publications

2023

  1. acm_logo.webp
    Enhancing Intrusion Detection and Explanations for Imbalanced Vehicle CAN Network Data
    Thi-Thu-Huong Le, Naufal Suryanto, Howon Kim, and 2 more authors
    In Proceedings of the 12th International Symposium on Information and Communication Technology, Dec 2023
  2. ICCV2023_Logo.svg
    ACTIVE: Towards Highly Transferable 3D Physical Camouflage for Universal and Robust Vehicle Evasion
    Naufal Suryanto, Yongsu Kim, Harashta Tatimma Larasati, and 6 more authors
    In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), Oct 2023
  3. smartmedia_logo.png
    Trend of Paradigm for integrating Blockchain, Artificial Intelligence, Quantum Computing, and Internet of Things
    Rini Wisnu Wardhani, Dedy Septono Catur Putranto, Thi-Thu-Huong Le, and 5 more authors
    Smart Media Journal, Mar 2023
  4. applsci-logo.webp
    NFT Image Plagiarism Check Using EfficientNet-Based Deep Neural Network with Triplet Semi-Hard Loss
    Aji Teguh Prihatno, Naufal Suryanto, Sangbong Oh, and 2 more authors
    Applied Sciences, Feb 2023

2022

  1. kiisc_logo.png
    Adversarial Wall: Physical Adversarial Attack on Cityscape Pretrained Segmentation Model
    Naufal Suryanto, Harashta Tatimma Larasati, Yongsu Kim, and 1 more author
    In Korea Institute of Information Security and Cryptology, Nov 2022
  2. CVPR2022_Logo.png
    DTA: Physical Camouflage Attacks Using Differentiable Transformation Network
    Naufal Suryanto, Yongsu Kim, Hyoeun Kang, and 6 more authors
    In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Jun 2022

2021

  1. sensors-logo.png
    Extended Spatially Localized Perturbation GAN (eSLP-GAN) for Robust Adversarial Camouflage Patches
    Yongsu Kim, Hyoeun Kang, Naufal Suryanto, and 3 more authors
    Sensors, Aug 2021

2020

  1. sensors-logo.png
    A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization
    Naufal Suryanto, Hyoeun Kang, Yongsu Kim, and 3 more authors
    Sensors, Dec 2020
  2. springer-logo.png
    Spatially Localized Perturbation GAN (SLP-GAN) for Generating Invisible Adversarial Patches
    Yongsu Kim, Hyoeun Kang, Afifatul Mukaroh, and 3 more authors
    In Information Security Applications, Dec 2020
  3. ACM_CCS_logo.png
    ABSTRACT: Together We Can Fool Them: A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization
    Naufal Suryanto, Hyoeun Kang, Yongsu Kim, and 3 more authors
    In Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop, Nov 2020

2019

  1. kics_logo.png
    A Study on Federated Access Control in Interoperability of Heterogeneous IoT Platforms
    Ismail, Naufal Suryanto, Hyeongon Kim, and 2 more authors
    Korea Communications Society Summer Conference, Jun 2019
  2. kiisc_logo.png
    OCF Gateway Implementation for IoT Platforms Interoperability
    Naufal Suryanto,  Ismail, Harashta Tatimma Larasati, and 2 more authors
    In Conference on Information Security and Cryptography-Winter 2019 (CISC-W’19), Nov 2019

2017

  1. ieee_logo.png
    Multi-group particle swarm optimization with random redistribution
    Naufal Suryanto, Chihiro Ikuta, and Dadet Pramadihanto
    In 2017 International Electronics Symposium on Knowledge Creation and Intelligent Computing (IES-KCIC), Sep 2017