Date | Main | Opponent | Title |
---|
23.6.27 | Woojin Jeon | Seungho Kim | Going Incognito in the Metaverse: Achieving Theoretically Optimal Privacy-Usability Tradeoffs in VR |
23.7.25 | Eunsoo Kim | Kiho Lee | Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants |
23.8.1 | Soolin Kim | Taeyoung Kim | MVD: memory-related vulnerability detection based on flow-sensitive graph neural networks |
23.8.8 | Yejin Do | Nivedita Singh | Automated Cookie Notice Analysis and Enforcement |
23.8.22 | Seungho Kim | Jihun Kim | Optimized Privacy-Preserving CNN Inference With Fully Homomorphic Encryption |
23.9.6 | Taeyoung Kim | Kiho Lee | Pelican: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis |
23.9.20 | Seonhye Park | Taeyoung Kim | Industrial practitioners' mental models of adversarial machine learning |
23.9.27 | Beomjin Jin | - | |
23.10.4 | Heewon Baek | - | |
23.10.11 | Seyoung Jin | - | |
23.10.18 | Nivedita Singh | - | |
23.10.25 | Chaejin Lim | - | |
23.11.1 | Hyun Min Choi | - | |
23.11.8 | Daehoon Ko | - | |
23.11.15 | Jungkon Kim | - | |
23.11.22 | Chanjong Lee | - | |
23.11.29 | Sanghak Oh | - | |
23.12.6 | Kiho Lee | - | |
23.12.13 | Bedeuro Kim | - | |