• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: RSA ]" (8)
  1. 1. Effective Adversarial Training by Adaptive Selection of Loss Function in Federated Learning
    Suchul Lee, Vol. 25, No. 2, pp. 1-9, Apr. 2024
    10.7472/jksii.2024.25.2.1
    Keywords: Federated learning, adversarial attacks, adversarial training, trade-off relationship
  2. 2. A Research on Adversarial Example-based Passive Air Defense Method against Object Detectable AI Drone
    Simun Yuk, Hweerang Park, Taisuk Suh, Youngho Cho, Vol. 24, No. 6, pp. 119-125, Dec. 2023
    10.7472/jksii.2023.24.6.119
    Keywords: object detectable drone, AI drone, Adversarial machine learning, swarm drone, air defense, base defense
  3. 3. A Study on Effective Adversarial Attack Creation for Robustness Improvement of AI Models
    Si-on Jeong, Tae-hyun Han, Seung-bum Lim, Tae-jin Lee, Vol. 24, No. 4, pp. 25-36, Aug. 2023
    10.7472/jksii.2023.24.4.25
    Keywords: Artificial intelligence, robustness, Adversarial attack
  4. 4. Makeup transfer by applying a loss function based on facial segmentation combining edge with color information
    So-hyun Lim, Jun-chul Chun, Vol. 23, No. 4, pp. 35-43, Aug. 2022
    10.7472/jksii.2022.23.4.35
    Keywords: Makeup Transfer, generative adversarial networks, Histogram of Gradient, BeautyGAN, Loss Function, Facial segmentation
  5. 5. Regeneration of a defective Railroad Surface for defect detection with Deep Convolution Neural Networks
  6. 6. GAN-based shadow removal using context information
    Hee-jin Yoon, Kang-jik Kim, Jun-chul Chun, Vol. 20, No. 6, pp. 29-36, Dec. 2019
    10.7472/jksii.2019.20.6.29
    Keywords: Shadow removal, Generative Adversarial Network, deep-learning
  7. 7. Single Image Dehazing Based on Depth Map Estimation via Generative Adversarial Networks
    Yao Wang, Woojin Jeong, Young Shik Moon, Vol. 19, No. 5, pp. 43-54, Oct. 2018
    10.7472/jksii.2018.19.5.43
    Keywords: dehaze, depth estimation, generative adversarial networks.
  8. 8. XML Document Encrypt Implementation using Elliptic Curve Cryptosystem
    Hoon Ko, Vol. 8, No. 1, pp. 79-86, Feb. 2007
    Keywords: ECC, RSA, XML, Encryption