Search

Your search keyword '"Kim, Taesoo"' showing total 1,418 results

Search Constraints

Start Over You searched for: Author "Kim, Taesoo" Remove constraint Author: "Kim, Taesoo"
1,418 results on '"Kim, Taesoo"'

Search Results

1. I Experienced More than 10 DeFi Scams: On DeFi Users' Perception of Security Breaches and Countermeasures

2. TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution

5. Prime+Retouch: When Cache is Locked and Leaked

6. HetTree: Heterogeneous Tree Graph Neural Network

7. RainSD: Rain Style Diversification Module for Image Synthesis Enhancement using Feature-Level Style Distribution

9. Selective Generation for Controllable Language Models

10. Understanding Contrastive Learning Through the Lens of Margins

11. Plasma proteomics of acute tubular injury

12. Enhancing Breast Cancer Risk Prediction by Incorporating Prior Images

13. autofz: Automated Fuzzer Composition at Runtime

14. ACon$^2$: Adaptive Conformal Consensus for Provable Blockchain Oracles

15. Unsafe's Betrayal: Abusing Unsafe Rust in Binary Reverse Engineering via Machine Learning

16. OOOE: Only-One-Object-Exists Assumption to Find Very Small Objects in Chest Radiographs

19. Mitigating Low-volume DoS Attacks with Data-driven Resource Accounting

22. Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild

25. SOK: On the Analysis of Web Browser Security

26. In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication

32. Semantic-aware Binary Code Representation with BERT

43. EVI1 activates tumor-promoting transcriptional enhancers in pancreatic cancer

45. P2FAAS: Toward Privacy-Preserving Fuzzing as a Service

46. RECIPE : Converting Concurrent DRAM Indexes to Persistent-Memory Indexes

47. SplitFS: Reducing Software Overhead in File Systems for Persistent Memory

48. Automatic Techniques to Systematically Discover New Heap Exploitation Primitives

Catalog

Books, media, physical & digital resources