Research Areas
Deepfake Voice Detection
Audio Deepfake is being used for malicious purpose and impacting society.
(Voice Phishing, Fake News, Financial Fraud, Fake Voice Record, etc.)
Deep learning-based speech synthesis (TTS: Text-to-Speech) and voice conversion technologies are used to generate deepfake voices similar to real voices.
To detect the Deepfake Voice, handcrafted feature-based techniques and deep feature-based techniques are used :
- Handcrafted features : Constant Q cepstral coefficients (CQCC), Chroma Quantization Transfrom(CQT), Mel-Frequeny
Cepstral Coefficients(MFCC), etc.
- Deep features : ResNet-18, Light Convolutional Gated RNN (LCGRNN), ResTSSDNet, etc.
- Transfer learning: Emotional features, breathing signals, etc.
- Self-supervised learning-based features: Wav2Vec 2.0, XLS-R, HuBERT, etc.
The detection boundary between fake and real voices has been established using deep learning technology.
Adversarial attacks
Adversarial
Framework for threat intelligence flexibility
Field extraction technology using multi-layered perceptron for classifying malware threat indicators.
Detection method using artificial intelligence for cyber threat information.
Collect event information and pre-classify threat information.
Black-box audio adversarial attack using particle swarm optimization.
Generating audio adversarial examples using a query-efficient decision-based attack
Research on query-efficient attack and defense mechanism against deep learning models.
Fuzzing
Coverage-guided fuzzing of deep neural networks to detect adversarial examples by advanced coverage criteria
and input mutation strategy.
Adversarial defense (Training, Detection, Denoising) using adversarial examples of coverage-guided fuzzing to
cope with stronger adversarial attacks.
AI-assisted Security
AI Security
Secure and robust federated learning algorithms using group signatures, clustering and self learning.
Optimization and trustworthiness of distributed machine learning algorithms using secure aggregation,
Incentivization, and anomaly detection.
Privacy-preserving machine learning applications using federated learning and split learning (UAVs, mental health,
surveillance, etc.)
Apply data discretization to secure appropriate data intervals for labels and normalize data.
Building an advanced anomaly detection model using the neural network.
Apply the Interpretable Model(Bayesian Rule, etc) to the neural network and obtain evidence for the results.
User friendly Interpretable model.
Dimension reduction and feature selection using Discrete Wavelet Transform (DWT), Decision Tree, t-SNE, etc.
Optimized analysis and preprocessing for cyber threat data.
Feature importance for interpreting results of machine learning models.
Cloud-native Security
Research Topics
Container Security applied at the different phases of the container’s lifecycle (development & runtime phase)
Image Integrity Verification
Container Vulnerability Scanning
Container Attack Surface Reduction
Workloads’ Behavior Monitoring
Runtime Security Policy Enforcement
Kernel Vulnerability Hot-patch
Network Security for Container Orchestration (working by ETRI)
Project Summary (Cooperated with ETRI)
Focused on cloud-native security for years working with ETRI (Electronics and Telecommunications Research Institute), which contributes to the nation's economic and social development through research.
Paid attention to a technology known as eBPF, which is astonishingly helpful for cloud-native security, providing instrumentation and enforcement ability in container runtime.
This Project is supported by Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government(MSIT) (No.2020-0-00952, Development of 5G Edge Security Technology for Ensuring 5G+ Service Stability and Availability)