Zobrazeno 1 - 10
of 60
pro vyhledávání: '"Seok-Hwan Choi"'
Publikováno v:
운동과학, Vol 33, Iss 1, Pp 8-16 (2024)
PURPOSE This study provides fundamental data required to promote the physical and mental health of college students by exploring their subjective health perception relative to physical activity level. METHODS Individual, in-depth interviews were cond
Externí odkaz:
https://doaj.org/article/b8121269eaa7443fb336aa03c96e822a
Publikováno v:
IEEE Access, Vol 12, Pp 167313-167323 (2024)
Spam emails, which are unsolicited bulk emails, pose a significant threat in digital communication security. To counter spam emails, learning-based spam email filtering methods have been extensively studied. However, as spam patterns evolve, these me
Externí odkaz:
https://doaj.org/article/cc6005adbc7e4c899ad34be6e8b16a8b
Publikováno v:
IEEE Access, Vol 11, Pp 144040-144050 (2023)
Backdoor attacks, which induce a trained model to behave as intended by an adversary for specific inputs, have recently emerged as a serious security threat in deep learning-based classification models. In particular, because a backdoor attack is exe
Externí odkaz:
https://doaj.org/article/dccea9e8d35c4d2eacb6846a24d1be4f
Publikováno v:
IEEE Access, Vol 10, Pp 110770-110784 (2022)
Blockchain techniques have been actively used in a wide range of applications owing to their unforgeable characteristics. Currently, many blockchain platforms are applying a pBFT-based Delegate PoS(DPoS) consensus mechanism in their networks, because
Externí odkaz:
https://doaj.org/article/19265ce3dc5b49b383f54d332648d4d1
Publikováno v:
IEEE Access, Vol 10, Pp 33602-33615 (2022)
An adversarial example, which is an input instance with small, intentional feature perturbations to machine learning models, represents a concrete problem in Artificial intelligence safety. As an emerging defense method to defend against adversarial
Externí odkaz:
https://doaj.org/article/8ab9dc9351d0496ca335ae7c651cb5d6
Publikováno v:
IEEE Access, Vol 10, Pp 32595-32607 (2022)
A smart contract is a computer program which is automatically executed with some conditional statements such as “if/then”. Since smart contracts can include some vulnerable program codes, smart contract exploit was recently highlighted as one of
Externí odkaz:
https://doaj.org/article/bec2252ec8d14a21a5eebde55d8408f1
Publikováno v:
IEEE Access, Vol 8, Pp 119848-119862 (2020)
Due to the risk of data leakage while training deep learning models in a shared environment, we propose a new privacy-preserving deep learning (PPDL) method using a structural image de-identification approach for object classification. The proposed s
Externí odkaz:
https://doaj.org/article/85794be3897b42da88bdfc9504752f46
Publikováno v:
Sensors, Vol 22, Iss 10, p 3826 (2022)
With intentional feature perturbations to a deep learning model, the adversary generates an adversarial example to deceive the deep learning model. As an adversarial example has recently been considered in the most severe problem of deep learning tec
Externí odkaz:
https://doaj.org/article/cb65cfbec1654c80bb07d5b9d39504ad
Publikováno v:
IEEE Access, Vol 6, Pp 45990-46001 (2018)
In bioinformatics, researchers have endeavored to resolve the following two issues: 1) how to increase the efficiency of storage through compression and 2) how to provide confidentiality for the genome sequence data. To resolve two issues, the sequen
Externí odkaz:
https://doaj.org/article/7e78c057eb334a55b820476754adfd12
Publikováno v:
Sensors, Vol 21, Iss 23, p 7806 (2021)
As the amount of data collected and analyzed by machine learning technology increases, data that can identify individuals is also being collected in large quantities. In particular, as deep learning technology—which requires a large amount of analy
Externí odkaz:
https://doaj.org/article/4107472d06fc496786c221784b0bc6a0