AdversarialQR: An adversarial patch in QR code format A Chindaudom, P Siritanawan, K Sumongkayothin, K Kotani 2020 Joint 9th International Conference on Informatics, Electronics & Vision …, 2020 | 21 | 2020 |
Recursive matrix oblivious RAM: An ORAM construction for constrained storage devices S Gordon, X Huang, A Miyaji, C Su, K Sumongkayothin, ... IEEE Transactions on Information Forensics and Security 12 (12), 3024-3038, 2017 | 9 | 2017 |
A matrix based ORAM: design, implementation and experimental analysis S Gordon, A Miyaji, C Su, K Sumongkayothin IEICE TRANSACTIONS on Information and Systems 99 (8), 2044-2055, 2016 | 6 | 2016 |
Surreptitious adversarial examples through functioning qr code A Chindaudom, P Siritanawan, K Sumongkayothin, K Kotani Journal of Imaging 8 (5), 122, 2022 | 5 | 2022 |
M-ORAM: A Matrix ORAM with Log N Bandwidth Cost S Gordon, A Miyaji, C Su, K Sumongkayothin International Workshop on Information Security Applications, 3-15, 2015 | 4 | 2015 |
OVERSCAN: OAuth 2.0 scanner for missing parameters K Sumongkayothin, P Rachtrachoo, A Yupuech, K Siriporn Network and System Security: 13th International Conference, NSS 2019 …, 2019 | 3 | 2019 |
Recursive M-ORAM: A matrix ORAM for clients with constrained storage space K Sumongkayothin, S Gordon, A Miyaji, C Su, K Wipusitwarakun International Conference on Applications and Techniques in Information …, 2016 | 3 | 2016 |
M-oram revisited: security and construction updates K Sumongkayothin Information Security Practice and Experience: 14th International Conference …, 2018 | 2 | 2018 |
Botnet Detection by Integrating Multiple Machine Learning Models T Tejapijaya, P Siritanawan, K Sumongkayothin, K Kotani 10th International Conference on Information Systems Security and Privacy …, 2024 | | 2024 |
Investigating Protection of Deep Learning Visual Features on ECB Encrypted Images K Chunhachatchawhankhun, P Siritanawan, K Sumongkayothin, K Kotani 2021 13th International Conference on Knowledge and Systems Engineering (KSE …, 2021 | | 2021 |
Information Security Practice and Experience: 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings C Su, H Kikuchi Springer, 2018 | | 2018 |
行列型のストレージ構造を使用した ORAM (Oblivious Random Access Machine) の帯域幅コストの改善について K Sumongkayothin | | 2017 |
Matrix based oblivious random access machine for constrained device K Sumongkayothin, K Wipusitwarakun, A Miyaji Thammasat University, 2017 | | 2017 |
Experimental Analysis of Path ORAM in Practical Implementation K Sumongkayothin, A Miyaji, C Su, S Gordon IEICE Technical Report; IEICE Tech. Rep. 115 (119), 73-79, 2015 | | 2015 |
Cybersecurity Intrusion Detection with Image Classification Model Using Hilbert Curve P Jaroensiripong, K Sumongkayothin, P Siritanawan, K Kotani Proceedings Copyright 325, 332, 0 | | |
Investigating effectiveness of Deep Learning on ECB encrypted images. K Chunhachatchawhankhun, P Siritanawan, K Sumongkayothin, K Kotani | | |
AdversarialQR: An adversarial patch in QR code A Chindaudom, K Sumongkayothin, P Siritanawan, K Kotani | | |
Session Chairs A Srisuphab, C So-In, J Fakcharoenphol, K Sumongkayothin, ... | | |