Publications by authors named "HoWon Kim"

Article Synopsis
  • - CIPHER is a specialized AI chatbot designed to assist with penetration testing by leveraging extensive training on over 300 high-quality cybersecurity resources and using a unique method called FARR Flow to enhance write-ups for automated simulations.
  • - Unlike general AI, CIPHER addresses domain-specific knowledge needed for effective penetration testing, filling a gap in traditional Q&A benchmarks and offering a rigorous evaluation standard for language models in this area.
  • - In tests, CIPHER outperformed other open-source models, showing significant accuracy in providing suggestions, especially for complex scenarios, highlighting the limitations of general language models in penetration testing tasks.
View Article and Find Full Text PDF

Realizing hybrids of low-dimensional Kondo lattices and superconducting substrates leads to fascinating platforms for studying the exciting physics of strongly correlated electron systems with induced superconducting pairing. Here, we report a scanning tunneling microscopy and spectroscopy study of a new type of two-dimensional (2D) La-Ce alloy grown epitaxially on a superconducting Re(0001) substrate. We observe the characteristic spectroscopic signature of a hybridization gap evidencing the coherent spin screening in the 2D Kondo lattice realized by the ultrathin La-Ce alloy film on normal conducting Re(0001).

View Article and Find Full Text PDF
Article Synopsis
  • Sports-related concussions (SRC) in teen athletes can lead to a higher chance of lower leg injuries, and neuromuscular training (NMT) may help reduce these injuries, but the neural changes from NMT in athletes with a history of SRC are not well known.
  • A study involved 32 adolescent female athletes, comparing those with a history of SRC to those without, to look at changes in their movement and brain activity after a six-week NMT program using 3D motion analysis and fMRI.
  • Findings showed that after NMT, there was a notable decrease in knee movement patterns and changes in brain activity, suggesting that NMT can lead to different neural responses in managing knee movements, especially for athletes with
View Article and Find Full Text PDF

Four mutants varying the length of the G and SH genes, including a G-truncated mutant (ΔG) and three G/SH-truncated mutants (ΔSH/G-1, ΔSH/G-2, and ΔSH/G-3), were generated via serially passaging the avian metapneumovirus strain SNU21004 into the cell lines Vero E6 and DF-1 and into embryonated chicken eggs. The mutant ΔG particles resembled parental virus particles except for the variance in the density of their surface projections. G and G/SH truncation significantly affected the viral replication in chickens' tracheal ring culture and in infected chickens but not in the Vero E6 cells.

View Article and Find Full Text PDF

Avian pathogenic (APEC) causes severe economic losses in the poultry industry, and O78 serogroup APEC strains are prevalent in chickens. In this study, we aimed to understand the evolutionary pathways and relationships between O78 APEC and other strains. To trace these evolutionary pathways, we classified 3101 strains into 306 subgenotypes according to the numbers and types of single nucleotide polymorphisms (RST0 to RST63-1) relative to the consensus sequence (RST0) of the RNA polymerase beta subunit gene and performed network analysis.

View Article and Find Full Text PDF

Introduction: Anterior cruciate ligament reconstruction (ACLR) is characterized by persistent involved limb functional deficits that persist for years despite rehabilitation. Previous research provides evidence of both peripheral and central nervous system adaptations following ACLR. However, no study has compared functional organization of the brain for involved limb motor control relative to the uninvolved limb and healthy controls.

View Article and Find Full Text PDF

Accurately forecasting electrical signals from three-phase Direct Torque Control (DTC) induction motors is crucial for achieving optimal motor performance and effective condition monitoring. However, the intricate nature of multiple DTC induction motors and the variability in operational conditions present significant challenges for conventional prediction methodologies. To address these obstacles, we propose an innovative solution that leverages the Fast Fourier Transform (FFT) to preprocess simulation data from electrical motors.

View Article and Find Full Text PDF

Background: To date, various genotypes of infectious bronchitis virus (IBV) have co-circulated and in Korea, GI-15 and GI-19 lineages were prevailing. The spike protein, particularly S1 subunit, is responsible for receptor binding, contains hypervariable regions and is also responsible for the emerging of novel variants.

Objective: This study aims to investigate the putative major amino acid substitutions for the variants in GI-19.

View Article and Find Full Text PDF

Context: Current lower-extremity return to sport testing primarily considers the physical status of an athlete; however, sport participation requires continuous cognitive dual-task engagement. Therefore, the purpose was to develop and evaluate the reliability of a visual-cognitive reactive (VCR) triple hop test that simulates the typical sport demand of combined online visual-cognitive processing and neuromuscular control to improve return to sport testing after lower-extremity injury.

Design: Test-retest reliability.

View Article and Find Full Text PDF

Sports-related concussions (SRCs) are associated with neuromuscular control deficits in athletes following return to play. However, the connection between SRC and potentially disrupted neural regulation of lower extremity motor control has not been investigated. The purpose of this study was to investigate brain activity and connectivity during a functional magnetic resonance imaging (fMRI) lower extremity motor control task (bilateral leg press) in female adolescent athletes with a history of SRC.

View Article and Find Full Text PDF

Memory isolation is an essential technology for safeguarding the resources of lightweight embedded systems. This technique isolates system resources by constraining the scope of the processor's accessible memory into distinct units known as domains. Despite the security offered by this approach, the Memory Protection Unit (MPU), the most common memory isolation method provided in most lightweight systems, incurs overheads during domain switching due to the privilege level intervention.

View Article and Find Full Text PDF

Background: Injury and reconstruction of anterior cruciate ligament (ACL) result in central nervous system alteration to control the muscles around the knee joint. Most individuals with ACL reconstruction (ACLR) experience kinesiophobia which can prevent them from returning to activity and is associated with negative outcomes after ACLR. However, it is unknown if kinesiophobia alters brain activity after ACL injury.

View Article and Find Full Text PDF

With the limited Internet bandwidth in a given area, unlimited data plans can create congestion because there is no retribution for transmitting many packets. The real-time pricing mechanism can inform users of their Internet consumption to limit congestion during peak hours. However, implementing real-time pricing is opex-heavy from the network provider side and requires high-integrity operations to gain consumer trust.

View Article and Find Full Text PDF

Objectives: To develop and evaluate the reliability of a new visual-cognitive medial side hop (VCMH) test that challenges physical and cognitive performance to potentially improve return to sport testing.

Design: Test-retest experimental design.

Setting: Laboratory.

View Article and Find Full Text PDF

In recent years, many methods for intrusion detection systems (IDS) have been designed and developed in the research community, which have achieved a perfect detection rate using IDS datasets. Deep neural networks (DNNs) are representative examples applied widely in IDS. However, DNN models are becoming increasingly complex in model architectures with high resource computing in hardware requirements.

View Article and Find Full Text PDF

Commodity processor architectures are releasing various instruction set extensions to support security solutions for the efficient mitigation of memory vulnerabilities. Among them, tagged memory extension (TME), such as ARM MTE and SPARC ADI, can prevent unauthorized memory access by utilizing tagged memory. However, our analysis found that TME has performance and security issues in practical use.

View Article and Find Full Text PDF

Deep neural networks (DNNs), especially those used in computer vision, are highly vulnerable to adversarial attacks, such as adversarial perturbations and adversarial patches. Adversarial patches, often considered more appropriate for a real-world attack, are attached to the target object or its surroundings to deceive the target system. However, most previous research employed adversarial patches that are conspicuous to human vision, making them easy to identify and counter.

View Article and Find Full Text PDF

In this paper, we present a high-speed, unified elliptic curve cryptography (ECC) processor for arbitrary Weierstrass curves over GF(p), which to the best of our knowledge, outperforms other similar works in terms of execution time. Our approach employs the combination of the schoolbook long and Karatsuba multiplication algorithm for the elliptic curve point multiplication (ECPM) to achieve better parallelization while retaining low complexity. In the hardware implementation, the substantial gain in speed is also contributed by our -bit pipelined Montgomery Modular Multiplier (pMMM), which is constructed from our -bit pipelined multiplier-accumulators that utilizes digital signal processor (DSP) primitives as digit multipliers.

View Article and Find Full Text PDF

Adversarial attack techniques in deep learning have been studied extensively due to its stealthiness to human eyes and potentially dangerous consequences when applied to real-life applications. However, current attack methods in black-box settings mainly employ a large number of queries for crafting their adversarial examples, hence making them very likely to be detected and responded by the target system (e.g.

View Article and Find Full Text PDF

Non-Intrusive Load Monitoring (NILM) allows load identification of appliances through a single sensor. By using NILM, users can monitor their electricity consumption, which is beneficial for energy efficiency or energy saving. In advance NILM systems, identification of appliances on/off events should be processed instantly.

View Article and Find Full Text PDF

Quantum mechanical systems with long-range interactions between quasiparticles provide a promising platform for coherent quantum information technology. Superconductors are a natural choice for solid-state based quantum devices, while magnetic impurities inside superconductors give rise to quasiparticle excitations of broken Cooper pairs that provide characteristic information about the host superconductor. Here, we reveal that magnetic impurities embedded below a superconducting La(0001) surface interact via quasiparticles extending to very large distances, up to several tens of nanometers.

View Article and Find Full Text PDF

Topological superconductors are predicted to harbor exotic boundary states-Majorana zero-energy modes-whose non-Abelian braiding statistics present a new paradigm for the realization of topological quantum computing. Using low-temperature scanning tunneling spectroscopy, here, we report on the direct real-space visualization of chiral Majorana edge states in a monolayer topological superconductor, a prototypical magnet-superconductor hybrid system composed of nanoscale Fe islands of monoatomic height on a Re(0001)-O(2 × 1) surface. In particular, we demonstrate that interface engineering by an atomically thin oxide layer is crucial for driving the hybrid system into a topologically nontrivial state as confirmed by theoretical calculations of the topological invariant, the Chern number.

View Article and Find Full Text PDF
Article Synopsis
  • The coordination between small molecules and metalloporphyrins is essential for processes like bio-oxidation and catalytic activation, with their structures studied through various techniques for decades.
  • High-resolution scanning tunneling microscopy (STM) was used to capture images of small molecules (O2, NO2, NH3) coordinated to Co-porphyrin on a gold surface, revealing distinct structural arrangements for each molecule at low temperatures.
  • The observed symmetries in the STM images were successfully matched with density functional theory (DFT) calculations, demonstrating that high-resolution techniques can effectively visualize the structures of these coordinated small molecules.
View Article and Find Full Text PDF

Realizing Majorana bound states (MBS) in condensed matter systems is a key challenge on the way toward topological quantum computing. As a promising platform, one-dimensional magnetic chains on conventional superconductors were theoretically predicted to host MBS at the chain ends. We demonstrate a novel approach to design of model-type atomic-scale systems for studying MBS using single-atom manipulation techniques.

View Article and Find Full Text PDF