publications
publications in reversed chronological order.
2023
-
IEIELightweight Grapheme-to-Phoneme Conversion Based on Knowledge Distilled BERTSummer Annual Conference of IEIE, 2023
~2022
-
ACSACHere Is Your Fingerprint!: Actual Risk versus User Perception of Latent Fingerprints and Smudges Remaining on Smartphonesthe 33rd Annual Computer Security Applications Conference (ACSAC), 2017
-
CCSPoster: Rethinking Fingerprint Identification on SmartphonesACM SIGSAC Conference on Computer and Communications Security (CCS), 2017
-
CISC-WPerformance Analysis of Features Based on User Behavior Information for Continuous AuthenticationConference on Information Security and Cryptography Winter (CISC-W), 2017
-
JKIISCFingerprint Smudge Attacks Based on Fingerprint Image Reconstruction on Smart DevicesJournal of The Korea Institute of Information Security and Cryptology (JKIISC), 2017
-
CISC-WFingerprint Image Reconstruction for Fingerprint Smudge Attacks on Smart Devices (Best Paper Nomination
)
Conference on Information Security and Cryptography Winter (CISC-W), 2016 -
CISC-WBehavior Based Authentication Using Application Usage and Touch DynamicConference on Information Security and Cryptography Winter (CISC-W), 2016