Zobrazeno 1 - 10
of 384
pro vyhledávání: '"Kim HoWon"'
Autor:
Suryanto, Naufal, Adiputra, Andro Aprila, Kadiptya, Ahmada Yusril, Le, Thi-Thu-Huong, Pratama, Derry, Kim, Yongsu, Kim, Howon
Recent advancements in generative AI, particularly diffusion-based image editing, have enabled the transformation of images into highly realistic scenes using only text instructions. This technology offers significant potential for generating diverse
Externí odkaz:
http://arxiv.org/abs/2411.00425
Monocular depth estimation (MDE) and semantic segmentation (SS) are crucial for the navigation and environmental interpretation of many autonomous driving systems. However, their vulnerability to practical adversarial attacks is a significant concern
Externí odkaz:
http://arxiv.org/abs/2408.14879
Autor:
Pratama, Derry, Suryanto, Naufal, Adiputra, Andro Aprila, Le, Thi-Thu-Huong, Kadiptya, Ahmada Yusril, Iqbal, Muhammad, Kim, Howon
Publikováno v:
Sensors 2024, 24(21), 6878
Penetration testing, a critical component of cybersecurity, typically requires extensive time and effort to find vulnerabilities. Beginners in this field often benefit from collaborative approaches with the community or experts. To address this, we d
Externí odkaz:
http://arxiv.org/abs/2408.11650
Autor:
Schneider, Lucas, von Bredow, Christian, Kim, Howon, Ton, Khai That, Hänke, Torben, Wiebe, Jens, Wiesendanger, Roland
Adding superconducting (SC) electron pairing via the proximity effect to pristinely non-superconducting materials can lead to a variety of interesting physical phenomena. Particular interest has recently focused on inducing SC into two-dimensional su
Externí odkaz:
http://arxiv.org/abs/2402.08895
Behind The Wings: The Case of Reverse Engineering and Drone Hijacking in DJI Enhanced Wi-Fi Protocol
Autor:
Pratama, Derry, Moon, Jaegeun, Laksmono, Agus Mahardika Ari, Yun, Dongwook, Muhammad, Iqbal, Jeong, Byeonguk, Ji, Janghyun, Kim, Howon
This research paper entails an examination of the Enhanced Wi-Fi protocol, focusing on its control command reverse-engineering analysis and subsequent demonstration of a hijacking attack. Our investigation discovered vulnerabilities in the Enhanced W
Externí odkaz:
http://arxiv.org/abs/2309.05913
Autor:
Suryanto, Naufal, Kim, Yongsu, Larasati, Harashta Tatimma, Kang, Hyoeun, Le, Thi-Thu-Huong, Hong, Yoonyoung, Yang, Hunmin, Oh, Se-Yoon, Kim, Howon
Adversarial camouflage has garnered attention for its ability to attack object detectors from any viewpoint by covering the entire object's surface. However, universality and robustness in existing methods often fall short as the transferability aspe
Externí odkaz:
http://arxiv.org/abs/2308.07009
Autor:
Larasati, Harashta Tatimma, Kim, Howon
In the past years, research on Shor's algorithm for solving elliptic curves for discrete logarithm problems (Shor's ECDLP), the basis for cracking elliptic curve-based cryptosystems (ECC), has started to garner more significant interest. To achieve t
Externí odkaz:
http://arxiv.org/abs/2306.07530
Realizing hybrids of low-dimensional Kondo lattices and superconducting substrates leads to fascinating platforms for studying the exciting physics of strongly correlated electron systems with induced superconducting pairing. Here, we report a scanni
Externí odkaz:
http://arxiv.org/abs/2304.13697
Works on quantum computing and cryptanalysis has increased significantly in the past few years. Various constructions of quantum arithmetic circuits, as one of the essential components in the field, has also been proposed. However, there has only bee
Externí odkaz:
http://arxiv.org/abs/2204.08940