DTA: Physical camouflage attacks using differentiable transformation network N Suryanto, Y Kim, H Kang, HT Larasati, Y Yun, TTH Le, H Yang, SY Oh, ... Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022 | 43 | 2022 |
Active: Towards highly transferable 3d physical camouflage for universal and robust vehicle evasion N Suryanto, Y Kim, HT Larasati, H Kang, TTH Le, Y Hong, H Yang, SY Oh, ... Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023 | 6 | 2023 |
A distributed black-box adversarial attack based on multi-group particle swarm optimization N Suryanto, H Kang, Y Kim, Y Yun, HT Larasati, H Kim Sensors 20 (24), 7158, 2020 | 6 | 2020 |
NFT image plagiarism check using EfficientNet-based deep neural network with triplet semi-hard loss AT Prihatno, N Suryanto, S Oh, TTH Le, H Kim Applied Sciences 13 (5), 3072, 2023 | 5 | 2023 |
Extended spatially localized perturbation gan (Eslp-gan) for robust adversarial camouflage patches Y Kim, H Kang, N Suryanto, HT Larasati, A Mukaroh, H Kim Sensors 21 (16), 5323, 2021 | 4 | 2021 |
Multi-group particle swarm optimization with random redistribution N Suryanto, C Ikuta, D Pramadihanto 2017 International Electronics Symposium on Knowledge Creation and …, 2017 | 4 | 2017 |
Spatially Localized Perturbation GAN (SLP-GAN) for Generating Invisible Adversarial Patches Y Kim, H Kang, A Mukaroh, N Suryanto, HT Larasati, H Kim. The 21st World Conference on Information Security Applications, 2020 | 3 | 2020 |
Enhancing Intrusion Detection and Explanations for Imbalanced Vehicle CAN Network Data TTH Le, N Suryanto, H Kim, J Ji, S Heo Proceedings of the 12th International Symposium on Information and …, 2023 | 1 | 2023 |
A New Frontier in Digital Security: Verification for NFT Image Using Deep Learning-Based ConvNeXt Model in Quantum Blockchain AT Prihatno, N Suryanto, HT Larasati, YE Oktian, TTH Le, H Kim International Conference on Information Security Applications, 79-90, 2023 | | 2023 |
Trend of Paradigm for integrating Blockchain, Artificial Intelligence, Quantum Computing, and Internet of Things RW Wardhani, DSC Putranto, YE Oktian, AT Prihatno, N Suryanto 스마트미디어저널 12 (2), 42-55, 2023 | | 2023 |
Together We Can Fool Them: A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization N Suryanto, H Kang, Y Kim, Y Yun, HT Larasati, H Kim Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security …, 2020 | | 2020 |
IoT DNS를 활용한 이종 IoT 플랫폼 식별체계 상호연동 및 보안 김현곤, 이스마일, 수랸토 나우팔김호원 한국정보보호학회 하계학술대회, 2019 | | 2019 |
A Study on Federated Access Control in Interoperability of Heterogeneous IoT Platforms K Hyeongon, N Suryanto, HS Wook, KH Won 한국통신학회 학술대회논문집, 140-141, 2019 | | 2019 |
OCF Gateway Implementation for IoT Platforms Interoperability N Suryanto, Ismail, HT Larasati, S Heo, H Kim 2019 정보보호학술논문발표회, 2019 | | 2019 |
Design and Implementation of ROS Based Software Framework on Humanoid Robot Soccer N Suryanto EEPIS Thesis Book, 2017 | | 2017 |
T-FLoW TEAM D Pramadihanto, EH Binugroho, AS Khalilullah, D Pristovani, A Al-Farouq, ... RoboCup Humanoid, 2017 | | 2017 |
Software Framework on EROS-6 (EEPIS ROBOT SOCCER-6) Platform N Suryanto, FN Wahyu, AS Khailullah 4th Indonesian Symposium on Robot Soccer Competition (ISRSC), 2016 | | 2016 |
EROS TEAM AS Khalilullah, I Kurniato W, D Pristovani, PA Nugroho, S Zuhri, ... RoboCup Humanoid, 2015 | | 2015 |