Date | Main | Opponent | Title |
---|
22.3.8 | Minwook Lee | Sanghak Oh | Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques |
22.3.15 | Bedeuro Kim | Kiho Lee | HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes. |
22.3.28 | Eunsoo Kim | Beomjin Jin | Helping hands: Measuring the impact of a large threat intelligence sharing community. |
22.4.4 | Soolin Kim | Beomjin Jin | AdGraph: A Graph-Based Approach to Ad and Tracker Blocking |
22.4.18 | Sanghak Oh | Seunghyun Park | ET-BERT: A Contextualized Datagram Representation with Pre-training Transformers for Encrypted Traffic Classification |
22.4.25 | Jeongyong Park | Seonhye Park | Time Series Anomaly Detection Using Convolutional Neural Networks and Transfer Learning |
22.5.2 | Bedeuro Kim | Kiho Lee | Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems |
22.5.9 | Kiho Lee | Bedeuro Kim | A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks |
22.5.16 | Chanjong Lee | Jaek Yun | DeepReflect: Discovering Malicious Functionality through Binary Reconstruction |
22.5.23 | Seonhye Park | Seunghyun Park | Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models |
22.5.30 | Seunghyun Park | - | - |
22.6.13 | Jeongyong Park | - | - |
22.6.20 | Taeyoung Kim | - | - |
22.6.27 | Eunsoo Kim | - | - |
22.7.4 | Seungho Kim | - | - |
22.7.11 | Mohsen Ali | - | - |
22.7.18 | Jaek Yun | - | - |
22.7.25 | Minseo Park | - | - |
22.8.1 | Soolin Kim | - | - |
22.8.8 | Yejin Do | - | - |
22.8.22 | Beomjin Jin | - | - |