eISSN : 3022-7011
ISSUER : KIPS
 
After the Korea Information Processing Society (KIPS) Transactions journal was founded in 1994, it was reorganized into the KIPS Transactions: Computer and Communication Systems(2287-5891/2734-049X ) and the KIPS Transactions: Software and Data Engi neering(2287-5905/2734-0503) in 2012. Through the KIPS official meeting on January 8th, 2024, the new KIPS Transaction journal was founded by integrating two KIPS Journals, KIPS Transactions: Computer and Communication Systems and KIPS Transactions: Software and Data Engineering. The new journal aims to realize social value and contribute to the development of South Korea’s science and technology with support from the lottery fund of the Ministry of Strategy and Finance and the science/technology promotion fund of the Ministry of Science and ICT. It is indexed in the Korea Science Academic Database, Korea Citation Index (KCI), and EBSCO.

HighlightsMore

Diffusion-based Audio-to-Visual Generation for High-Quality Bird Images

Adel Toleubekova  Joo Yong Shim  XinYu Piao  Jong-Kook Kim

Accurately identifying bird species from their vocalizations and generating corresponding bird images is still a challenging task due to limited training data and environmental noise in audio data. To address this limitation, this paper introduces a...

Bambda: A Framework for Preventing Function Invocation Condition-Based Attacks in Serverless Environments

Shin Chang Hee  Lee Seung Soo

Serverless computing is rapidly emerging as a new paradigm in cloud computing, offering automatic scalability, cost efficiency, and ease of operation. However, its two core characteristics—IAM-based privilege management and event-driven execution—ca...

PEFT Methods for Domain Adaptation

Lee You Jin  Yoon Kyung Koo  Chung Woo Dam

This study analyzed that the biggest obstacle in deploying Large Language Models (LLMs) in industrial settings is incorporating domain specificity into the models. To mitigate this issue, the study compared model performance when domain knowledge wa...

Label Differential Privacy Study for Privacy Protection in Multimodal Contrastive Learning Model

Youngseo Kim  Minseo Yu  Younghan Lee  Ho Bae

Recent advancements in multimodal deep learning have garnered significant attention from both academia and industry due to their exceptional accuracy and ability to learn rich knowledge representations. In particular, contrastive learning based appr...

Latest Publication   (Vol. 14, No. 12, Dec.  2025)

Design and Implementation of an Integrated Framework for Lifecycle Management of Cloud Resources
Junwoo Park  Jaehyeon Kim  Hyun Ahn  Sung Hyun Lee  Yeseung Lee  Choong-Hee Cho
This paper presents a lightweight framework that automates the full lifecycle of cloud resources—from creation to extension, expiration, and deletion—via a command-based interface integrated with a configuration management system. Unlike prior approaches limited to initial resource deployment automation, the proposed architecture supports intuitive lifecycle control with minimal manual intervention. The system is composed of a user portal, an automation bot server, and CSP plugins, which interact through RESTful APIs to ensure modularity and extensibility. Experimental evaluation shows that the framework achieves a 71% reduction in provisioning time compared to manual console operations and demonstrates high stability and reproducibility.
The Transactions of the Korea Information Processing Society, Vol. 14, No. 12, pp. 987-996, Dec. 2025
10.3745/TKIPS.2025.14.12.987
Cloud Automation Resource Provisioning Lifecycle Management Version Control System
Impact of Utterance Length and Augmentation on Spoofed Sppech Detection
Gyuhan Hwang  MinJe Seok  Wooseong Kim
ASVspoof 5 is the fifth edition of the ASVspoof challenge, one of the largest global audio security challenges, aiming to promote the development of Countermeasure(CM) models by distinguishing between genuine and spoofed speech. In this study, we investigate the impact of data augmentation and utterance length on spoofed speech detection(SSD) using pretrained speech models. XLSR, WavLM, and HuBERT are used as feature extractors, and a dual-branch network proposed in previous studies is also used. To evaluate robustness, five data augmentation techniques and three different utterance lengths are tested. Most augmentation methods degrade performance, while Low Frequency Mask augmentation achieves an EER of 6.36% and a min-DCF of 0.1676. Experiments on utterance length show that a 8-second duration yields the best performance. The results demonstrate that both augmentation strategies and utterance duration have a significant impact on SSD performance. These findings provide insights into the factors affecting robustness in ASVspoof 5-based spoofed speech detection.
The Transactions of the Korea Information Processing Society, Vol. 14, No. 12, pp. 997-1003, Dec. 2025
10.3745/TKIPS.2025.14.12.997
ASVspoof 5 SSD Augmentation
MLSQ: A Multimodal-based System for Learning Material Summarization and Question Generation
Geonwoo Yu  Sangyoon Lee  Jinyoung Ahn  Minha Woo  Sugyeong Kim  Jungoo Lee  Hyeonwoo Choi  Yaeran Kim  Woonghee Lee
While the proliferation of digital learning environments has increased the use of diverse multimedia materials, this often leads to passive learning. Existing text-based automatic question generation technologies are insufficient to overcome this limitation. Therefore, this study proposes an AI-based system (MLSQ) that integrates and analyzes video lectures and written materials. This system precisely fuses text data extracted via OCR and STT, along with handwriting information detected from the lecture video as a key emphasis point, based on temporal information and inputs it into a Large Language Model (LLM) to summarize learning content and automatically generate both short-answer and multiple-choice questions. Performance evaluation results showed that the proposed multimodal fusion method demonstrated improved performance over single-modal approaches, with a maximum increase of 3.4%p in BLEU score and 3.1%p in ROUGE-L score. Furthermore, in a 5-point Mean Opinion Score (MOS) user evaluation, the system demonstrated its educational practicality and effectiveness by achieving high scores above 4.0 in all categories, with ‘Speech Conversion Reliability’ and ‘Learning Suitability of Question Generation’ receiving an average of 4.33.
The Transactions of the Korea Information Processing Society, Vol. 14, No. 12, pp. 1004-1015, Dec. 2025
10.3745/TKIPS.2025.14.12.1004
Multimodal Automatic Question Generation Learning Material Summarization Large Language Model Optical Character Recognition
User Interface for Real-Time Multi-Criteria Decision Making Support
Jang Woo Young  Kim Eun Jee
This study aims to propose a user interface method to support flexible and rapid decision-making in dynamic battlefield environments where Multi-Criteria Decision Making (MCDM) is required. To this end, the study identifies limitations of the traditional decision matrix commonly used in MCDM and suggests improvements to the user interface that take into account the characteristics and limitations of human cognitive ability. These improvements include presenting information in linguistic formats and setting minimum threshold values for each criterion. The proposed approach is illustrated through a hypothetical battlefield scenario to demonstrate its effectiveness. The user interface considerations presented in this study are expected to enhance real-time decision-making by enabling more adaptable and swift responses in complex operational environments. The significance of this research lies in applying human-centered interface elements to the decision matrix, thereby offering potential improvements in real-time multi-criteria decision making support.
The Transactions of the Korea Information Processing Society, Vol. 14, No. 12, pp. 1016-1021, Dec. 2025
10.3745/TKIPS.2025.14.12.1016
Multi-criteria decision making Decision Matrix User Interface Cognitive Load
DF-LogGraph: An Explainable GraphRAG-Based Framework for Digital Forensic Log Analysis
Jeong In Lee  Moohong Min
In digital forensics, logs serve as critical evidence for reconstructing the timing of incidents and the activities of actors. Previous studies have mainly focused on anomaly detection or single-event explanations, without extending toward actor-centric timeline reconstruction or legally admissible explainable analyses that preserve temporal continuity and session context. To address these limitations, we propose DF-LogGraph, a framework that normalizes logs into Actor, Action, Target, Time, and Session slots, and transforms them into a log-graph to enable structured narrative modeling. In the query stage, DF-LogGraph applies GraphRAG with temporal and session constraints to selectively retrieve relevant sessions and subgraphs. In the generation stage, it enforces line ID/session citations, Minimal Sufficient Evidence Sets (MSES), and counterfactual validation to mitigate hallucinations and logical contradictions. Experiments on the LogHub–HDFS and UNSW-NB15 datasets show that DF-LogGraph consistently outperforms BM25 (keyword-based) and a Hybrid baseline (BM25 ∪ TF-IDF) in terms of Evidence F1@10 and Session Accuracy@10, while maintaining practical mean latency for interactive analysis. Moreover, it improves evidence coverage, reduces hallucination rates, and ensures causal consistency through counterfactual validation. These results demonstrate that DF-LogGraph goes beyond improving retrieval accuracy: it enhances actor-centric timeline reconstruction, reinforces session and temporal coherence, and ensures explainability with legal reliability positioning itself as a next-generation framework for digital forensic log analysis.
The Transactions of the Korea Information Processing Society, Vol. 14, No. 12, pp. 1022-1029, Dec. 2025
10.3745/TKIPS.2025.14.12.1022
Digital Forensics RAG LLM log analysis XAI
A Study on Authentication Methods for Shared-access Devices Based on the Matter Standard
Ran Kyung Kim  Min Ah You  Min Seok Kim  Jae Beom Lee  Dong-Young Yoo
With the convenience and security provided by the Matter standard, many companies have recently developed appliances based on this standard. The Matter standard employs security mechanisms such as network and user authentication, OTA authentication, and session-based control, which allow only authenticated users to access devices. However, in environments such as hotels or shared offices, requiring all users to undergo prior authentication is cumbersome and procedurally complex. In this paper, we propose a temporary token authentication method that enables smart home devices to be controlled without prior authentication by issuing short-term tokens. The proposed method grants a check-in token via QR code at check-in, immediately revokes the token at check-out, and, if necessary, issues a refresh token to restrict IoT device control privileges within a limited time period. An application was developed to register the Tapo L535E bulb via QR code and control its power and color, demonstrating that Matter-based devices can be remotely controlled.
The Transactions of the Korea Information Processing Society, Vol. 14, No. 12, pp. 1030-1036, Dec. 2025
10.3745/TKIPS.2025.14.12.1030
Matter Standard Token-Based Authentication Device Authentication Time-Limited Access Control
A Method for Classifying Users based on Their Capacitive Touchscreen Usage Characteristics
Hohyeon Lim  Seyoung Lee
Modern computing environments are evolving from personal devices such as traditional PCs and smartphones to devices used by a broad, unspecified user base such as Internet-of-Things and embedded devices. These devices employ touchscreens and touchpads to interact with users and simultaneously display information. Because they are used by many different people and often have limited resources, such devices typically rely only on simple authentication methods like passwords or PINs. However, such simple methods not only fail to meet the security requirements of modern Internet environments but also serve as an attack surface. This study demonstrates that users can be classified by the physical characteristics of touchscreens and by users’ behavioral traits, and proposes a secondary authentication method that performs dynamic user authentication based on that classification.
The Transactions of the Korea Information Processing Society, Vol. 14, No. 12, pp. 1037-1043, Dec. 2025
10.3745/TKIPS.2025.14.12.1037
Multi-Factor Authentication Security IoT/Embeded System Usable Security biometrics
A Study on the Blocking of Malicious Behavior of Generative AI Input Prompts Using Small Language Model Module
Mun Jong In  Ryu Dong Hoon  Dong-Young Yoo
Large language models (LLMs) are useful for search, coding, and agentic workflows, but because input prompts directly control their behavior, they are vulnerable to prompt injection (direct and indirect), jailbreaks, format/Unicode evasion, resource exhaustion, and misuse of tools/plugins. We propose a pre-inference prompt model that filters and blocks risks before any model call by combining a lightweight global classifier with threat-specific small language model (SLM) modules, routing by calibrated confidence and policy mapping, and removing format evasions through preprocessing such as Unicode normalization/decoding and suffix sanitization. Our evaluation on public benchmarks and real-world scenarios reports block-failure rate, over-blocking rate, latency and cost, calibration error, and domain-related metrics. We also present integration with multi-agent defenses and post-hoc moderation, along with a deployment guide grounded in least-privilege, provenance verification, and isolation principles.
The Transactions of the Korea Information Processing Society, Vol. 14, No. 12, pp. 1044-1050, Dec. 2025
10.3745/TKIPS.2025.14.12.1044
Prompt Injection Pre-Inference Small Language Model (SLM) Guardrails
Towards Automated Vulnerability Analysis in ARM-based Virtualization
Dongha Lee  Gyujeong Jin  Geonha Lee  Daehyeon Ko  Jaewon Yang  Hyungyu Oh
This study systematically analyzes the attack surface of ARM-based virtualization in comparison with x86 and proposes a methodology for identifying ARM-specific vulnerabilities. The methodology comprises three stages—extraction of address-translation, coverage-guided fuzzing, and multi-layered detection. In particular, provides reproducible instrumentation procedures and a cross-validation framework for low-level mechanisms such as NV and the TLB, enabling practitioners to rapidly detect and confirm issues in ARM environments. Applied to KVM/arm64, the methodology revealed and reproduced two concrete vulnerabilities: an ASID matching error and a TLB invalidation-range calculation error. We addressed both with small patches and validated the fixes using the proposed observation procedure, demonstrating a practical approach to vulnerability analysis in ARM virtualization.
The Transactions of the Korea Information Processing Society, Vol. 14, No. 12, pp. 1051-1057, Dec. 2025
10.3745/TKIPS.2025.14.12.1051
ARM Virtualization Nested Virtualization vulnerability Analysis Fuzzing
A Text Mining Analysis of Research on WTO Disputes
Jang Seo Jun  Kim Kyung Yeul  Kim Ji Hie
As the scope of trade disputes expands into various areas such as digital and security issues, the need for a more systematic analysis of research topics and trends has increased. However, there is a lack of quantitative analyses on trade dispute-related research topics and trends in domestic studies. This study aims to analyze the major research themes and trends in WTO (World Trade Organization) disputes using text mining techniques. Specifically, TF-IDF, Word2Vec, and keyword network analysis are employed. The results indicate that domestic research on WTO disputes has expanded from traditional trade conflict topics to include normative conflicts related to digital and security issues. Moreover, the research tends to focus on country-specific characteristics and event-driven analyses. The findings of this study offer analytical insights into the research trends and key themes in the field of trade disputes, thereby contributing to future research.
The Transactions of the Korea Information Processing Society, Vol. 14, No. 12, pp. 1058-1064, Dec. 2025
10.3745/TKIPS.2025.14.12.1058
Text Mining WTO Disputes TF-IDF Word2vec keyword network Research Trends
Design and Usability Evaluation of User-Friendly Security Tools
Ju Hye Lee  Yoo Jin Lee  Mi So Yang  Sungwook Kim
With the rapid proliferation of Internet of Things (IoT) devices, convenience in daily life has increased, but so have various security threats. However, most existing security tools are designed for experts, making them difficult for general users to understand and utilize. This study aims to design and develop a user-friendly IoT security interface, “Jikeobom,” that enables non-expert users to easily engage in protective actions, and to empirically verify its effectiveness. Screenshots of existing tools (e.g., Windows Defender, Nmap) and the proposed interface were presented to participants, who evaluated perceived usability (PU), actionability (AC), trust (TR), intention to use (IU), and cognitive load (CL). A total of 34 non-expert participants took part in the study. The results showed that the proposed interface achieved significantly higher scores than conventional tools in PU, AC, and IU (p < .001, d > 1.2). TR also showed a moderate level of improvement (d = 0.56), while CL showed no significant difference. Qualitative feedback indicated that intuitive explanations and guidance messages reduced hesitation and encouraged immediate protective behaviors. These results empirically demonstrate that usability-centered design of security interfaces can promote adoption and protective behavior among non-expert users, providing practical implications for the design of user-friendly security interfaces in IoT environments.
The Transactions of the Korea Information Processing Society, Vol. 14, No. 12, pp. 1065-1072, Dec. 2025
10.3745/TKIPS.2025.14.12.1065
Manuscript IoT Usable Security User-Friendly Design Non-Expert Users user study
Real-time 3D Projection Map Interaction based on Dynamic Object Tracking
Kim Hang Kee  Kim Ki Hong  Baek Nak Hoon
In this paper, we propose a projection mapping-based interactive system that projects images onto the surface of moving objects in real time and controls 3D content. Projection mapping in dynamic scenes suffers from system latency due to the recognition of moving surfaces and subsequent projection. The proposed technique compensates for distortion through depth camera-projector calibration and addresses the latency issue through a Kalman filter and hysteresis-based double-edge technique. The proposed technique compensates for distortion through depth camera-projector compensation and tracks object movement, shifting images from the background to the foreground, and altering animation and content flow based on object movement. Projection latency was measured in tens of milliseconds, and intuitive interaction and high immersion were demonstrated through the "Magic Cube" demonstration content.
The Transactions of the Korea Information Processing Society, Vol. 14, No. 12, pp. 1073-1083, Dec. 2025
10.3745/TKIPS.2025.14.12.1073
Spatial Augmented Reality Dynamic Projection Mapping Human-Computer Interaction Projector-Camera System
Efficient Graph Convolutional Networks Update for Expanded Single Large Graph
Song Jee Yeon  Lee Ki Yong
Graph Neural Networks(GNNs) are typically trained on static graphs whose structures remain unchanged. However in real-world scenarios, graphs expand as new nodes and edges are added, requiring the model to be retrained on the entire graph to reflect these updates. The fine-tuning method, often used to mitigate the inefficiency of full retraining, also faces limitations when applied to GNNs; due to the message passing mechanism, improvements in computational efficiency are restricted, and the performance on original nodes often declines. To address these challenges, this paper proposes an efficient Graph Convolutional Networks(GCN) update for expanded single large graphs. The proposed method maximizes computational efficiency by decomposing the message passing operation into two components: pre-computed information from the pre-training and newly required computations. Furthermore it alleviates performance degradation on original nodes, a problem by setting all nodes in the expanded graph as the training target. Experimental results on real-world datasets demonstrate that our proposed method significantly reduces training time compared to full retraining and fine-tuning, while maintaining a performance level comparable to that of full retraining.
The Transactions of the Korea Information Processing Society, Vol. 14, No. 12, pp. 1084-1090, Dec. 2025
10.3745/TKIPS.2025.14.12.1084
Graph Neural Networks Expanded Single Large Graph Fine-Tuning
Build Automation Framework for RTEMS Custom Schedulers
Taehan Kim  Seongmin Park  Geumsook Heo  Joonhyouk Jang
RTEMS (Real-Time Executive for Multiprocessor Systems) provides a flexible kernel structure that supports user-defined scheduler integration. Since version 6.1, the transition to the Waf build system has made this integration process more complex, requiring manual edits to multiple configuration files and causing frequent build errors. To overcome these challenges, we propose the RTEMS Custom Scheduler Framework, which automates code template generation, configuration file registration, and kernel build execution. This reduces the integration process from 4–5 manual steps to a single GUI-based step, enabling developers to focus solely on scheduling logic. Experimental results with priority, simple, and EDF schedulers achieved a 100% success rate, demonstrating improved efficiency, stability, and usability in real-time kernel extension development.
The Transactions of the Korea Information Processing Society, Vol. 14, No. 12, pp. 1091-1096, Dec. 2025
10.3745/TKIPS.2025.14.12.1091
RTEMS Custom Scheduler Build Automation Waf Build System
Deep Learning-Based Non-Linear Prediction of Remaining Useful Life of Aircraft Engines
Min-Jung Kim  Kang-Won Lee
The prediction of the remaining useful life (RUL) of aircraft turbofan engines is a critical task in prognostics and health management (PHM), as it enables the early detection of component degradation, the optimization of maintenance schedules, and the prevention of safety incidents. Recent deep learning–based RUL prediction studies have made significant progress. However, most efforts have focused on improving model architectures, while relatively little attention has been paid to the design of RUL labeling functions. This study proposes a novel approach that preserves the existing pre-training structure used in recent research while replacing the target RUL labeling function with a non-linear concave function that more accurately reflects actual degradation patterns. Using the NASA C-MAPSS (Commercial Modular Aero-Propulsion System Simulation) dataset, we evaluate a CAE (convolutional autoencoder)–RNN-based prediction model under various parameter settings and demonstrate that the proposed non-linear labeling model improves prediction accuracy in terms of RMSE (root mean squared error) and simultaneously enhances the NASA S-score safety metric compared to the conventional piecewise-linear model.
The Transactions of the Korea Information Processing Society, Vol. 14, No. 12, pp. 1097-1104, Dec. 2025
10.3745/TKIPS.2025.14.12.1097
Remaining useful life prediction Prognostics and Health Management (PHM) Deep Learning Aircraft Turbofan Engines C-MAPSS Dataset