Search Results for author: Insik Shin

Found 6 papers, 0 papers with code

Online Evasion Attacks on Recurrent Models:The Power of Hallucinating the Future

no code implementations8 Jul 2022 Byunggill Joe, Insik Shin, Jihun Hamm

Recurrent models are frequently being used in online tasks such as autonomous driving, and a comprehensive study of their vulnerability is called for.

Autonomous Driving

Machine Learning with Electronic Health Records is vulnerable to Backdoor Trigger Attacks

no code implementations15 Jun 2021 Byunggill Joe, Akshay Mehra, Insik Shin, Jihun Hamm

Electronic Health Records (EHRs) provide a wealth of information for machine learning algorithms to predict the patient outcome from the data including diagnostic information, vital signals, lab tests, drug administration, and demographic information.

BIG-bench Machine Learning Management +1

Learning to Separate Clusters of Adversarial Representations for Robust Adversarial Detection

no code implementations7 Dec 2020 Byunggill Joe, Jihun Hamm, Sung Ju Hwang, Sooel Son, Insik Shin

Although deep neural networks have shown promising performances on various tasks, they are susceptible to incorrect predictions induced by imperceptibly small perturbations in inputs.

Learning to Disentangle Robust and Vulnerable Features for Adversarial Detection

no code implementations10 Sep 2019 Byunggill Joe, Sung Ju Hwang, Insik Shin

Yet, most of them cannot effectively defend against whitebox attacks where an adversary has a knowledge of the model and defense.

SynFuzz: Efficient Concolic Execution via Branch Condition Synthesis

no code implementations23 May 2019 Wookhyun Han, Md Lutfor Rahman, Yuxuan Chen, Chengyu Song, Byoungyoung Lee, Insik Shin

Then it uses oracle-guided program synthesis to reconstruct the symbolic expression based on input-output pairs.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.