default search action
Junyoung Byun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j11]Junyoung Byun, Jaewook Lee, Hyeongyeong Lee, Bumho Son:
Balancing Explainability and Privacy in Bank Failure Prediction: A Differentially Private Glass-Box Approach. IEEE Access 13: 1546-1565 (2025) - [j10]Junyoung Byun, Yujin Choi, Jaewook Lee:
Improving the utility of differentially private clustering through dynamical processing. Pattern Recognit. 157: 110890 (2025) - 2024
- [j9]Junyoung Byun, Yujin Choi, Jaewook Lee, Saerom Park:
Privacy-preserving inference resistant to model extraction attacks. Expert Syst. Appl. 256: 124830 (2024) - [j8]Kyujin Shim, Junyoung Byun, Kangwook Ko, Jubi Hwang, Changick Kim:
Enhancing Robustness of Multi-Object Trackers With Temporal Feature Mix. IEEE Trans. Circuits Syst. Video Technol. 34(10): 9822-9835 (2024) - [i8]Yujin Choi, Jinseong Park, Junyoung Byun, Jaewook Lee:
Leveraging Programmatically Generated Synthetic Data for Differentially Private Diffusion Training. CoRR abs/2412.09842 (2024) - 2023
- [j7]Junyoung Byun, Saerom Park, Yujin Choi, Jaewook Lee:
Efficient homomorphic encryption framework for privacy-preserving regression. Appl. Intell. 53(9): 10114-10129 (2023) - [j6]Jinseong Park, Yujin Choi, Junyoung Byun, Jaewook Lee, Saerom Park:
Efficient differentially private kernel support vector classifier for multi-class classification. Inf. Sci. 619: 889-907 (2023) - [c18]Junyoung Byun, Myung-Joon Kwon, Seungju Cho, Yoonji Kim, Changick Kim:
Introducing Competition to Boost the Transferability of Targeted Adversarial Examples Through Clean Feature Mixup. CVPR 2023: 24648-24657 - [c17]Yoonji Kim, Seungju Cho, Junyoung Byun, Myung-Joon Kwon, Changick Kim:
Improving Adversarial Transferability Via Feature Translation. ICIP 2023: 3359-3363 - [c16]Junyoung Byun, Jaewook Lee:
Fast and Differentially Private Fair Clustering. IJCAI 2023: 5915-5923 - [i7]Junyoung Byun, Yujin Choi, Jaewook Lee:
Improving the Utility of Differentially Private Clustering through Dynamical Processing. CoRR abs/2304.13886 (2023) - [i6]Junyoung Byun, Myung-Joon Kwon, Seungju Cho, Yoonji Kim, Changick Kim:
Introducing Competition to Boost the Transferability of Targeted Adversarial Examples through Clean Feature Mixup. CoRR abs/2305.14846 (2023) - 2022
- [j5]Seunghan Yang, Hyoungseob Park, Junyoung Byun, Changick Kim:
Robust Federated Learning With Noisy Labels. IEEE Intell. Syst. 37(2): 35-43 (2022) - [j4]Woojin Lee, Sungyoon Lee, Junyoung Byun, Hoki Kim, Jaewook Lee:
Variational cycle-consistent imputation adversarial networks for general missing patterns. Pattern Recognit. 129: 108720 (2022) - [c15]Junyoung Byun, Seungju Cho, Myung-Joon Kwon, Heeseon Kim, Changick Kim:
Improving the Transferability of Targeted Adversarial Examples through Object-Based Diverse Input. CVPR 2022: 15223-15232 - [c14]Junyoung Byun, Kyujin Shim, Hyojun Go, Changick Kim:
Hidden Conditional Adversarial Attacks. ICIP 2022: 1306-1310 - [c13]Junyoung Byun, Hyojun Go, Seungju Cho, Changick Kim:
Exploiting Doubly Adversarial Examples for Improving Adversarial Robustness. ICIP 2022: 1331-1335 - [c12]Seungju Cho, Junyoung Byun, Myung-Joon Kwon, Yoonji Kim, Changick Kim:
Adversarial Training with Channel Attention Regularization. ICIP 2022: 2996-3000 - [c11]Minji Son, Myung-Joon Kwon, Heeseon Kim, Junyoung Byun, Seungju Cho, Changick Kim:
Adaptive Warping Network for Transferable Adversarial Attacks. ICIP 2022: 3056-3060 - [c10]Junyoung Byun, Hyojun Go, Changick Kim:
Geometrically Adaptive Dictionary Attack on Face Recognition. WACV 2022: 3809-3818 - [c9]Junyoung Byun, Hyojun Go, Changick Kim:
On the Effectiveness of Small Input Noise for Defending Against Query-based Black-Box Attacks. WACV 2022: 3819-3828 - [c8]Saerom Park, Junyoung Byun, Joohee Lee:
Privacy-Preserving Fair Learning of Support Vector Machine with Homomorphic Encryption. WWW 2022: 3572-3583 - [i5]Junyoung Byun, Seungju Cho, Myung-Joon Kwon, Heeseon Kim, Changick Kim:
Improving the Transferability of Targeted Adversarial Examples through Object-Based Diverse Input. CoRR abs/2203.09123 (2022) - 2021
- [j3]Yunyoung Lee, Bumho Son, Huisu Jang, Junyoung Byun, Taeho Yoon, Jaewook Lee:
Atomic cross-chain settlement model for central banks digital currency. Inf. Sci. 580: 838-856 (2021) - [j2]Woojin Lee, Hyungjin Ko, Junyoung Byun, Taeho Yoon, Jaewook Lee:
Fair Clustering with Fair Correspondence Distribution. Inf. Sci. 581: 155-178 (2021) - [c7]Hyojun Go, Junyoung Byun, Changick Kim:
Rethinking Training Schedules For Verifiably Robust Networks. ICIP 2021: 464-468 - [c6]Hyojun Go, Junyoung Byun, Byeongjun Park, Myung-Ae Choi, Seunghwa Yoo, Changick Kim:
Fine-Grained Multi-Class Object Counting. ICIP 2021: 509-513 - [c5]Seungjun Jung, Junyoung Byun, Kyujin Shim, Sanghyun Hwang, Changick Kim:
Understanding Vqa For Negative Answers Through Visual And Linguistic Inference. ICIP 2021: 2873-2877 - [c4]Junyoung Byun, Woojin Lee, Jaewook Lee:
Parameter-free HE-friendly Logistic Regression. NeurIPS 2021: 8457-8468 - [i4]Junyoung Byun, Hyojun Go, Changick Kim:
Small Input Noise is Enough to Defend Against Query-based Black-box Attacks. CoRR abs/2101.04829 (2021) - [i3]Junyoung Byun, Hyojun Go, Changick Kim:
Geometrically Adaptive Dictionary Attack on Face Recognition. CoRR abs/2111.04371 (2021) - 2020
- [j1]Saerom Park, Junyoung Byun, Joohee Lee, Jung Hee Cheon, Jaewook Lee:
HE-Friendly Algorithm for Privacy-Preserving SVM Training. IEEE Access 8: 57414-57425 (2020) - [c3]Kyujin Shim, Junyoung Byun, Changick Kim:
Multi-Step Quantization Of A Multi-Scale Network For Crowd Counting. ICIP 2020: 683-687 - [i2]Seunghan Yang, Hyoungseob Park, Junyoung Byun, Changick Kim:
Robust Federated Learning with Noisy Labels. CoRR abs/2012.01700 (2020)
2010 – 2019
- 2019
- [c2]Saerom Park, Jaewook Lee, Jung Hee Cheon, Juhee Lee, Jaeyun Kim, Junyoung Byun:
Security-preserving Support Vector Machine with Fully Homomorphic Encryption. SafeAI@AAAI 2019 - [i1]Junyoung Byun, Kyujin Shim, Changick Kim:
BitNet: Learning-Based Bit-Depth Expansion. CoRR abs/1910.04397 (2019) - 2018
- [c1]Junyoung Byun, Kyujin Shim, Changick Kim:
BitNet: Learning-Based Bit-Depth Expansion. ACCV (2) 2018: 67-82
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-26 23:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint