| # | Name | Dept | Advisor | Email Address |
|---|---|---|---|---|
| 1 | Hyeonjun Jo | CE | Undergraduate | mnbvjojun@gmail.com |
| 2 | Nayung Kwak | CE | Undergraduate | kny12202423@gmail.com |
| 3 | Kyungchan Kim | CS | Minho Shin | kkc8983@gmail.com |
TBD * order: Cho --> Han --> Kwak * # of presentations per week: 2, 2, 2, ... * # of presentations per person:
| Date | Name | Topic | Slides | Minutes | |
|---|---|---|---|---|---|
| 3/4 | Minho | AI-Introduction | AI-Intro | ||
| 3/11 | Minho | ||||
| Cho | You autocomplete me: Poisoning vulnerabilities in neural code completion | You autocomplete me: Poisoning vulnerabilities in neural code completion | |||
| 3/18 | Minho | ||||
| Han | D2a: A dataset built for ai-based vulnerability detection methods using differential analysis | ||||
| 3/27 | Minho | ||||
| Kwak | A Deep Learning-Based Innovative Technique for Phishing Detection with URLs | ||||
| 4/1 | No Class | ||||
| 4/10 | Cho | Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables | |||
| 4/15 | Han | ||||
| 4/24 | Kwak | ||||
| 4/29 | Cho | ||||
| 5/6 | Han | ||||
| 5/13 | Kwak | ||||
| 5/20 | Cho | ||||
| 5/27 | Han | ||||
| 6/3 | Kwak | ||||
| 6/10 | Cho | ||||
| 6/17 | Han | ||||
| 6/24 | Kwak |
# AI Security Course - Research Paper List (2020+) # Papers with freely accessible PDFs (72 papers)