game Environment Using CPTED
|
2020 |
Seo, Jeongeun |
QR Code Watermarking for Digital Images
|
2020 |
Chow, Yang-Wai |