Date | Main | Opponent | Title |
---|
24.9.9 | Seonhye Park | Nivedita Singh | On the Necessity of Auditable Algorithmic Definitions for Machine Unlearning |
24.9.23 | Jihun Kim | Heesung Jeong | Defense Against Adversarial Attacks on No-Reference Image Quality Models with Gradient Norm Regularization |
24.9.30 | Hyun Min Choi | - | Differentially Private Synthetic Data via Foundation Model APIs 1: Images |
24.10.7 | Woojin Jeon | Sanghak Oh | Using Motion Forecasting for Behavior-Based Virtual Reality (VR) Authentication |
24.10.28 | Chaejin Lim | Beomjin Jin | EaTVul:ChatGPT-based Evasion Attack Against Software Vulnerability Detection |
24.11.4 | Nivedita Singh | Seyoung Jin | Towards Automated Regulation Analysis for Effective Privacy Compliance |
24.11.11 | Heewon Baek | Seyoung Jin | TrojanPuzzle: Covertly Poisoning Code-Suggestion Models |
24.11.18 | Seyoung Jin | Nivedita Singh | CamPro: Camera-based Anti-Facial Recognition |
24.11.25 | Yejin Do | Beomjin Jin | Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A Zero-Shot Generation with Large Language Models |
24.12.9 | Seungho Kim | - | VulExplainer: A Transformer-Based Hierarchical Distillation for Explaining Vulnerability Types |
24.12.16 | Eunsoo Kim | - | |
24.12.23 | Soolin Kim | - | |
24.12.30 | Sanghak Oh | - | |