Zobrazeno 1 - 10
of 205
pro vyhledávání: '"Ahn, Na"'
We present a method for end-to-end learning of Koopman surrogate models for optimal performance in a specific control task. In contrast to previous contributions that employ standard reinforcement learning (RL) algorithms, we use a training algorithm
Externí odkaz:
http://arxiv.org/abs/2403.14425
Autor:
Ahn, Na Young, Lee, Dong Hoon
Publikováno v:
Computers & Security, 2023
NAND flash memory-based IoT devices inherently suffer from data retention issues. In IoT security, these retention issues are significant and require a robust solution for secure deletion. Secure deletion methods can be categorized into off-chip and
Externí odkaz:
http://arxiv.org/abs/2308.05225
Autor:
Ahn, Na Young, Lee, Dong Hoon
NAND flash memory-based IoT device can potentially still leave behind original personal data in an invalid area even if the data has been deleted. In this paper, we raise the forensic issue of original data remaining in unmanaged blocks caused by NAN
Externí odkaz:
http://arxiv.org/abs/2208.06003
Autor:
Ahn, Na Young, Lee, Dong Hoon
Over-provisioning technology is typically introduced as a means to improve the performance of storage systems, such as databases. The over-provisioning area is both hidden and difficult for normal users to access. This paper focuses on attack models
Externí odkaz:
http://arxiv.org/abs/2112.13923
Publikováno v:
In Journal of Asia-Pacific Entomology September 2024 27(3)
Publikováno v:
Digital Policy, Regulation and Governance, 2023, Vol. 25, Issue 6, pp. 568-587.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/DPRG-06-2022-0054
Publikováno v:
2020, Vol.8
There has been vigorous debate on how different countries responded to the COVID-19 pandemic. To secure public safety, South Korea actively used personal information at the risk of personal privacy whereas France encouraged voluntary cooperation at t
Externí odkaz:
http://arxiv.org/abs/2004.14495
Publikováno v:
Journal of Information, Communication and Ethics in Society, 2023, Vol. 21, Issue 2, pp. 161-180.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/JICES-02-2022-0020
Autor:
Ahn, Na-Young, Lee, Dong Hoon
We introduce a hash chain-based secure cluster. Here, secure cluster refers to a set of vehicles having vehicular secrecy capacity of more than a reference value. Since vehicle communication is performed in such a secure cluster, basically secure veh
Externí odkaz:
http://arxiv.org/abs/1912.12392
Autor:
Ahn, Na-Young, Lee, Dong Hoon
We propose schemes for efficiently destroying privacy data in a NAND flash memory. Generally, even if privcy data is discarded from NAND flash memories, there is a high probability that the data will remain in an invalid block. This is a management p
Externí odkaz:
http://arxiv.org/abs/2001.00522