Reading Seminar

Score Board

View All
NameMainOpponent
Eunsoo Kim2020
Beomjin Jin1718
Soolin Kim1615
Sanghak Oh1513
Bedeuro Kim117
Seonhye Park810
Taeyoung Kim 79
Chanjong Lee64
Seungho Kim63
Yejin Do53
Nivedita Singh48
Heewon Baek44
Chaejin Lim44
Seyoung Jin43
Kiho Lee38
Woojin Jeon36
Hyun Min Choi31
Jihun Kim23
Eun Jung21
Seonghyeon Song20
Yena Cho20
Heesung Jeong12
Jungkon Kim10
Sangjun Chae10
Giwon Lee10
Daehoon Ko10
Sukyeong Bang02
Jieun Hwang01
Yerim Kim01
Yooshick Moon00
Woojoo Kim00
Kyungbin Ryu00

List

View All    Update List
DateMainOpponentTitle
24.12.30Soolin Kim-Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning
25.1.7Sanghak OhWoojin JeonTrafficFormer: An Efficient Pre-trained Model for Traffic Data
25.1.14Beomjin JinChaejin LimA Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild
25.1.21Seonhye ParkSeyoung JinCasual Users and Rational Choices within Differential Privacy
25.1.21Taeyoung Kim -VETEOS: Statically Vetting EOSIO Contracts for the "Groundhog Day" Vulnerabilities
25.2.4Eunsoo KimEun JungBreaking Security-Critical Voice Authentication
25.2.11Seonghyeon SongTaeyoung Kim AutoDroid: LLM-powered Task Automation in Android
25.2.18Seungho KimHeewon BaekGopher: High-Precision and Deep-Dive Detection of Cryptographic API Misuse in the Go Ecosystem
25.2.25Bedeuro KimHeesung JeongOrganic or Diffused: Can We Distinguish Human Art from AI-generated Images?
25.3.4Yena ChoYerim KimLess Defined Knowledge and More True Alarms: Reference-based Phishing Detection without a Pre-defined Reference List
25.3.11Heesung JeongJieun HwangAn Empirical Study to Evaluate AIGC Detectors on Code Content
25.3.18Sanghak Oh-Packet-Level Open-World App Fingerprinting on Wireless Traffic
25.3.25Sangjun Chae-
25.4.1Eun Jung-
25.4.8Nivedita Singh-
25.4.15Yooshick Moon-
25.4.22Chaejin Lim-
25.4.29Sukyeong Bang-
25.5.13Heewon Baek-
25.5.20Seyoung Jin-
25.5.27Soolin Kim-
25.6.3Yejin Do-
25.6.10Woojin Jeon-