Abstract is missing.
- Spatially Localized Perturbation GAN (SLP-GAN) for Generating Invisible Adversarial PatchesYongsu Kim, Hyoeun Kang, Afifatul Mukaroh, Naufal Suryanto, Harashta Tatimma Larasati, Howon Kim. 3-15 [doi]
- Detecting Block Cipher Encryption for Defense Against Crypto Ransomware on Low-End Internet of ThingsHyunJi Kim, Jaehoon Park, Hyeokdong Kwon, Kyoungbae Jang, Seungju Choi, Hwajeong Seo. 16-30 [doi]
- CAPTCHAs Are Still in Danger: An Efficient Scheme to Bypass Adversarial CAPTCHAsDongbin Na, Namgyu Park, Sangwoo Ji, Jong Kim 0001. 31-44 [doi]
- Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling EffortKyung Ho Park, Eunji Park, Huy Kang Kim. 45-58 [doi]
- Entropy-Based Feature Grouping in Machine Learning for Android Malware ClassificationHyunseok Shim, Souhwan Jung. 59-72 [doi]
- DLDDO: Deep Learning to Detect Dummy OperationsJongHyeok Lee, Dong-Guk Han. 73-85 [doi]
- 3-Party Adversarial SteganographyIshak Meraouche, Sabyasachi Dutta, Kouichi Sakurai. 89-100 [doi]
- Accessibility Service Utilization Rates in Android Applications Shared on TwitterShuichi Ichioka, Estelle Pouget, Takao Mimura, Jun Nakajima, Toshihiro Yamauchi. 101-111 [doi]
- Novel Reversible Acoustic Steganography Based on Carrier OrthogonalityHung-Jr Shiu, Fang-Yie Leu, Chun-Ming Lai, Yu-Chun Huang. 112-123 [doi]
- Compact Implementation of CHAM Block Cipher on Low-End MicrocontrollersHyeokdong Kwon, HyunJi Kim, Seungju Choi, Kyoungbae Jang, Jaehoon Park, Hyunjun Kim, Hwajeong Seo. 127-141 [doi]
- The Gravy Value: A Set of Features for Pinpointing BOT Detection MethodSemi Park, Kyungho Lee. 142-153 [doi]
- Impact of Optimized Operations A· B, A· C for Binary Field Inversion on Quantum ComputersKyoungbae Jang, Seung Ju Choi, Hyeokdong Kwon, Zhi Hu, Hwajeong Seo. 154-166 [doi]
- Virtualization Technologies in the Android Framework and Compatibility with SEAndroidJaehyeon Yoon, Tu Chau Ngoc, Hoang Nguyen Huy, Souhwan Jung. 167-178 [doi]
- Toward a Fine-Grained Evaluation of the Pwnable CTFSung Kyung Kim, Eun-Tae Jang, Ki-Woong Park. 179-190 [doi]
- A Statistical Approach Towards Fraud Detection in the Horse RacingMoohong Min, Jemin Justin Lee, Hyunbeom Park, Hyojoung Shin, Kyungho Lee. 191-202 [doi]
- On the Cost-Effectiveness of TrustZone Defense on ARM PlatformNaiwei Liu, Meng Yu 0001, Wanyu Zang, Ravi Sandhu. 203-214 [doi]
- Detection on GPS Spoofing in Location Based Mobile GamesShing Ki Wong, Siu-Ming Yiu. 215-226 [doi]
- Push for More: On Comparison of Data Augmentation and SMOTE with Optimised Deep Learning Architecture for Side-ChannelYoo-Seung Won, Dirmanto Jap, Shivam Bhasin. 227-241 [doi]
- Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based ConstructionPriyanka Dutta, Willy Susilo, Dung Hoang Duong, Joonsang Baek, Partha Sarathi Roy 0001. 245-257 [doi]
- Efficient Algorithm for Computing Odd-Degree Isogenies on Montgomery CurvesKenta Kodera, Chen-Mou Cheng, Atsuko Miyaji. 258-275 [doi]
- An Efficient Implementation of AES on 8-Bit AVR-Based Sensor NodesYoungBeom Kim, Seog Chung Seo. 276-290 [doi]
- Revisiting the Minrank Problem on Multivariate CryptographyYacheng Wang, Yasuhiko Ikematsu, Shuhei Nakamura, Tsuyoshi Takagi. 291-307 [doi]
- Paid and Anonymous Usage of Cloud SoftwareKun Peng. 308-320 [doi]
- Optimization of PBKDF2-HMAC-SHA256 and PBKDF2-HMAC-LSH256 in CPU EnvironmentsHojin Choi, Seog Chung Seo. 321-333 [doi]
- Cryptanalysis of Two Fully Anonymous Attribute-Based Group Signature Schemes with Verifier-Local Revocation from LatticesYanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia. 334-346 [doi]
- Analysis on Malicious Residential Hosts Activities Exploited by Residential IP Proxy ServicesAkihiro Hanzawa, Hiroaki Kikuchi. 349-361 [doi]
- Insights into Attacks' Progression: Prediction of Spatio-Temporal Behavior of DDoS AttacksAhmed Abusnaina, Mohammed Abuhamad, DaeHun Nyang, Songqing Chen, An Wang 0002, David A. Mohaisen. 362-374 [doi]
- Methods to Select Features for Android Malware Detection Based on the Protection Level AnalysisChaeeun Lee, Eunnarae Ko, Kyungho Lee. 375-386 [doi]
- Filtering-Based Correlation Power Analysis (CPA) with Signal Envelopes Against Shuffling MethodsYoung Bae Jeon, Ji Won Yoon. 389-402 [doi]
- Security Problems of 5G Voice CommunicationSeongmin Park, HyungJin Cho, Youngkwon Park, Bomin Choi, Dowon Kim, Kangbin Yim. 403-415 [doi]