What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Simon S. Woo
Google Scholar
21
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurosp
SoK: Systematization and Benchmarking of Deepfake Detectors in a Unified Framework.
Binh Minh Le
Jiwon Kim
Simon S. Woo
Kristen Moore
Alsharif Abuadbba
Shahroz Tariq
2022
journals/compsec
PasswordTensor: Analyzing and explaining password strength using tensor decomposition.
Youjin Shin
Simon S. Woo
2022
conf/asiaccs
WDC'22: 1st Workshop on the Security Implications of Deepfakes and Cheapfakes.
Simon S. Woo
Shahroz Tariq
Hyoungshick Kim
2021
journals/compsec
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks.
William Aiken
Hyoungshick Kim
Simon S. Woo
Jungwoo Ryoo
2021
conf/sec
TAR: Generalized Forensic Framework to Detect Deepfakes Using Weakly Supervised Learning.
Sangyup Lee
Shahroz Tariq
Junyaup Kim
Simon S. Woo
2021
conf/sec
Revitalizing Self-Organizing Map: Anomaly Detection Using Forecasting Error Patterns.
Young Geun Kim
Jeong-Han Yun
Siho Han
Hyoung Chun Kim
Simon S. Woo
2020
journals/compsec
CAN-ADF: The controller area network attack detection framework.
Shahroz Tariq
Sangyup Lee
Huy Kang Kim
Simon S. Woo
2020
conf/ccs
PassTag: A Graphical-Textual Hybrid Fallback Authentication System.
Joon Kuy Han
Xiaojun Bi
Hyoungshick Kim
Simon S. Woo
2020
conf/sec
FDFtNet: Facing Off Fake Images Using Fake Detection Fine-Tuning Network.
Hyeonseong Jeon
Youngoh Bang
Simon S. Woo
2020
conf/acisp
Design and Evaluation of Enumeration Attacks on Package Tracking Systems.
Hanbin Jang
Woojoong Ji
Simon S. Woo
Hyoungshick Kim
2020
conf/fc
Tale of Two Browsers: Understanding Users' Web Browser Choices in South Korea.
Jihye Woo
Ji-Won Choi
Soyoon Jeon
Joon Kuy Han
Hyoungshick Kim
Simon S. Woo
2019
journals/compsec
Password typographical error resilience in honey encryption.
Hoyul Choi
Jongmin Jeong
Simon S. Woo
Kyungtae Kang
Junbeom Hur
2019
journals/compsec
Design and evaluation of 3D CAPTCHAs.
Simon S. Woo
2019
conf/ccs
Nickel to Lego: Using Foolgle</> to Create Adversarial Examples to Fool Google Cloud Speech-to-Text API.
Joon Kuy Han
Hyoungshick Kim
Simon S. Woo
2019
conf/ccs
Understanding Users' Risk Perceptions about Personal Health Records Shared on Social Networking Services.
Yuri Son
Geumhwan Cho
Hyoungshick Kim
Simon S. Woo
2018
conf/ccs
POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System.
Jusop Choi
Taekkyung Oh
William Aiken
Simon S. Woo
Hyoungshick Kim
2018
conf/ccs
Adversarial Product Review Generation with Word Replacements.
Yimin Zhu
Simon S. Woo
2018
conf/ccs
Detecting Both Machine and Human Created Fake Face Images In the Wild.
Shahroz Tariq
Sangyup Lee
Hoyoung Kim
Youjin Shin
Simon S. Woo
2018
conf/sec
When George Clooney Is Not George Clooney: Using GenAttack to Deceive Amazon's and Naver's Celebrity Recognition APIs.
Keeyoung Kim
Simon S. Woo
2016
conf/wisa
Exploration of 3D Texture and Projection for New CAPTCHA Design.
Simon S. Woo
Jingul Kim
Duoduo Yu
Beomjun Kim
2016
conf/acsac
Life-experience passwords (LEPs).
Simon S. Woo
Elsi Kaiser
Ron Artstein
Jelena Mirkovic
Coauthors
Alsharif Abuadbba
(1)
Beomjun Kim
(1)
Binh Minh Le
(1)
Duoduo Yu
(1)
Elsi Kaiser
(1)
Geumhwan Cho
(1)
Hanbin Jang
(1)
Hoyoung Kim
(1)
Hoyul Choi
(1)
Huy Kang Kim
(1)
Hyeonseong Jeon
(1)
Hyoung Chun Kim
(1)
Hyoungshick Kim
(8)
Jelena Mirkovic
(1)
Jeong-Han Yun
(1)
Ji-Won Choi
(1)
Jihye Woo
(1)
Jingul Kim
(1)
Jiwon Kim
(1)
Jongmin Jeong
(1)
Joon Kuy Han
(3)
Junbeom Hur
(1)
Jungwoo Ryoo
(1)
Junyaup Kim
(1)
Jusop Choi
(1)
Keeyoung Kim
(1)
Kristen Moore
(1)
Kyungtae Kang
(1)
Ron Artstein
(1)
Sangyup Lee
(3)
Shahroz Tariq
(5)
Siho Han
(1)
Simon S. Woo
(21)
Soyoon Jeon
(1)
Taekkyung Oh
(1)
William Aiken
(2)
Woojoong Ji
(1)
Xiaojun Bi
(1)
Yimin Zhu
(1)
Youjin Shin
(2)
Young Geun Kim
(1)
Youngoh Bang
(1)
Yuri Son
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to