Skip to main content

Showing 1–6 of 6 results for author: Ahn, N Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.14425  [pdf, other

    cs.LG math.OC

    Task-optimal data-driven surrogate models for eNMPC via differentiable simulation and optimization

    Authors: Daniel Mayfrank, Na Young Ahn, Alexander Mitsos, Manuel Dahmen

    Abstract: We present a method for end-to-end learning of Koopman surrogate models for optimal performance in control. In contrast to previous contributions that employ standard reinforcement learning (RL) algorithms, we use a training algorithm that exploits the potential differentiability of environments based on mechanistic simulation models. We evaluate the performance of our method by comparing it to th… ▽ More

    Submitted 21 March, 2024; originally announced March 2024.

    Comments: 6 pages, 4 figures, 1 table

  2. IoT Security: On-Chip Secure Deletion Scheme using ECC Modulation in IoT Appliances

    Authors: Na Young Ahn, Dong Hoon Lee

    Abstract: NAND flash memory-based IoT devices inherently suffer from data retention issues. In IoT security, these retention issues are significant and require a robust solution for secure deletion. Secure deletion methods can be categorized into off-chip and on-chip schemes. Off-chip secure deletion schemes, based on block-level erasure operations, are unable to perform real-time trim operations. Consequen… ▽ More

    Submitted 9 August, 2023; originally announced August 2023.

    Comments: Available online 2 August 2023

    MSC Class: 68M15 ACM Class: C.5.1

    Journal ref: Computers & Security, 2023

  3. Security of IoT Device: Perspective Forensic/Anti-Forensic Issues on Invalid Area of NAND Flash Memory

    Authors: Na Young Ahn, Dong Hoon Lee

    Abstract: NAND flash memory-based IoT device can potentially still leave behind original personal data in an invalid area even if the data has been deleted. In this paper, we raise the forensic issue of original data remaining in unmanaged blocks caused by NAND flash memory and introduce methods for secure deletion of such data in the invalid area. We also propose a verification technique for secure deletio… ▽ More

    Submitted 1 August, 2022; originally announced August 2022.

    Comments: IEEE Access, early published by July 14, 2022

    MSC Class: 68W20

  4. arXiv:2112.13923  [pdf

    cs.CR

    Forensic Issues and Techniques to Improve Security in SSD with Flex Capacity Feature

    Authors: Na Young Ahn, Dong Hoon Lee

    Abstract: Over-provisioning technology is typically introduced as a means to improve the performance of storage systems, such as databases. The over-provisioning area is both hidden and difficult for normal users to access. This paper focuses on attack models for such hidden areas. Malicious hackers use advanced over-provisioning techniques that vary capacity according to workload, and as such, our focus is… ▽ More

    Submitted 20 December, 2021; originally announced December 2021.

    Comments: resubmitted(Nov. 25, 2021) and accepted(Dec. 15, 2021)in IEEE ACCESS(Access-2021-39427)

    MSC Class: 68M25 ACM Class: B.7.0; H.4.0

  5. arXiv:2011.07846  [pdf

    cs.SE cs.AI cs.DC

    Secure Vehicle Communications Using Proof-of-Nonce Blockchain

    Authors: N. Y. Ahn, D. H. Lee

    Abstract: This paper presents an autonomous driving that achieves physical layer security. Proposed vehicle communication is implemented based on Proof-of-Nonce (PoN) blockchain algorithm. PoN blockchain algorithm is a consensus algorithm that can be implemented in light weight. We propose a more secure vehicle communication scheme while achieving physical layer security by defecting PoN algorithm and secre… ▽ More

    Submitted 16 November, 2020; originally announced November 2020.

    Comments: 6 pages, 4 figures, IEEE Communication Magazine (Submitted on Nov. 16, 2020)

    MSC Class: 68W15 ACM Class: C.2

  6. Balancing Personal Privacy and Public Safety during COVID-19: The Case of South Korea

    Authors: Na Young Ahn, Jun Eun Park, Dong Hoon Lee, Paul C. Hong

    Abstract: There has been vigorous debate on how different countries responded to the COVID-19 pandemic. To secure public safety, South Korea actively used personal information at the risk of personal privacy whereas France encouraged voluntary cooperation at the risk of public safety. In this article, after a brief comparison of contextual differences with France, we focus on South Korea's approaches to epi… ▽ More

    Submitted 22 September, 2020; v1 submitted 29 April, 2020; originally announced April 2020.

    Comments: 11pages

    MSC Class: 93A30 ACM Class: C.0; H.0

    Journal ref: 2020, Vol.8