Skip to main content

Showing 1–12 of 12 results for author: Jun, S

  1. arXiv:2406.00810  [pdf, other

    cs.CR

    Expanding the Attack Scenarios of SAE J1939: A Comprehensive Analysis of Established and Novel Vulnerabilities in Transport Protocol

    Authors: Hwejae Lee, Hyosun Lee, Saehee Jun, Huy Kang Kim

    Abstract: Following the enactment of the UN Regulation, substantial efforts have been directed toward implementing intrusion detection and prevention systems (IDPSs) and vulnerability analysis in Controller Area Network (CAN). However, Society of Automotive Engineers (SAE) J1939 protocol, despite its extensive application in camping cars and commercial vehicles, has seen limited vulnerability identification… ▽ More

    Submitted 2 June, 2024; originally announced June 2024.

    Comments: 18 pages, 7 figures, 5 tables; This is the accepted version of ESCAR USA 2024

    MSC Class: 68M25 ACM Class: K.6.5

  2. arXiv:2403.02870  [pdf, other

    cs.AI cs.CR cs.LG

    Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint Devices

    Authors: Younghan Lee, Sohee Jun, Yungi Cho, Woorim Han, Hyungon Moon, Yunheung Paek

    Abstract: With growing popularity, deep learning (DL) models are becoming larger-scale, and only the companies with vast training datasets and immense computing power can manage their business serving such large models. Most of those DL models are proprietary to the companies who thus strive to keep their private models safe from the model extraction attack (MEA), whose aim is to steal the model by training… ▽ More

    Submitted 5 March, 2024; originally announced March 2024.

    Comments: Accepted by 27th European Symposium on Research in Computer Security (ESORICS 2022)

  3. arXiv:2305.08824  [pdf, other

    cs.CV

    Five A$^{+}$ Network: You Only Need 9K Parameters for Underwater Image Enhancement

    Authors: Jingxia Jiang, Tian Ye, Jinbin Bai, Sixiang Chen, Wenhao Chai, Shi Jun, Yun Liu, Erkang Chen

    Abstract: A lightweight underwater image enhancement network is of great significance for resource-constrained platforms, but balancing model size, computational efficiency, and enhancement performance has proven difficult for previous approaches. In this work, we propose the Five A$^{+}$ Network (FA$^{+}$Net), a highly efficient and lightweight real-time underwater image enhancement network with only… ▽ More

    Submitted 15 May, 2023; originally announced May 2023.

  4. arXiv:2205.14048  [pdf, ps, other

    stat.ME cs.LG econ.EM stat.ML

    Average Adjusted Association: Efficient Estimation with High Dimensional Confounders

    Authors: Sung Jae Jun, Sokbae Lee

    Abstract: The log odds ratio is a well-established metric for evaluating the association between binary outcome and exposure variables. Despite its widespread use, there has been limited discussion on how to summarize the log odds ratio as a function of confounders through averaging. To address this issue, we propose the Average Adjusted Association (AAA), which is a summary measure of association in a hete… ▽ More

    Submitted 2 April, 2023; v1 submitted 27 May, 2022; originally announced May 2022.

    Comments: 35 pages, 3 tables

  5. arXiv:2104.12559  [pdf

    cs.CY cs.SI

    Whether the Health Care Practices For the Patients With Comorbidities Have Changed After the Outbreak of COVID-19; Big Data Public Sentiment Analysis

    Authors: Bilal Ahmad, Sun Jun

    Abstract: After the pandemic of SARS-CoV-2, it has influenced the health care practices around the world. Initial investigations indicate that patients with comorbidities are more fragile to this SARS-CoV-2 infection. They suggested postponing the routine treatment of cancer patients. However, few meta-analyses suggested evidences are not sufficient to hold the claim of the frailty of cancer patients to COV… ▽ More

    Submitted 20 April, 2021; originally announced April 2021.

  6. arXiv:2007.06634  [pdf

    cs.CV cs.LG stat.ML

    Deep Doubly Supervised Transfer Network for Diagnosis of Breast Cancer with Imbalanced Ultrasound Imaging Modalities

    Authors: Han Xiangmin, Wang Jun, Zhou Weijun, Chang Cai, Ying Shihui, Shi Jun

    Abstract: Elastography ultrasound (EUS) provides additional bio-mechanical in-formation about lesion for B-mode ultrasound (BUS) in the diagnosis of breast cancers. However, joint utilization of both BUS and EUS is not popular due to the lack of EUS devices in rural hospitals, which arouses a novel modality im-balance problem in computer-aided diagnosis (CAD) for breast cancers. Current transfer learning (T… ▽ More

    Submitted 29 June, 2020; originally announced July 2020.

    Comments: Accepted by MICCAI 2020

  7. arXiv:1911.05808  [pdf, other

    cs.CR

    Systematic Classification of Attackers via Bounded Model Checking

    Authors: Eric Rothstein-Morris, Sun Jun, Sudipta Chattopadhyay

    Abstract: In this work, we study the problem of verification of systems in the presence of attackers using bounded model checking. Given a system and a set of security requirements, we present a methodology to generate and classify attackers, mapping them to the set of requirements that they can break. A naive approach suffers from the same shortcomings of any large model checking problem, i.e., memory shor… ▽ More

    Submitted 13 November, 2019; originally announced November 2019.

    Comments: 23 pages

    Journal ref: VMCAI 2020 - 21st International Conference on Verification, Model Checking, and Abstract Interpretation

  8. arXiv:1811.10400  [pdf, ps, other

    cs.LO cs.FL

    Quantifying Attacker Capability Via Model Checking Multiple Properties (Extended Version)

    Authors: Eric Rothstein-Morris, Sun Jun

    Abstract: This work aims to solve a practical problem, i.e., how to quantify the risk brought upon a system by different attackers. The answer is useful for optimising resource allocation for system defence. Given a set of safety requirements, we quantify the attacker capability in terms of the set of safety requirements an attacker can compromise. Given a system (in the presence of an attacker), model chec… ▽ More

    Submitted 16 November, 2018; originally announced November 2018.

  9. arXiv:1805.04992  [pdf, other

    cs.IR

    Utilizing Probase in Open Directory Project-based Text Classification

    Authors: So-Young Jun, Dinara Aliyeva, Ji-Min Lee, SangKeun Lee

    Abstract: Open Directory Project (ODP) has been successfully utilized in text classification due to its representation ability of various categories. However, ODP includes a limited number of entities, which play an important role in classification tasks. In this paper, we enrich the semantics of ODP categories with Probase entities. To effectively incorporate Probase entities in ODP categories, we first re… ▽ More

    Submitted 13 May, 2018; originally announced May 2018.

  10. arXiv:1710.07736  [pdf, other

    cs.DB

    BigSparse: High-performance external graph analytics

    Authors: Sang-Woo Jun, Andy Wright, Sizhuo Zhang, Shuotao Xu, Arvind

    Abstract: We present BigSparse, a fully external graph analytics system that picks up where semi-external systems like FlashGraph and X-Stream, which only store vertex data in memory, left off. BigSparse stores both edge and vertex data in an array of SSDs and avoids random updates to the vertex data, by first logging the vertex updates and then sorting the log to sequentialize accesses to the SSDs. This ne… ▽ More

    Submitted 20 October, 2017; originally announced October 2017.

  11. arXiv:1703.02009  [pdf, other

    cs.NE cs.CV

    Learning across scales - A multiscale method for Convolution Neural Networks

    Authors: Eldad Haber, Lars Ruthotto, Elliot Holtham, Seong-Hwan Jun

    Abstract: In this work we establish the relation between optimal control and training deep Convolution Neural Networks (CNNs). We show that the forward propagation in CNNs can be interpreted as a time-dependent nonlinear differential equation and learning as controlling the parameters of the differential equation such that the network approximates the data-label relation for given training data. Using this… ▽ More

    Submitted 22 June, 2017; v1 submitted 6 March, 2017; originally announced March 2017.

  12. In-Storage Embedded Accelerator for Sparse Pattern Processing

    Authors: Sang-Woo Jun, Huy T. Nguyen, Vijay N. Gadepally, Arvind

    Abstract: We present a novel architecture for sparse pattern processing, using flash storage with embedded accelerators. Sparse pattern processing on large data sets is the essence of applications such as document search, natural language processing, bioinformatics, subgraph matching, machine learning, and graph processing. One slice of our prototype accelerator is capable of handling up to 1TB of data, and… ▽ More

    Submitted 10 November, 2016; originally announced November 2016.

    Comments: Accepted to IEEE HPEC 2016