Date | Main | Opponent | Title |
---|
22.5.16 | Chanjong Lee | Jaek Yun | DeepReflect: Discovering Malicious Functionality through Binary Reconstruction |
22.5.23 | Seonhye Park | Seunghyun Park | Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models |
22.6.13 | Seunghyun Park | Seonhye Park | MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation |
22.6.20 | Jeongyong Park | Taeyoung Kim | What went wrong and when? Instance-wise feature importance for time-series black-box models |
22.6.27 | Taeyoung Kim | Soolin Kim | SODA: A Generic Online Detection Framework for Smart Contracts |
22.7.11 | Eunsoo Kim | - | Phishing in Organizations: Findings from a Large-Scale and Long-Term Study |
22.7.18 | Seungho Kim | Beomjin Jin | WtaGraph: Web Tracking and Advertising Detection using Graph Neural Networks |
22.7.25 | Mohsen Ali | Bedeuro Kim | MMAuth: A Continuous Authentication Framework on Smartphones Using Multiple Modalities |
22.8.8 | Jaek Yun | Chanjong Lee | CENTRIS: A Precise and Scalable Approach for Identifying Modified Open-Source Software Reuse |
22.8.22 | Minseo Park | - | Structural Attack against Graph Based Android Malware Detection |
22.8.29 | Soolin Kim | - | - |
22.9.5 | Yejin Do | - | - |
22.9.12 | Beomjin Jin | - | - |
22.9.19 | Sanghak Oh | - | - |
22.9.26 | Yunhee Jang | - | - |
22.10.3 | Minwook Lee | - | - |