Publications

International SCI(E) Journal

[62] Hyun Kwon, Jang-Woon Baek, "ChangeGuard: SiamNested U-Net Model Robust against Adversarial Perturbation". Multimedia Tools and Applications, 2024.4 (Accepted) (SCIE, Impact Factor: 3.6) 

[61] Hyun Kwon, Yongjae Lee, "Adv-SiamUnet: Generation Adversarial Perturbation for Change Detection Model". Multimedia Tools and Applications, 2024.3 (Accepted) (SCIE, Impact Factor: 3.6) 

[60] Jun Lee, Taewan Kim, Seungho Bang, Sehong Oh, Hyun Kwon∗,"Evasion Attacks on Deep Learning-Based Helicopter Recognition Systems". Journal of Sensors, 2024.02 (Accepted) (SCIE, Impact Factor 1.9)  ∗Corresponding Author

[59] Hyun Kwon,"Mitigating Adversarial Attacks with Adversarial Noise-Inclusive Autoencoders and Data Fusion", IEEE Access, 2024.02 (Accepted) (SCIE, Impact Factor: 3.9)

[58] Hyun Kwon, Jun Lee, "Detecting Textual Backdoor Attacks via Class Difference for Text Classification System". IEICE Transactions on Information and Systems (ISSN: 1745-1361), 2024.01 (Accepted) (SCIE, Impact Factor: 0.7)

[57] Hyun Kwon, Sanghyun Lee, "Defending Against Audio Adversarial Examples Through Two-Step Input Transformation". Multimedia Tools and Applications, 2023.12 (Accepted) (SCIE, Impact Factor: 3.6

[56] Hyun Kwon, "AudioGuard: Speech Recognition System Robust against Optimized Audio Adversarial Examples ". Multimedia Tools and Applications, 2023.12 (publish online) (SCIE, Impact Factor: 3.6

[55] Hyun Kwon, Sanghyun Lee,"Novel Rifle Number Recognition Based on Improved YOLO in Military Environment". CMC-Computers, Materials & Continua, 2023.07 (Accepted) (SCIE, Impact Factor: 3.860) 

[54] Jun Lee, Hanna Lee, SeongChan Lee, Hyun Kwon*, "Enhancing Identity Protection in Metaverse-based Psychological Counseling System". CMC-Computers, Materials & Continua, 2023.11 (Accepted) (SCIE, Impact Factor: 3.860)   * Corresponding Author

[53] Kyoungmin Ko, SungHwan Kim, Hyun Kwon*, "Multi-targeted Audio Adversarial Example for Use against Speech Recognition Systems", Computers & Security, 2023.02 (Accepted) (SCIE, Impact Factor 5.6) * Corresponding Author

[52] Hyun Kwon, Seung-Hun Nam, "Audio Adversarial Detection through Classification Score on Speech Recognition Systems ", Computers & Security, 2023.03 (SCIE, Impact Factor 5.6)

[51] Hyun Kwon, Sanghyun Lee,"Detecting Textual Adversarial Examples through Text Modification on Text Classification System". Applied Intelligence, 2023.02 (SCIE, Impact Factor 5.3)

[50] Hyun Kwon, SungHwan Kim,"Dual-Mode Method for Generating Adversarial Examples to Attack Deep Neural Networks", IEEE Access, 2023.01 (Accepted) (SCIE, Impact Factor: 3.9)

[49] Yongrae Kim, Hyunmin Gwak, Jaehoon Oh, Minho Kang, Jinkyu Kim, Hyun Kwon*, Sunghwan Kim, "CloudNet: A LiDAR-based Face Anti-Spoofing model that is robust against light variation", IEEE Access, 2023.01 (Accepted) (SCIE, Impact Factor: 3.9) * Co-Corresponding Author

[48] Jun Lee, Hyun Kwon∗, "Spatial Multi-Presence System to Increase Security Awareness on Remote Collaboration in Extended Reality Environment". Intelligent Automation & Soft Computing, 2023.01 (Accepted) (SCIE, Impact Factor: 3.401) ∗Corresponding Author 

[47] Jun Lee, Hyun Kwon∗, "Adaptive Consistent Management to Prevent System Collapse on Shared Object Manipulation in Mixed Reality". CMC-Computers, Materials & Continua, 2023.01 (SCIE, Impact Factor: 3.860) ∗Corresponding Author 

[46] Hyun Kwon, "Adversarial Image Perturbations with Distortions Weighted by Color on Deep Neural Networks". Multimedia Tools and Applications, 2022.10 (SCIE, Impact Factor: 3.6)

[45] Hyun Kwon, Sanghyun Lee, "Friend-Guard Adversarial Noise Designed for Electroencephalogram-Based Brain--Computer Interface Spellers". Neurocomputing, 2022.09 (SCIE, Impact Factor 6.0)

[44] Hyun Kwon, Kangjun Lee, Junyeol Ryu, Jun Lee, "Audio Adversarial Example Detection Using the Audio Style Transfer Learning Method". IEEE Access, 2022.09 (Accepted) (SCIE, Impact Factor: 3.9)

[43] Hyun Kwon, Changhyun Cho, Jun Lee, "Priority Evasion Attack: An adversarial example that considers the priority of attack on each classifier". IEICE Transactions on Information and Systems (ISSN: 1745-1361), 2022.07 (Accepted) (SCIE, Impact Factor: 0.7)

[42] Hyun Kwon, Sunghwan Cho, "Multi-targeted Poisoning Attack in Deep Neural Networks". IEICE Transactions on Information and Systems (ISSN: 1745-1361), 2022.07 (Accepted) (SCIE, Impact Factor: 0.7)

[41] Hyun Kwon, Sanghyun Lee, "Ensemble Transfer Attack Targeting Text Classification Systems". Computers & Security, 2022.06 (SCIE, Impact Factor 5.6)

[40] Hyun Kwon, Yongchul Kim, "Toward Selective Membership Inference Attack Against Deep Learning Model". IEICE Transactions on Information and Systems (ISSN: 1745-1361), 2022.06 (Accepted) (SCIE, Impact Factor: 0.7)

[39] Hyun Kwon et al, "Silent-Hidden-Voice Attack on Speech Recognition System". IEEE Access, 2022.05 (Accepted) (SCIE, Impact Factor: 3.9)

[38] Hyun Kwon, SungHwan Kim, "Restricted-Area Adversarial Example Attack for Image Captioning Model". Wireless Communications and Mobile Computing, 2022. 05 (Accepted) (SCIE, 2021 Impact Factor 2.336)

[37] SeoungGeun Kim, HaeJoon Moon, JaeHoon Oh, YongHak Lee, Hyun Kwon∗, SungHwan Kim, "Automatic Size Measurement of Garments Using Computer Vision Deep Learning Models and Point Cloud Data". Applied Sciences, 2022. 5 (SCIE, Impact Factor: 2.679) ∗Co-Corresponding Author

[36] Hyun Kwon, Sanghyun Lee, "Toward Backdoor Attacks for Image Captioning Model in Deep Neural Networks". Security and Communication Networks, 2022.04 (Accepted) (SCIE, 2021 Impact Factor 1.288)

[35] Hyun Kwon, Jongwook Jeong, "AdvU-Net: Generating Adversarial Example Based on Medical Image and Targeting U-Net Model". Journal of Sensors, 2022.03 (Accpeted) (SCIE, 2021 Impact Factor 2.137)

[34] Hyun Kwon, Sanghyun Lee, "Textual Adversarial Training of Machine Learning Model for Resistance to Adversarial Examples". Security and Communication Networks, 2022.02 (Accepted) (SCIE, 2021 Impact Factor 1.288)

[33] Minsoo Lee, Hyun Kwon∗, Hyunsoo Yoon, "Compliance-driven Cybersecurity Based on Formalized Attack Pattern For the I&C System of Nuclear Power Plants". Security and Communication Networks, 2022.01 (SCIE, 2021 Impact Factor 1.288) ∗Corresponding Author

[32] Hyun Kwon, "Multi-Model Selective Backdoor Attack with Different Trigger Position". IEICE Transactions on Information and Systems (ISSN: 1745-1361), 2022.01 (SCIE, Impact Factor: 0.7)

[31] Hyun Kwon, Yongchul Kim, "BlindNet Backdoor: Attack on deep neural network using blind watermark". Multimedia Tools and Applications, 2022.01 (SCIE, Impact Factor: 3.6)

[30] Hyun Kwon, "Toward Selective Adversarial Attack for Gait Recognition System Based on Deep Neural Network". IEICE Transactions on Information and Systems (ISSN: 1745-1361), 2021.11 (Accepted) (SCIE, Impact Factor: 0.7)

[29] Hyun Kwon, Jang-Woon Baek, "Adv-Plate Attack: Adversarially Perturbed Plate for License Plate Recognition System". Journal of Sensors, 2021.11 (SCIE, Impact Factor 1.9)

[28] Hyun Kwon,"Dual-Targeted Textfooler Attack on Text Classification Systems", IEEE Access, 2021.10 (Accepted) (SCIE, Impact Factor: 3.9)

[27] Hyun Kwon, Sanghyun Lee, "Textual Backdoor Attack for Text Classification System ". Security and Communication Networks, 2021.09 (Accepted) (SCIE, 2020 Impact Factor 1.288)

[26] Kyoungmin Ko, Hyunmin Gwak, Nalinh Thoummala, Hyun Kwon∗, SungHwan Kim∗,"SqueezeFace: Integrative Face Recognition Methods with LiDAR Sensors". Journal of Sensors, 2021.08 (Accepted) (SCIE, Impact Factor 1.9)
∗Co-Corresponding Author

[25] Hyun Kwon, Kyoungmin Ko, Sunghwan Kim "Optimized Adversarial Example with Classification Score Pattern Vulnerability Removed". IEEE Access, 2021.08 (Accepted) (SCIE, Impact Factor: 3.9)

[24] Hyun Kwon, "Medical Guard: Robust U-Net model against Adversarially Perturbed Image". Security and Communication Networks, 2021.06 (Accepted) (SCIE, Impact Factor: 1.288)

[23] Hyun Kwon, "Defending Deep Neural Networks against Backdoor Attack by Using De-trigger Autoencoder". IEEE Access, 2021.06 (Accepted) (SCIE, Impact Factor: 3.9)

[22] Hyun Kwon, "Friend-Guard Textfooler Attack on Text Classification System". IEEE Access, 2021.05 (Accepted) (SCIE, Impact Factor: 3.9)

[21] Hyun Kwon, Hyunsoo Yoon, Daeseon Choi, "Data Correction for Improving Recognition Accuracy by Unknown Deep Neural Network Classifiers". KSII Transactions on Internet and Information Systems, 2021.04 (Accepted) (SCIE, Impact Factor: 1.5)

[20] Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, and Daeseon Choi, "Classification Score Approach for Detecting Adversarial Example in Deep Neural Network". Multimedia Tools and Applications, 2021.03 (SCIE, Impact Factor: 3.6)

[19] Hyun Kwon, Jun Lee, "Diversity Adversarial Training Against Adversarial Attack on Deep Neural Networks". Symmetry, 2021.03 (SCIE, Impact Factor: 2.645)

[18] Hyun Kwon, Hyunsoo Yoon, and Ki-Woong Park, "Acoustic-Decoy: Detection of Adversarial Examples through Audio Modification on Speech Recognition System". Neurocomputing, 2020.12 (SCIE, Impact Factor: 6.0)

[17] Hyun Kwon, Jun Lee, "AdvGuard: Fortifying Deep Neural Networks against Optimized Adversarial Example Attack". IEEE Access, 2020.12 (SCIE, Impact Factor: 3.9)

[16] Hyun Kwon, "Detecting Backdoor Attacks via Classification Difference in Deep Neural Networks". IEEE Access, 2020.10 (SCIE, Impact Factor: 3.9)

[15] Hyun Kwon, Hyunsoo Yoon, and Ki-Woong Park, "Multi-targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks". IEICE Transactions on Information and Systems (ISSN: 1745-1361), 2020.04 (SCIE, Impact Factor: 0.7)

[14] Hyun Kwon, Hyunsoo Yoon, and Ki-Woong Park, "Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods". IEICE Transactions on Information and Systems (ISSN: 1745- 1361), 2020.04 (SCIE, Impact Factor: 0.7)

[13] Hyun Kwon, Hyunsoo Yoon, and Ki-Woong Park, "CAPTCHA Image Generation: Two-Step Style Transfer Learning in Deep Neural Networks". Sensors, 2020.03 (SCIE, Impact Factor: 3.275)

[12] Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, and Daeseon Choi, "Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System", IEEE Transactions on Information Forensics & Security, 2019.06 (SCI, Impact Factor: 7.178)

[11] Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, and Daeseon Choi, "Selective Untargeted Evasion Attack: An adversarial example that will not be classified as certain avoided classes", IEEE Access, 2019.06 (SCIE, Impact Factor: 3.9)

[10] Hyun Kwon, Hyunsoo Yoon, and Daeseon Choi,"Restricted Evasion Attack: Generation of Restricted Area Adversarial Example", IEEE Access, 2019.05 (SCIE, Impact Factor: 3.9)

[9] Hyun Kwon, Hyunsoo Yoon, and Ki-Woong Park, "Selective Poisoning Attack on Deep Neural Network", Symmetry, 2019.07 (SCIE, Impact Factor: 2.645)

[8] Ohmin Kwon, Hyun Kwon, and Hyunsoo Yoon, "Rootkit inside GPU Kernel Execution". IEICE Transactions on Information and Systems (ISSN: 1745-1361), 2019.08 (SCIE, Impact Factor: 0.7)

[7] Yongjun Lee, Hyun Kwon, Sang-Hoon Choi, Seung-Ho Lim, Sung Hoon Baek, Ki-Woong Park , "Instruction2vec: Efficient Preprocessor of Assembly Code to Detect Software Weakness with CNN ". Applied Sciences 9.9 (2019): 2019. 09 (SCIE, Impact Factor: 2.679)

[6] Hyun Kwon, Yongchul Kim, Ki-Woong Park, Hyunsoo Yoon, and Daeseon Choi, "Friend-safe Evasion Attack: an adversarial example that is correctly recognized by a friendly classifier". COMPUTERS & SECURITY, 2018.08 (SCIE, Impact Factor: 5.6)

[5] Hyun Kwon, Yongchul Kim, Ki-Woong Park, Hyunsoo Yoon, and Daeseon Choi, "Multi-targeted Adversarial Example in Evasion Attack on Deep Neural Network", IEEE Access, 2018.08 (SCIE, Impact Factor: 3.9)

[4] Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, and Daeseon Choi, "Random Untargeted Adversarial Example on Deep Neural Network", Symmetry, 2018.12 (SCIE, Impact Factor: 2.645)

[3] Hyun Kwon, Yongchul Kim, Ki-Woong Park, Hyunsoo Yoon, and Daeseon Choi, "Advanced Ensemble Adversarial Example on Unknown Deep Neural Network Classifiers", IEICE Transactions on Information and Systems (ISSN: 1745-1361), 2018.07 (SCIE, Impact Factor: 0.7)

[2] Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, and Daeseon Choi, "CAPTCHA Image Generation Systems Using Generative Adversarial Networks". IEICE Transactions on Information and Systems (ISSN: 1745-1361), 2018.02 (SCIE, Impact Factor: 0.7)

[1] Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, and Daeseon Choi, "Optimal Cluster Expansion-Based Intrusion Tolerant System to Prevent Denial of Service Attacks". Applied Sciences 7.11 (2017): 1186, 2017. 11 (SCIE, Impact Factor: 2.679)


International Conference

[16] Jun Lee, Hanna Lee, Seongchan Lee and Hyun Kwon*, “A Diagnosis System to Find Map Escape Bugs in Metaverse System using Reinforcement Learning”, 7th International Symposium on Mobile Internet Security (Mobisec 2023), 2023.12 ∗Corresponding Author

[15] Jun Lee, Hanna Lee, Seongchan Lee and Hyun Kwon*, “POSTER: Metaverse‐based Counseling System to Protect the Identity of Clients”, 6th International Symposium on Mobile Internet Security (Mobisec 2022), 2022.12 ∗Corresponding Author

[14] Jun Lee, Hyun Kwon*, "Poster: XR-based Spatial Multi-Presence System for Remote Collaboration", The 23th International Workshop on Information Security Applications (WISA 2022), 2022. 08. ∗Corresponding Author

[13] Jun Lee, Hyun Kwon*, "Poster: Consistent Management Method on Shared Object Manipulation in Mixed Reality", The 23th International Workshop on Information Security Applications (WISA 2022), 2022. 08. ∗Corresponding Author

[12] Hyun Kwon, Hyunsoo Yoon, and Ki-Woong Park, "FriendNet Backdoor: Indentifying Backdoor Attack that is safe for Friendly Deep Neural Network", Proceedings of the 3rd International Conference on Software Engineering and Information Management (ICSIM 2020). ACM, 2020. 01.

[11] Hyun Kwon, Jungmin Roh, Hyunsoo Yoon, and Ki-Woong Park, "TargetNet Backdoor: Attack on Deep Neural Network with Use of Different Triggers", 2020 5th International Conference on Intelligent Information Technology (ICIIT 2020). ACM, 2020. 02.

[10] Hyun Kwon, Hyunsoo Yoon, and Ki-Woong Park, "POSTER: Detecting Audio Adversarial Example through Audio Modification", 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS 2019), 2019. 11.

[9] Hyun Kwon, Hyunsoo Yoon, and Ki-Woong Park, "Selective Poisoning Attack on Deep Neural Network to Induce Fine Grained Recognition Error", 2019 IEEE International Conference on Artificial Intelligence and Knowledge Engineering (IEEE AIKE), Italy, 2019.06.

[8] Hyun Kwon, Hyunsoo Yoon, and Ki-Woong Park, "CAPTCHA Image Generation using Sytle Transfer Learning in Deep Neural Network", The 20th International Workshop on Information Security Applications (WISA 2019), 2019. 08.

[7] Hyun Kwon, Hyunsoo Yoon, and Daeseon Choi,"Priority Adversarial Example in Evasion Attack on Multiple Deep Neural Networks",International Conference on Artificial Intelligence in Information and Communication (ICAIIC 2019), 2019.02.

[6] Hyun Kwon, Hyunsoo Yoon, and Ki-Woong Park, "AvoidNet Backdoor: Misclassification with Certain Avoided Classes on Deep Neural Network", The 5th International Conference on Next Generation Computing (ICNGC 2019), 2019. 12.

[5] Hyun Kwon, Ohmin Kwon, Hyunsoo Yoon, and Ki-Woong Park„ "Face Friend-Safe Adversarial Example on Face Recognition System", 2019 International Conference on Ubiquitous and Future Net- works (ICUFN), Croatia, 2019.07.

[4] Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, and Daeseon Choi, "Fooling a Neural Network in Military Environments: Random Untargeted Adversarial Example", Military Communications Conference 2018 (MILCOM 2018), 2018. 10.

[3] Hyun Kwon, Hyunsoo Yoon, and Daeseon Choi, "POSTER: Zero-Day Evasion Attack Analysis on Race between Attack and Defense", The 13th ACM on Asia Conference on Computer and Communications Security (ASIA CCS ’18), 2018.06.

[2] Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, and Daeseon Choi. "One-Pixel Adversarial Example that is Safe for Friendly Deep Neural Networks", The 19th International Workshop on Information Security Applications (WISA 2018), 2018. 08.

[1] Hyun Kwon, Hyunsoo Yoon, and Daeseon Choi, "Friend-safe Adversarial Examples in an Evasion Attack on a Deep Neural Network". 20th Annual International Conference on Information Security and Cryptology (ICISC 2017), 2017. 11.


Domestic (Korean) Journal:

[18] 오세홍, 김주안, 육태경, 박주현, 권현. "전장소음에 강건한 음성인식 모델 연구". 정보통신학회논문지, 2024. 6. (Index: KCI) (Index: KCI) 

[17] 최승무, 권현. "열화상 이미지 노이즈 제거를 통한 지능 철책 감시 시스템 분석". 융합보안논문지, 2025. 3. (Index: KCI) ∗ corresponding author

[16] 홍지원, 권현. "전이학습을 통한 북한 미사일 분류 시스템". 융합보안논문지, 2024. 9. (Index: KCI) ∗ corresponding author

[15] 김영훈, 권현. "국방 분야에서 전장 소음 환경 하에 음성 인식 기술 연구". 융합보안논문지, 2024. 6. (Index: KCI) ∗ corresponding author

[14] 김영훈, 권현. "국방 분야에서 일부 노출된 물체 인식 향상에 대한 연구". 융합보안논문지, 2024. 3. (Index: KCI) ∗ corresponding author

[13] HyeonMin Kwak, YongHo Jeong, ChanYeong Kim, HeeJae Kwon, Hyun Kwon, SungHwan Kim. "Ensemble Teacher: Semi-Supervised Semantic Segmentation with Teacher’s Cross-Pseudo Supervi- sion". Quantitative Bio-Science, 2023. 12. (Index: KCI)

[12] 권현, 김용기, 이준. "학습 데이터가 없는 모델 탈취 방법에 대한 분석". 융합보안논문지, 2023. 12. (Index: KCI)

[11] 권현, 이준. "딥러닝 기반의 딥 클러스터링 방법에 대한 분석". 융합보안논문지, 2023. 10. (Index: KCI)

[10] 권현, 윤준혁, 김준섭, 박상준, 김용철 "딥뉴럴네트워크의 적대적 샘플에 관한 앙상블 방어 연구". 융합보안논문지, 2021. 06. (Index: KCI)

[9] 권현, 박상준, 김용철 "뉴럴네트워크 기반에 악성 URL 탐지방법 설계". 융합정보논문지, 2021. 04. (Index: KCI)

[8] 권현, 김용철 "딥러닝 모델에 대한 적대적 사례 기술 동향". 정보과학회지, 2021. 04.

[7] 이상현, 윤현수, 권현∗, "딥뉴럴네트워크 기반의 흡연 탐지기법 설계". 융합보안논문지, 2021. 03. (Index: KCI) ∗ corresponding author

[6] 방승호, 권현, "인공지능기반 지상 로봇무인체계 발전방향 제안". 국방과 기술, 2020. 10.

[5] 권현, 박상준, 김용철, "딥뉴럴네트워크 상에 신속한 오인식 샘플 생성 공격". 융합보안논문지, 2020. 06. (Index: KCI)

[4] 권현, 방승호, 박기웅, "딥뉴럴네트워크 기반의 네트워크 침입탐지시스템 설계". 한국차세대컴퓨팅학회 논문지, 2020. 02. (Index: KCI)

[3] 권현,방승호,"인공지능(AI)과 정보보호 측면에서의 군 도입 시 고려사항 측면에서의 군 도입시 고려사항".국방과기술(486),2019.08.  

[2] 권현, 윤현수, 최대선, "Evasion attack에 대한 인공지능 보안이슈". 정보과학회지 36(2), 2018. 02.

[1] 권현, 이용재, 윤현수, "서비스 보안 수준을 고려한 서버 클러스터링 기반 침입감내시스템 설계". 한국군사학논집 72(2), 2016. 06. (Index: KCI)


PATENT Domestic Patent

[2] Hyun Kwon and Daeseon Choi, "Apparatus For Generating Adversarial Example In Deep Learning Environment and Method The of Computer Program", Certificate of Patent (10-2149132), 2020.

[1] Hyunsoo Yoon, Hyun Kwon, and Yongjae Lee,"Intrusion Tolerant System and Method in Virtualized Environment", Certificate of Patent (10-1717697), 2017.


Book

[2] 권현, 석호식, 김정수, 오세홍, 박주현, "데이터, 모델, 학습이론으로 배우는 머신러닝 이론과 실습", 한빛아카데미, 2024.

[1] 최영윤, 이원우, 임원택, 김용철, 심우진, 조성환, 강태호, 권현, 권경빈, "군전자통신", 황금알, 2016.