{"id":116818,"date":"2019-06-05T10:12:49","date_gmt":"2019-06-05T01:12:49","guid":{"rendered":"http:\/\/175.125.95.178\/ai-in-computer\/16818\/"},"modified":"2026-04-18T22:47:54","modified_gmt":"2026-04-18T13:47:54","slug":"16818","status":"publish","type":"ai-in-computer","link":"http:\/\/ee.presscat.kr\/en\/ai-in-computer\/16818\/","title":{"rendered":"Professor Yong-Dae Kim and Professor Seungwon Shin reported in etnews on information security research using AI"},"content":{"rendered":"<p>Professor Yong-Dae Kim and Professor Seungwon Shin have been reported in etnews on information security research using AI.<\/p>\n<p>Professor Kim Yongdae&#8217;s lab has been introduced as a way to attack information security loopholes in sensors and information and communication sensors, and to study AI-based technology security thoroughly.<\/p>\n<p>Professor Seungwon Shin&#8217;s laboratory was introduced in the Dark Web to detect various types of crime and terrorism information and to develop technology to analyze the identity of information publishers.<\/p>\n<p>Link:&nbsp;<a href=\"http:\/\/www.etnews.com\/20170507000055\" rel=\"noopener\">http:\/\/www.etnews.com\/20170507000055<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>854<\/p>\n","protected":false},"featured_media":126714,"template":"","class_list":["post-116818","ai-in-computer","type-ai-in-computer","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/ai-in-computer\/116818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/ai-in-computer"}],"about":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/types\/ai-in-computer"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/media\/126714"}],"wp:attachment":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/media?parent=116818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}