eISSN : 3022-7011
ISSUER : KIPS
ISSUER : KIPS
After the Korea Information Processing Society (KIPS) Transactions journal was founded in 1994, it was reorganized into the KIPS Transactions: Computer and Communication Systems(2287-5891/2734-049X ) and the KIPS Transactions: Software and Data Engi neering(2287-5905/2734-0503) in 2012. Through the KIPS official meeting on January 8th, 2024, the new KIPS Transaction journal was founded by integrating two KIPS Journals, KIPS Transactions: Computer and Communication Systems and KIPS Transactions: Software and Data Engineering. The new journal aims to realize social value and contribute to the development of South Korea’s science and technology with support from the lottery fund of the Ministry of Strategy and Finance and the science/technology promotion fund of the Ministry of Science and ICT. It is indexed in the Korea Science Academic Database, Korea Citation Index (KCI), and EBSCO.
HighlightsMore
Diffusion-based Audio-to-Visual Generation for High-Quality Bird ImagesAdel Toleubekova Joo Yong Shim XinYu Piao Jong-Kook Kim |
|
Accurately identifying bird species from their vocalizations and generating corresponding bird images is still a challenging task due to limited training data and environmental noise in audio data. To address this limitation, this paper introduces a... | |
Bambda: A Framework for Preventing Function Invocation Condition-Based Attacks in Serverless EnvironmentsShin Chang Hee Lee Seung Soo |
|
Serverless computing is rapidly emerging as a new paradigm in cloud computing, offering automatic scalability, cost efficiency, and ease of operation. However, its two core characteristics—IAM-based privilege management and event-driven execution—ca... | |
PEFT Methods for Domain AdaptationLee You Jin Yoon Kyung Koo Chung Woo Dam |
|
This study analyzed that the biggest obstacle in deploying Large Language Models (LLMs) in industrial settings is incorporating domain specificity into the models. To mitigate this issue, the study compared model performance when domain knowledge wa... | |
Label Differential Privacy Study for Privacy Protection in Multimodal Contrastive Learning ModelYoungseo Kim Minseo Yu Younghan Lee Ho Bae |
|
Recent advancements in multimodal deep learning have garnered significant attention from both academia and industry due to their exceptional accuracy and ability to learn rich knowledge representations. In particular, contrastive learning based appr... | |
Latest Publication (Vol. 14, No. 9, Sep. 2025)
Windows Malware Family Dataset Construction and Classification
Kim Tae Young Doo Seop Choi Eul Gyu Im
https://doi.org/10.3745/TKIPS.2025.14.9.651
Windows Malware Family Classification Dataset Construction Static and Dynamic analysis Hybrid Approach
Malware family classification is a critical task for enhancing the efficiency of threat analysis and enabling rapid response strategies.
However, accurate classification remains challenging due to behavioral similarities among different families and the ambiguous boundaries
between variants. Moreover, most previous studies rely on outdated datasets, limiting their ability to reflect the latest trends in malware.
To address these issues, this study constructs a new dataset of 3,357 Windows malware samples collected in 2024, with high label reliability
ensured through cross-verification. Using this dataset, we applied a hybrid feature approach that combines static and dynamic features
to a Random Forest model, achieving a maximum classification accuracy of 92.14%. An analysis of misclassified samples revealed that
classification errors were often caused by shared API call sequences among certain malware families, leading to confusion, or by premature
termination of malware execution, which hindered the collection of sufficient dynamic information.
Based on these findings, we suggest the need for more sophisticated behavior-based feature extraction and improvements to the dynamic
analysis environment to prevent early termination. This study is expected to make a practical contribution to enhancing the accuracy
and reliability of future malware detection systems.
The Transactions of the Korea Information Processing Society,
Vol. 14, No. 9, pp. 651-661,
Sep.
2025

Windows Malware Family Classification Dataset Construction Static and Dynamic analysis Hybrid Approach
Machine Learning-Based Cooperative Detection Method for Effectively Mitigating Availability Attacks in Wireless Network Environments
Min-Ji Cho So-Eun Jeon Il-Gu Lee
https://doi.org/10.3745/TKIPS.2025.14.9.662
Wireless network security IoT security Cooperative detection Machine learning. Availability attack
With the rapid increase in the number of Internet of Things (IoT) devices such as smartphones, wearables, and smart appliances, data
transmission over wireless networks has significantly grown. Consequently, availability attacks targeting wireless networks—such as jamming,
flooding, blackhole, and grayhole attacks—are also rising. Conventional attack detection methods rely on statistical indicators such as packet
delivery rate, received signal strength, and timestamps. However, these approaches depend heavily on resource-constrained IoT devices,
resulting in low detection accuracy and degradation of overall network performance. Recently, machine learning-based local detection methods
have been explored, but their high computational complexity makes them unsuitable for deployment on lightweight devices. This paper
proposes a cooperative detection framework that distributes machine learning-based training and detection tasks between resource-rich access
points (APs) and lightweight IoT devices. Experimental results show that the proposed model improves detection accuracy by an average
of 38% and data transmission success rate by 17.75% compared to conventional local learning-based detection models.
The Transactions of the Korea Information Processing Society,
Vol. 14, No. 9, pp. 662-667,
Sep.
2025

Wireless network security IoT security Cooperative detection Machine learning. Availability attack
Improving Object Detection via Lightweight Cross-Attention-based Semantic Alignment
Hyungseop Lee Jiho Lee Woochul Kang
https://doi.org/10.3745/TKIPS.2025.14.9.668
Deep Learning Object Detection Multi-scale feature fusion Cross-attention Real-Time Inference
Accurate detection of objects with varying scales requires effective multi-scale feature representation learning. To this end, most modern
object detectors adopt Feature Pyramid Network (FPN)-based feature fusion strategies. However, due to differences in semantic granularity
and information content across feature levels, direct fusion often results in semantic misalignment, leading to increased false positives
and limited detection performance. In this paper, we propose a lightweight cross-attention-based semantic alignment module that aligns
adjacent feature levels prior to fusion. The module leverages semantically weak low-level features as queries and semantically rich high-level
features as keys and values, enabling effective modeling of inter-level semantic relationships. To ensure computational efficiency and
real-time applicability, the sequence length is constrained based on the lowest-resolution feature map. We integrate the proposed module
into both conventional and real-time object detectors and evaluate it on the MS COCO and PASCAL VOC datasets. Experimental results
demonstrate consistent improvements in AP and AP50 metrics, validating the effectiveness and generality of our approach.
The Transactions of the Korea Information Processing Society,
Vol. 14, No. 9, pp. 668-676,
Sep.
2025

Deep Learning Object Detection Multi-scale feature fusion Cross-attention Real-Time Inference
TokenROC: A ROC-Based Evaluation Method for XAI Techniques in Software Vulnerability Token Detection
Jaehong Kim Sebeom Cheon Sungmin Han Sangkyun Lee
https://doi.org/10.3745/TKIPS.2025.14.9.677
Software Vulnerability Detection Vulnerable Token Identification Explainable Artificial Intelligence
Recently, deep learning-based models have advanced automated software vulnerability detection. However, most provide only coarse
information, such as vulnerability presence or affected code lines, and cannot precisely identify the actual vulnerable tokens. To address
this, explainable artificial intelligence (XAI) techniques have been applied to generate token-level explanations. Yet, systematic methods
for quantitatively evaluating their accuracy remain lacking. This paper proposes TokenROC, a framework that measures how accurately
XAI methods detect security-critical tokens. It compares attribution maps with ground-truth labels and evaluates performance using ROC
curves and AUC scores. We apply TokenROC to VulBERTa and VulDeBERT using four XAI methods: TIS, AttCAT, Rollout, and Grad-SAM.
Results are also compared with the performance of the StagedVulBERT model. Experiments show that XAI methods can meaningfully
identify vulnerable tokens. TokenROC offers a practical framework for evaluating and improving explainability-driven vulnerability analysis.
The Transactions of the Korea Information Processing Society,
Vol. 14, No. 9, pp. 677-686,
Sep.
2025

Software Vulnerability Detection Vulnerable Token Identification Explainable Artificial Intelligence
A Study on Optimizing Korean Performance of Quantized Multilingual LLMs through Language-Specific Neuron Preservation
Jaeyoung Lee Jin Young Choi
https://doi.org/10.3745/TKIPS.2025.14.9.687
LLM quantization Artificial intelligence Natural Language Processing
Quantization of large language models (LLMs) is an effective technique for reducing model size and computational overhead. However,
most existing methods are designed with an English-centric perspective, which leads to performance degradation in non-English languages.
To address this limitation, this study proposes an improved quantization approach that enhances the AWQ framework by identifying
Korean-specific neurons using the Language Activation Probability Entropy (LAPE) metric and preserving their weights during quantization.
Furthermore, we introduce an optimization strategy that focuses the analysis on deeper layers where language-specific activation patterns
tend to emerge, thereby improving both computational efficiency and model performance. Ex perimental results demonstrate that the
proposed method significantly improves Korean performance by up to 17.9% on the Llama-3.2-3B-Instruct model, while keeping the
model size virtually unchanged.
The Transactions of the Korea Information Processing Society,
Vol. 14, No. 9, pp. 687-694,
Sep.
2025

LLM quantization Artificial intelligence Natural Language Processing
Generative AI-based Explainable Personalized Hybrid Skincare Recommendation System
Jin Hui Jeong Seo Young Kim Seon Ho Choi Hyon Hee Kim
https://doi.org/10.3745/TKIPS.2025.14.9.695
Generative AI prompt engineering hybrid recommendation system Collaborative Filtering Content-based Filtering Explainable Recommendation Personalized Recommendation
Recently, in the cosmetics market, there is a remarkable trend of smart consumption in which consumers directly compare and analyze
products suitable for their skin characteristics. However, due to the difficulty of interpreting ingredients and the limitations of information,
consumers need reliable customized product recommendations and intuitive descriptions of products in the purchasing decision-making
process. Therefore, this study designed and implemented a hybrid AI recommendation system that combines item-based collaborative
filtering and content-based filtering by utilizing the user’s purchase history, rating pattern, product review, and ingredient information.
In addition, by combining Generative AI, the system generates ingredient-based reason for recommendations, review-based keywords,
and product advertisement images, thereby enhancing the explainability of recommendation results and ensuring user satisfaction. Our
results showed that the proposed hybrid recommendation system achieved about 19% improvement in MAP@8(0.5199) over the conventional
single filtering model and exhibiting notable advantages in both precision and explainability of recommendation. This study is expected
to contribute to advancement of personalized services, the strengthening of platform competitiveness, and the improvement of purchase
conversion rates in future digital commerce environments
The Transactions of the Korea Information Processing Society,
Vol. 14, No. 9, pp. 695-703,
Sep.
2025

Generative AI prompt engineering hybrid recommendation system Collaborative Filtering Content-based Filtering Explainable Recommendation Personalized Recommendation
xDBTune: eXplainable Database Tuning Framework
Okjoo Choi Wonsun Shin
https://doi.org/10.3745/TKIPS.2025.14.9.704
database database management system DB Tuning XAI(Explainable AI) SHAP
Database systems serve as critical infrastructure for efficiently processing large-scale data across various industries such as finance and
manufacturing. However, as data complexity increases and query workloads become more diverse, database performance optimization has
emerged as an essential task to ensure system stability and service quality. Recently, with the advancement of artificial intelligence, machine
learning–based automated database tuning techniques have been proposed as alternatives. Nevertheless, most existing approaches rely on
black-box models, leading to a fundamental limitation in the interpretability of tuning results. To address this issue, this study proposes xDBTune,
a database tuning framework that integrates explainable artificial intelligence (XAI) techniques. xDBTune automatically recommends optimized
tuning parameter configurations based on machine learning–based performance prediction, and employs the SHAP (Shapley Additive
Explanations) algorithm to visually and quantitatively explain the impact of each parameter on performance. This enables both DBAs and
general users to clearly understand and verify the tuning results with confidence. The proposed framework was evaluated using the TPC-H
benchmark dataset in a MySQL environment. Experimental results show that the recommended tuning configuration reduced the average query
execution time by approximately 22.2% compared to the default setting. Furthermore, SHAP-based visualizations effectively conveyed the
contribution of each tuning parameter, demonstrating the framework’s ability to improve both interpretability and user trust in database tuning.
The Transactions of the Korea Information Processing Society,
Vol. 14, No. 9, pp. 704-712,
Sep.
2025

database database management system DB Tuning XAI(Explainable AI) SHAP
Sex-Specific Prompt Engineering for OSA Severity Classification Using Large Language Models
Seungyeon Ryu Hyeon Jin Kim Younghan Lee
https://doi.org/10.3745/TKIPS.2025.14.9.713
Obstructive Sleep Apnea (OSA) prompt engineering Chain-of-Thought Prompting Large Language Model
Obstructive Sleep Apnea (OSA) is a prevalent but underdiagnosed sleep disorder associated with serious health risks. Although
polysomnography (PSG) is the diagnostic gold standard, its cost and clinical burden limit scalability. This study explores the use of Large
Language Models (LLMs), particularly the lightweight GPT-4o-mini, to classify OSA severity (Normal, Moderate, Severe) based solely on
non-invasive demographic and sleep questionnaire data, without access to PSG features. We develop a prompt engineering pipeline that
incorporates sex-specific feature importance extracted from Random Forest classifiers to design three types of prompts: Basic, Role-Based,
and Chain-of-Thought (CoT). Experimental results show that Chain-of-Thought (CoT) prompts with feature emphasis tailored to male
and female subgroups achieve F1 scores of up to 0.60–0.62, outperforming non-sex-specific (generic) prompts and matching the
performance of Random Forest baselines. These findings highlight the effectiveness of sex-aware, few-shot prompting in improving
diagnostic performance. Our results suggest that prompt-based LLMs can serve as interpretable, low-resource alternatives to traditional
supervised models, with potential for scalable and equitable OSA screening.
The Transactions of the Korea Information Processing Society,
Vol. 14, No. 9, pp. 713-721,
Sep.
2025

Obstructive Sleep Apnea (OSA) prompt engineering Chain-of-Thought Prompting Large Language Model
Fast Booting for BMC
Kyung Eun Oh Ji Man Hong
https://doi.org/10.3745/TKIPS.2025.14.9.722
Baseboard Management Controller Embedded Linux Kernel Optimization Hibernation
BMC is an essential embedded system responsible for remote
management and monitoring of servers and data centers, where
improved boot speed is crucial for rapid recovery. This paper analyzes
bottlenecks in the booting process of conventional BMC operating
systems and proposes optimizations through kernel light-weighting,
bootloader optimization, and hibernation-based boot techniques.
Additionally, it compares the performance of compression methods,
applies the optimal scheme, and verifies it experimentally. A
comparative analysis between the optimized system and the
conventional system demonstrates a significant reduction in boot time.
Through the proposed Fast Booting technique, this paper improves the
boot performance of BMC systems and further enhances system
availability by reducing maintenance and recovery time.
The Transactions of the Korea Information Processing Society,
Vol. 14, No. 9, pp. 722-724,
Sep.
2025

Baseboard Management Controller Embedded Linux Kernel Optimization Hibernation
Scheduling Performance Analysis of SMP-based RTEMS
Jeon Hyeon Soo Park Jun Yong Kim Hyeong Ho Jang Joon Hyouk Jung Jin Man
https://doi.org/10.3745/TKIPS.2025.14.9.725
RTEMS RTOS SMP Scheduling Scheduling Performance Analysis
With the proliferation of multi-core embedded systems, the SMP scheduling policy of real-time operating systems significantly impacts
system performance. In high-reliability environments such as aerospace and defense, it is essential to optimize scheduling configurations
under limited hardware resources. While previous studies have discussed the general characteristics of Global and Partitioned Queues,
detailed performance comparisons remain insufficient. This study simulates the GR740 architecture using SIS and compares the
performance of the two scheduling approaches in the RTEMS environment. The experimental setup uses a 4-core SMP architecture, where
the operating system recognizes each core as an independent CPU for scheduling. The results show that for cache-friendly tasks, the
Partitioned Queue demonstrates superior performance due to better cache locality, whereas for CPU-bound tasks that require load
balancing, the Global Queue performs better. These findings can serve as a guideline for selecting appropriate scheduling strategies in
SMP-based RTEMS systems according to application requirements.
The Transactions of the Korea Information Processing Society,
Vol. 14, No. 9, pp. 725-731,
Sep.
2025

RTEMS RTOS SMP Scheduling Scheduling Performance Analysis