Izuazu, U. U., Kim, D.-S. ., & Lee, J. M. (2023). Unravelling the Black Box: Enhancing Virtual Reality Network Security with Interpretable Deep Learning-Based Intrusion Detection System. In (pp. 928–931). http://doi.org/10.1109/ICTC58733.2023.10392826 (Original work published 2024)
First name
Dong-Seong
Last name
Kim
Nkoro, E. C., Nwakanma, C. I., Lee, J.-M. ., & Kim, D.-S. . (2024). Bit-by-Bit: A Quantization-Aware Training Framework with XAI for Robust Metaverse Cybersecurity. In (pp. 832–837). http://doi.org/10.1109/ICAIIC60209.2024.10463374 (Original work published 2024)
Izuazu, U. U., Kim, D.-S. ., & Lee, J. M. (2023). Unravelling the Black Box: Enhancing Virtual Reality Network Security with Interpretable Deep Learning-Based Intrusion Detection System. In (pp. 928–931). http://doi.org/10.1109/ICTC58733.2023.10392826 (Original work published 2024)
Nkoro, E. C., Nwakanma, C. I., Lee, J.-M. ., & Kim, D.-S. . (2023). Explainable Adversarial Mitigation Framework for Zero-Trust Cyber Warfare. In (pp. 947–952). http://doi.org/10.1109/ICTC58733.2023.10392359 (Original work published 2024)
Golam, M. ., Akter, R. ., Naufal, R. ., Doan, V.-S. ., Lee, J.-M. ., & Kim, D.-S. . (2022). Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things. In MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) (p. 342—349).
Nkoro, E. C., Nwakanma, C. I., Lee, J.-M. ., & Kim, D.-S. . (2022). Industrial Network Attack Vulnerability Detection and Analysis using Shodan Eye Scanning Technology. In 2022 13th International Conference on Information and Communication Technology Convergence (ICTC) (pp. 886–889).