Follow
Naufal Suryanto
Title
Cited by
Cited by
Year
DTA: Physical camouflage attacks using differentiable transformation network
N Suryanto, Y Kim, H Kang, HT Larasati, Y Yun, TTH Le, H Yang, SY Oh, ...
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
432022
Active: Towards highly transferable 3d physical camouflage for universal and robust vehicle evasion
N Suryanto, Y Kim, HT Larasati, H Kang, TTH Le, Y Hong, H Yang, SY Oh, ...
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023
62023
A distributed black-box adversarial attack based on multi-group particle swarm optimization
N Suryanto, H Kang, Y Kim, Y Yun, HT Larasati, H Kim
Sensors 20 (24), 7158, 2020
62020
NFT image plagiarism check using EfficientNet-based deep neural network with triplet semi-hard loss
AT Prihatno, N Suryanto, S Oh, TTH Le, H Kim
Applied Sciences 13 (5), 3072, 2023
52023
Extended spatially localized perturbation gan (Eslp-gan) for robust adversarial camouflage patches
Y Kim, H Kang, N Suryanto, HT Larasati, A Mukaroh, H Kim
Sensors 21 (16), 5323, 2021
42021
Multi-group particle swarm optimization with random redistribution
N Suryanto, C Ikuta, D Pramadihanto
2017 International Electronics Symposium on Knowledge Creation and …, 2017
42017
Spatially Localized Perturbation GAN (SLP-GAN) for Generating Invisible Adversarial Patches
Y Kim, H Kang, A Mukaroh, N Suryanto, HT Larasati, H Kim.
The 21st World Conference on Information Security Applications, 2020
32020
Enhancing Intrusion Detection and Explanations for Imbalanced Vehicle CAN Network Data
TTH Le, N Suryanto, H Kim, J Ji, S Heo
Proceedings of the 12th International Symposium on Information and …, 2023
12023
A New Frontier in Digital Security: Verification for NFT Image Using Deep Learning-Based ConvNeXt Model in Quantum Blockchain
AT Prihatno, N Suryanto, HT Larasati, YE Oktian, TTH Le, H Kim
International Conference on Information Security Applications, 79-90, 2023
2023
Trend of Paradigm for integrating Blockchain, Artificial Intelligence, Quantum Computing, and Internet of Things
RW Wardhani, DSC Putranto, YE Oktian, AT Prihatno, N Suryanto
스마트미디어저널 12 (2), 42-55, 2023
2023
Together We Can Fool Them: A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization
N Suryanto, H Kang, Y Kim, Y Yun, HT Larasati, H Kim
Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security …, 2020
2020
IoT DNS를 활용한 이종 IoT 플랫폼 식별체계 상호연동 및 보안
김현곤, 이스마일, 수랸토 나우팔김호원
한국정보보호학회 하계학술대회, 2019
2019
A Study on Federated Access Control in Interoperability of Heterogeneous IoT Platforms
K Hyeongon, N Suryanto, HS Wook, KH Won
한국통신학회 학술대회논문집, 140-141, 2019
2019
OCF Gateway Implementation for IoT Platforms Interoperability
N Suryanto, Ismail, HT Larasati, S Heo, H Kim
2019 정보보호학술논문발표회, 2019
2019
Design and Implementation of ROS Based Software Framework on Humanoid Robot Soccer
N Suryanto
EEPIS Thesis Book, 2017
2017
T-FLoW TEAM
D Pramadihanto, EH Binugroho, AS Khalilullah, D Pristovani, A Al-Farouq, ...
RoboCup Humanoid, 2017
2017
Software Framework on EROS-6 (EEPIS ROBOT SOCCER-6) Platform
N Suryanto, FN Wahyu, AS Khailullah
4th Indonesian Symposium on Robot Soccer Competition (ISRSC), 2016
2016
EROS TEAM
AS Khalilullah, I Kurniato W, D Pristovani, PA Nugroho, S Zuhri, ...
RoboCup Humanoid, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–18