1 code implementation • 4 Dec 2023 • Sunjae Lee, Junyoung Choi, Jungjae Lee, Munim Hasan Wasi, Hojun Choi, Steven Y. Ko, Sangeun Oh, Insik Shin
The advent of large language models (LLMs) has opened up new opportunities in the field of mobile task automation.
no code implementations • 8 Jul 2022 • Byunggill Joe, Insik Shin, Jihun Hamm
Recurrent models are frequently being used in online tasks such as autonomous driving, and a comprehensive study of their vulnerability is called for.
no code implementations • 15 Jun 2021 • Byunggill Joe, Akshay Mehra, Insik Shin, Jihun Hamm
Electronic Health Records (EHRs) provide a wealth of information for machine learning algorithms to predict the patient outcome from the data including diagnostic information, vital signals, lab tests, drug administration, and demographic information.
no code implementations • 7 Dec 2020 • Byunggill Joe, Jihun Hamm, Sung Ju Hwang, Sooel Son, Insik Shin
Although deep neural networks have shown promising performances on various tasks, they are susceptible to incorrect predictions induced by imperceptibly small perturbations in inputs.
no code implementations • 10 Sep 2019 • Byunggill Joe, Sung Ju Hwang, Insik Shin
Yet, most of them cannot effectively defend against whitebox attacks where an adversary has a knowledge of the model and defense.
no code implementations • 23 May 2019 • Wookhyun Han, Md Lutfor Rahman, Yuxuan Chen, Chengyu Song, Byoungyoung Lee, Insik Shin
Then it uses oracle-guided program synthesis to reconstruct the symbolic expression based on input-output pairs.
Cryptography and Security