Zum Hauptinhalt springen

Showing 1–5 of 5 results for author: Eom, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.12222  [pdf, other

    cs.CR cs.CL cs.LG cs.SE

    CovRL: Fuzzing JavaScript Engines with Coverage-Guided Reinforcement Learning for LLM-based Mutation

    Authors: Jueon Eom, Seyeon Jeong, Taekyoung Kwon

    Abstract: Fuzzing is an effective bug-finding technique but it struggles with complex systems like JavaScript engines that demand precise grammatical input. Recently, researchers have adopted language models for context-aware mutation in fuzzing to address this problem. However, existing techniques are limited in utilizing coverage guidance for fuzzing, which is rather performed in a black-box manner. This… ▽ More

    Submitted 19 February, 2024; originally announced February 2024.

    Comments: 14 pages, 4 figures, 9 tables, 2 listings

    ACM Class: D.4.6; I.2.5; D.2.4

  2. arXiv:2211.16090  [pdf, other

    cs.RO

    Compliant Suction Gripper with Seamless Deployment and Retraction for Robust Picking against Depth and Tilt Errors

    Authors: Yuna Yoo, Jaemin Eom, Min Jo Park, Kyu-Jin Cho

    Abstract: Applying suction grippers in unstructured environments is a challenging task because of depth and tilt errors in vision systems, requiring additional costs in elaborate sensing and control. To reduce additional costs, suction grippers with compliant bodies or mechanisms have been proposed; however, their bulkiness and limited allowable error hinder their use in complex environments with large erro… ▽ More

    Submitted 29 November, 2022; originally announced November 2022.

    Comments: 8 pages, 11 figures

  3. arXiv:2106.07229  [pdf, other

    cs.LG cs.CR

    Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network

    Authors: Joon-Woo Lee, HyungChul Kang, Yongwoo Lee, Woosuk Choi, Jieun Eom, Maxim Deryabin, Eunsang Lee, Junghyun Lee, Donghoon Yoo, Young-Sik Kim, Jong-Seon No

    Abstract: Fully homomorphic encryption (FHE) is one of the prospective tools for privacypreserving machine learning (PPML), and several PPML models have been proposed based on various FHE schemes and approaches. Although the FHE schemes are known as suitable tools to implement PPML models, previous PPML models on FHE encrypted data are limited to only simple and non-standard types of machine learning models… ▽ More

    Submitted 14 June, 2021; originally announced June 2021.

    Comments: 12 pages, 4 figures

  4. arXiv:1907.00719  [pdf, ps, other

    cs.CE

    Expression of the peak time for time-domain boundary measurements in diffuse light

    Authors: Junyong Eom, Manabu Machida, Gen Nakamura, Goro Nishimura, Chunlong Sun

    Abstract: Light propagation through diffusive media can be described by the diffusion equation in a space-time domain. Further, fluorescence can be described by a system of coupled diffusion equations. This paper analyzes time-domain measurements, which measure the temporal point-spread function (TPSF), at a boundary of such diffusive media with a given source and detector. We focus on the temporal position… ▽ More

    Submitted 7 December, 2021; v1 submitted 27 June, 2019; originally announced July 2019.

  5. Multi-Client Order-Revealing Encryption

    Authors: Jieun Eom, Dong Hoon Lee, Kwangsu Lee

    Abstract: Order-revealing encryption is a useful cryptographic primitive that provides range queries on encrypted data since anyone can compare the order of plaintexts by running a public comparison algorithm. Most studies on order-revealing encryption focus only on comparing ciphertexts generated by a single client, and there is no study on comparing ciphertexts generated by multiple clients. In this paper… ▽ More

    Submitted 5 September, 2018; originally announced September 2018.

    Journal ref: IEEE Access, 2018