Seguir
Sanghyun Hong
Sanghyun Hong
Assistant Professor, Oregon State University
Dirección de correo verificada de oregonstate.edu - Página principal
Título
Citado por
Citado por
Año
Shallow-deep networks: Understanding and mitigating network overthinking
Y Kaya, S Hong, T Dumitras
International conference on machine learning, 3301-3310, 2019
3182019
Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks
S Hong, P Frigo, Y Kaya, C Giuffrida, T Dumitraş
28th USENIX Security Symposium (USENIX Security 19). Santa Clara, CA: USENIX …, 2019
2352019
On the effectiveness of mitigating data poisoning attacks with gradient shaping
S Hong, V Chandrasekaran, Y Kaya, T Dumitraş, N Papernot
arXiv preprint arXiv:2002.11497, 2020
1432020
Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets
F Tramèr, R Shokri, AS Joaquin, H Le, M Jagielski, S Hong, N Carlini
ACM Conference on Computer and Communications Security (CCS), 2022
1162022
Security analysis of deep neural networks operating in the presence of cache side-channel attacks
S Hong, M Davinroy, Y Kaya, SN Locke, I Rackow, K Kulda, ...
arXiv preprint arXiv:1810.03487, 2018
962018
Handcrafted backdoors in deep neural networks
S Hong, N Carlini, A Kurakin
Advances in Neural Information Processing Systems 35, 8068-8080, 2022
732022
A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Inference
S Hong, Y Kaya, IV Modoranu, T Dumitraş
9th International Conference on Learning Representations (ICLR 2021)., 2021
642021
Data Poisoning Won't Save You From Facial Recognition
E Radiya-Dixit, S Hong, N Carlini, F Tramèr
10th International Conference on Learning Representations (ICLR 2022)., 2022
572022
Go serverless: Securing cloud via serverless design patterns
S Hong, A Srivastava, W Shambrook, T Dumitraș
10th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 18), 2018
502018
How to 0wn NAS in Your Spare Time
S Hong, M Davinroy, Y Kaya, D Dachman-Soled, T Dumitraş
8th International Conference on Learning Representations (ICLR 2020)., 2020
402020
On the effectiveness of regularization against membership inference attacks
Y Kaya, S Hong, T Dumitras
arXiv preprint arXiv:2006.05336, 2020
352020
Summoning demons: The pursuit of exploitable bugs in machine learning
R Stevens, O Suciu, A Ruef, S Hong, M Hicks, T Dumitraş
arXiv preprint arXiv:1701.04739, 2017
222017
Improving Cross-platform Binary Analysis Using Representation Learning via Graph Alignment
G Kim, S Hong, M Franz, D Song
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
202022
Qu-anti-zation: Exploiting quantization artifacts for achieving adversarial outcomes
S Hong, MA Panaitescu-Liess, Y Kaya, T Dumitras
Advances in Neural Information Processing Systems 34, 9303-9316, 2021
192021
A scanner deeply: Predicting gaze heatmaps on visualizations using crowdsourced eye movement data
S Shin, S Chung, S Hong, N Elmqvist
IEEE Transactions on Visualization and Computer Graphics 29 (1), 396-406, 2022
112022
Certified malware in south korea: A localized study of breaches of trust in code-signing PKI ecosystem
B Kwon, S Hong, Y Jeon, D Kim
Information and Communications Security: 23rd International Conference …, 2021
112021
Parameterized physics-informed neural networks for parameterized PDEs
W Cho, M Jo, H Lim, K Lee, D Lee, S Hong, N Park
arXiv preprint arXiv:2408.09446, 2024
92024
Privacy backdoors: Enhancing membership inference through poisoning pre-trained models
Y Wen, L Marchyok, S Hong, J Geiping, T Goldstein, N Carlini
arXiv preprint arXiv:2404.01231, 2024
92024
Page: Answering graph pattern queries via knowledge graph embedding
S Hong, N Park, T Chakraborty, H Kang, S Kwon
International Conference on Big Data, 87-99, 2018
92018
SENA: preserving social structure for network embedding
S Hong, T Chakraborty, S Ahn, G Husari, N Park
Proceedings of the 28th ACM Conference on hypertext and social media, 235-244, 2017
72017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20