eISSN : 3022-7011
ISSUER : KIPS
ISSUER : KIPS
After the Korea Information Processing Society (KIPS) Transactions journal was founded in 1994, it was reorganized into the KIPS Transactions: Computer and Communication Systems(2287-5891/2734-049X ) and the KIPS Transactions: Software and Data Engi neering(2287-5905/2734-0503) in 2012. Through the KIPS official meeting on January 8th, 2024, the new KIPS Transaction journal was founded by integrating two KIPS Journals, KIPS Transactions: Computer and Communication Systems and KIPS Transactions: Software and Data Engineering. The new journal aims to realize social value and contribute to the development of South Korea’s science and technology with support from the lottery fund of the Ministry of Strategy and Finance and the science/technology promotion fund of the Ministry of Science and ICT. It is indexed in the Korea Science Academic Database, Korea Citation Index (KCI), and EBSCO.
HighlightsMore
Diffusion-based Audio-to-Visual Generation for High-Quality Bird ImagesAdel Toleubekova Joo Yong Shim XinYu Piao Jong-Kook Kim |
|
Accurately identifying bird species from their vocalizations and generating corresponding bird images is still a challenging task due to limited training data and environmental noise in audio data. To address this limitation, this paper introduces a... | |
Bambda: A Framework for Preventing Function Invocation Condition-Based Attacks in Serverless EnvironmentsShin Chang Hee Lee Seung Soo |
|
Serverless computing is rapidly emerging as a new paradigm in cloud computing, offering automatic scalability, cost efficiency, and ease of operation. However, its two core characteristics—IAM-based privilege management and event-driven execution—ca... | |
PEFT Methods for Domain AdaptationLee You Jin Yoon Kyung Koo Chung Woo Dam |
|
This study analyzed that the biggest obstacle in deploying Large Language Models (LLMs) in industrial settings is incorporating domain specificity into the models. To mitigate this issue, the study compared model performance when domain knowledge wa... | |
Label Differential Privacy Study for Privacy Protection in Multimodal Contrastive Learning ModelYoungseo Kim Minseo Yu Younghan Lee Ho Bae |
|
Recent advancements in multimodal deep learning have garnered significant attention from both academia and industry due to their exceptional accuracy and ability to learn rich knowledge representations. In particular, contrastive learning based appr... | |
Latest Publication (Vol. 14, No. 8, Aug. 2025)
Research on Exploiting Browser Use-After-Free Bugs Triggered by User Interaction
Youngjoo Lee Byoungyoung Lee
https://doi.org/10.3745/TKIPS.2025.14.8.569
Web Browser User Interface Vulnerability Attack
This study demonstrates that browser UI (User Interface) bugs triggered by user interactions can pose a security threat and introduces
a method to exploit them to attack the main browser process. Web browsers are essential software used by hundreds of millions, and
vulnerabilities in them can lead to large-scale security incidents if exploited. While UI bugs have traditionally been regarded as minor
usability issues with lower patch priority, this study designs an attack scenario that leverages memory corruption vulnerabilities, such
as Use-After-Free (UAF), caused by UI bugs to manipulate browser execution flow and conducts experiments using actual vulnerabilities.
Through this, the study aims to raise awareness of the security risks posed by UI bugs in browsers and highlight the necessity of addressing
such vulnerabilities
The Transactions of the Korea Information Processing Society,
Vol. 14, No. 8, pp. 569-575,
Aug.
2025

Web Browser User Interface Vulnerability Attack
A Comparative Study of Feature Importance Algorithms and Feature Selection for Static Feature-Based Ransomware Detection
Jeon Hye Min Choi Doo Seop Im Eul Gyu
https://doi.org/10.3745/TKIPS.2025.14.8.576
Ransomware feature importance Static Feature Machine Learning
In this paper, we extract 54 static features from ransomware PE files—including header metadata, section sizes, and virtual memory
sizes—and evaluate their importance using four algorithms: Gain Ratio, Information Gain, Gini Importance, and Mutual Information. For
each algorithm, we select the top-K features to form a reduced feature set, which is then used to train and validate four classification
models: Random Forest, Decision Tree, Support Vector Machine, and Multi-Layer Perceptron. Experimental results show that the Random
Forest model, using 41 features selected by a Gain Ratio threshold of K = 0.01, achieves the highest accuracy of 99.33%. The Decision
Tree, SVM, and MLP models also demonstrate strong performance with accuracies of 98.67%, 96.67%, and 98.75%, respectively. These
findings confirm that careful feature selection can substantially reduce computational costs while maintaining high detection accuracy
The Transactions of the Korea Information Processing Society,
Vol. 14, No. 8, pp. 576-587,
Aug.
2025

Ransomware feature importance Static Feature Machine Learning
Design and Implementation of A Laundry Folding Automation System Based on Deep Learning
Kim Eun Sun Son Jin-Gon
https://doi.org/10.3745/TKIPS.2025.14.8.588
clothing recognition CNN Fashion MNIST Automation Smart Home
This study designed an automated system to improve household labor efficiency by automating clothing recognition and folding tasks. A CNN model was trained on the Fashion MNIST dataset to classify tops, and an OV7670 camera sensor was used to recognize clothing. Based on the classification results, the folding points were predicted, and an algorithm was implemented to automate the folding process. The study found that the CNN model effectively classified the clothing, and the folding algorithm successfully performed tasks according to preset rules. These findings suggest that integrating computer vision and automation can significantly reduce household labor, providing a foundation for future smart home applications.
The Transactions of the Korea Information Processing Society,
Vol. 14, No. 8, pp. 588-594,
Aug.
2025

clothing recognition CNN Fashion MNIST Automation Smart Home
Intrusion Detection-Based Access Control Algorithm for PostgreSQL Based on Front-End Back-End Protocols
Seong-Hoon Jwa Seung-Hee Kim
https://doi.org/10.3745/TKIPS.2025.14.8.595
Database access control FEBE Protocol Analysis intrusion detection system (IDS) PostgreSQL Security
This study explores the feasibility of implementing a database (DB) access control solution by analyzing the PostgreSQL
Front-End/Back-End (FEBE) protocol. To this end, algorithms were designed to extract session metadata and SQL text from startup, query,
and parse packets. These algorithms enable control over user and database access, as well as SQL commands, including DML, DDL, and
DCL types. The extraction process was validated using Apache JMeter, simulating concurrent SQL sessions. Results showed 100% accuracy
across 100 session tests and 200 SQL executions.Unlike conventional PostgreSQL DB security tools focused on auditing and logging, the
proposed method emphasizes real-time detection and protocol-level analysis. It allows for session-aware filtering, SQL pattern-based
control, and fine-grained object-level restriction. The study demonstrates that protocol-layer information can serve as a viable foundation
for developing PostgreSQL security solutions. Furthermore, this approach shows potential for extending to other open-source DBMSs,
enhancing the scope and applicability of protocol-based security mechanisms.
The Transactions of the Korea Information Processing Society,
Vol. 14, No. 8, pp. 595-607,
Aug.
2025

Database access control FEBE Protocol Analysis intrusion detection system (IDS) PostgreSQL Security
Persona-based One-shot MBTI Prompt Engineering
Yongjae Lee Youngmin Ji Yunsick Sung
https://doi.org/10.3745/TKIPS.2025.14.8.608
One-shot Prompt MBTI Persona prompt engineering
Recently, large-scale language models are utilized in the diverse kinds of domains. However, It is still required to overcome the
limitations of conventional generic and neutral response styles of a conversational agent as well as large-scale language models that are
biased toward specific MBTI types. This paper proposes a dialogue generation technique that effectively reflects a conversational agent’s
MBTI-based personality traits to provide personalized responses to users. This paper designs a system that conveys an agent’s personality
traits with only few prompt examples by utilizing one-shot prompt engineering technique. The proposed system is composed of learning
and inference phases; during the learning phase, the agent’s dialogues are evaluated and calibrated to ensure consistency with the agent’s
persona and MBTI characteristics. During the inference phase, the optimized MBTI prompts are selectively applied to enable the agent
to maintain rich contextual understanding and consistent personality. This approach presents the potential to deliver more natural and
personalized interactive experiences in various fields, including virtual assistants, educational tutors, and entertainment characters
The Transactions of the Korea Information Processing Society,
Vol. 14, No. 8, pp. 608-616,
Aug.
2025

One-shot Prompt MBTI Persona prompt engineering
A Deep Learning-Based Real-Time Vehicle Stop Prediction Method Using Velocity Trend Regression
Seung Hwan Cheon Soo Hyung Kim
https://doi.org/10.3745/TKIPS.2025.14.8.617
Illegal parking Backstreets object tracking Vehicle stopping stop prediction
Conventional enforcement of illegal parking operates on a post-detection basis, where violations are confirmed only after the driver
has exited the vehicle. This reactive approach limits the ability to maintain smooth traffic flow and ensure pedestrian safety. Addressing
this issue through an IT-based system presents a significant challenge, as it requires high accuracy in determining whether a vehicle
has stopped for parking and when to classify it as being in a ‘parked state.’ Moreover, various stop-related regulations, such as temporary
halts before right turns, are stipulated in traffic laws, highlighting the broader applicability and importance of early stop prediction
technology in both accident prevention and driver accountability. This study proposes a speed trend regression method to predict vehicle
stoppage at an early stage. The system integrates YOLOv8 for object detection and ByteTrack for object tracking. By analyzing vehicle
speed trends, it classifies vehicles into stopped, moving, and near-stopped categories. Experimental results, based on five test videos,
show a Prediction Detection Performance (PDP) rate of 96% and a precision of 0.875, demonstrating the effectiveness and practical
applicability of the proposed approach.
The Transactions of the Korea Information Processing Society,
Vol. 14, No. 8, pp. 617-626,
Aug.
2025

Illegal parking Backstreets object tracking Vehicle stopping stop prediction
Design of Depth Adjustable Neural Networks for Vision Tasks
Kang Woochul
https://doi.org/10.3745/TKIPS.2025.14.8.627
Deep Learning Adaptability Efficiency depth adjustment
In this paper, we propose the architecture and training method of a depth adjustable deep neural network that enables on-the-fly
selection of different inference accuracy-efficiency trade-offs using a single trained model. The proposed depth adjustable network splits
each residual stage into two parts: one part learns hierarchical representations, while the other refines the learned features using a
self-distillation technique. This training strategy allows the model to jointly learn multiple embedded subnetworks of varying depths with
at most twice the training time of a single network. The proposed depth adjustable model is applied to image classification and object
detection tasks, demonstrating the ability to adjust the trade-off between accuracy and efficiency without sacrificing maximum accuracy
The Transactions of the Korea Information Processing Society,
Vol. 14, No. 8, pp. 627-632,
Aug.
2025

Deep Learning Adaptability Efficiency depth adjustment
A Study on Optimization Methods Based on Generative Flow Networks for Airport Resource Allocation Problems
Kim Jun Kyu Ahn Kwang Mo
https://doi.org/10.3745/TKIPS.2025.14.8.633
Airport operations Gate assignment combinatorial optimization Generative Flow Network MILP Reinforcement Learning
With the continuous growth in global air traffic demand, the operational efficiency of airports has become a critical factor in the
competitiveness of the aviation industry. Among various operational challenges, the Gate Assignment Problem (GAP) is a combinatorial
optimization problem characterized by complex resource constraints and real-time requirements. Existing approaches have shown limitations
in terms of solution diversity and computational efficiency. In this study, GAP is mathematically modeled as a Mixed Integer Linear
Programming (MILP) formulation, incorporating practical operational constraints such as time windows, gate capacity, and airline
preferences. A novel optimization method based on Generative Flow Networks (GFlowNet) is proposed to learn reward-proportional
probability distributions and stochastically generate structurally diverse, high-reward solutions. Using real-world data from Incheon
International Airport, the proposed GFlowNet-based approach was compared under the same experimental conditions with an A3C
(Asynchronous Advantage Actor-Critic)-based reinforcement learning method. The results showed that the proposed method achieved a
100% gate utilization rate and an average execution time of 3.16 seconds, improving resource utilization by 5.4% and reducing runtime
by 41% compared to A3C. Furthermore, it achieved over 95% constraint satisfaction and a diversity score of 1.0, demonstrating its effectiveness
in exploring non-redundant, high-quality solutions. This study empirically demonstrates that combining MILP-based mathematical modeling
with generative reinforcement learning can effectively contribute to real-time airport operations and intelligent resource allocation.
The Transactions of the Korea Information Processing Society,
Vol. 14, No. 8, pp. 633-642,
Aug.
2025

Airport operations Gate assignment combinatorial optimization Generative Flow Network MILP Reinforcement Learning
Performance Analysis of Personality Recognition on a Korean-Based Personality Recognition Dataset
Xu Qiu Mira Lee Jeehyeong Kim Bongjae Kim
https://doi.org/10.3745/TKIPS.2025.14.8.643
Artificial intelligence OCEAN Personality Recognition Transformer
As the demand for personalized services continues to grow, research on personality recognition using artificial intelligence (AI) based
on the OCEAN model has been rapidly advancing. However, there is still a lack of Korean-language personality recognition datasets.
To address this, the Korea Electronics Technology Institute (KETI) recruited participants and constructed a Korean-language personality
recognition dataset. This study utilized the dataset to compare two experimental settings: one in which the data was split into training,
validation, and test sets based on participant IDs, and another in which the video data was randomly split into these sets. Additionally,
experiments were conducted using both full videos and videos containing only speech segments within each experimental setting. In
the participant-based data partitioning experiments, the experiment using the full video of the third scenario (SCENE 3) achieved the
best 1-MAE performance (0.9142). In contrast, in the random split experiments, the integrated experiment using the full video across
all three scenarios achieved the highest 1-MAE performance (0.9931). These results suggest that data preprocessing and splitting methods
significantly impact the performance of Korean-language personality recognition models. This study is meaningful in that it provides
foundational insights for future multimodal fusion-based personality recognition research.
The Transactions of the Korea Information Processing Society,
Vol. 14, No. 8, pp. 643-649,
Aug.
2025

Artificial intelligence OCEAN Personality Recognition Transformer