Urmăriți
Hyeong Gwon Hong
Hyeong Gwon Hong
Ph.D candidates at KAIST
Adresă de e-mail confirmată pe kaist.ac.kr
Titlu
Citat de
Citat de
Anul
Continual learning with extended kronecker-factored approximate curvature
J Lee, HG Hong, D Joo, J Kim
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020
612020
Residual continual learning
J Lee, D Joo, HG Hong, J Kim
Proceedings of the AAAI Conference on Artificial Intelligence 34 (04), 4553-4560, 2020
232020
Closing the loophole: Rethinking reconstruction attacks in federated learning from a privacy standpoint
SH Na, HG Hong, J Kim, S Shin
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
112022
Rethinking efficacy of softmax for lightweight non-local neural networks
Y Cho, Y Kim, H Cho, J Ahn, HG Hong, J Kim
2022 IEEE International Conference on Image Processing (ICIP), 1031-1035, 2022
52022
Data poisoning attack aiming the vulnerability of continual learning
G Han, J Choi, HG Hong, J Kim
2023 IEEE International Conference on Image Processing (ICIP), 1905-1909, 2023
32023
Differentiable architecture search based on coordinate descent
P Ahn, HG Hong, J Kim
IEEE Access 9, 48544-48554, 2021
32021
Edas: Efficient and differentiable architecture search
HG Hong, P Ahn, J Kim
arXiv preprint arXiv:1912.01237, 2019
32019
Localization using multi-focal spatial attention for masked face recognition
Y Cho, H Cho, HG Hong, J Ahn, D Cho, JW Chang, J Kim
2023 IEEE 17th International Conference on Automatic Face and Gesture …, 2023
22023
Disposable transfer learning for selective source task unlearning
S Koh, H Shon, J Lee, HG Hong, J Kim
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023
22023
Foreseeing reconstruction quality of gradient inversion: An optimization perspective
HG Hong, Y Cho, H Cho, J Ahn, J Kim
Proceedings of the AAAI Conference on Artificial Intelligence 38 (11), 12473 …, 2024
12024
Training Time Adversarial Attack Aiming the Vulnerability of Continual Learning
G Han, J Choi, HG Hong, J Kim
NeurIPS ML Safety Workshop, 2022
12022
De-biasing Neural Networks with Estimated Offset for Class Imbalanced Learning
B Kim, HG Hong, J Kim
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer …, 2021
2021
Foreseeing Privacy Threats from Gradient Inversion Through the Lens of Angular Lipschitz Smoothness
HG Hong, Y Cho, H Cho, J Ahn, J Kim
MMRR: Unsupervised Anomaly Detection through Multi-Level Masking and Restoration with Refinement
J Ahn, J Lee, H Cho, Y Cho, HG Hong, J Kim
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–14