Research
                Deep learning & Optimization
               | 
             
          
         
        
          
            
               
             | 
            
              Labeling unlabeled training data when only given partial, noisy information about the ground-truth label. 
               
               
              arXiv : "RACH-Space: Reconstructing Adaptive Convex Hull Space with Applications in Weak Supervision"
               
              Weakly supervised learning
              
              
              
                Developed a novel algorithm which labels data when given partial, noisy information about the ground-truth labels. State-of-the-art performance on real world benchmark data.
               
             | 
             
          
            
               
             | 
            
              P2-equivariant Convolutional Networks on MNIST dataset
               
               
              Machine Learning project, 2022
               
              Geometric feature learning
              
              
              
                We focused on the framework for CNNs that are equivariant under arbitrary group transformations, and looked at its applications and limitations, experimenting on the MNIST dataset.
               
             | 
            
          
            
              
                
                  Natural Language Processing
                 | 
               
            
           
  
          
          
            
               
             | 
            
              Fake news detection and its impact on financial markets
               
               
              Brigade Commander Award, Republic of Korean Army Start-up competition (2021)
               
              Fake News Detection
              
              
              
                Devised an online platform for fake news detection using neural models, aimed at small investors prone to fake news. Won Brigade Commander Award for Excellence.
               
             | 
           
          
            
               
             | 
            
              Conceptual space of a transformer encoder
               
               
              Undergraduate Summer research
               
              Transformer encoder
              
              
              
                Worked on conceptual space of a transformer encoder, studying the similarities between NLP architectures and the human brain.
               
             | 
             
          
            
               
             | 
            
              2018 n2c2 challenge
               
              Woojoo Na, 
              Andrey Kormilitzin
               
              Undergraduate Poster session
               
              2018 n2c2 challenge
              
              
              
                In this challenge, we proposed a model for detecting Adverse Drug Events and Medication Extration in EHRs. We exploited CNN architecture and a character level word embedding model to demonstrate a robust approach to concept extraction and relation extraction.
               
             | 
            
            
            
              
                 
               | 
              
                Knowledge graph completion
                 
                 
                Undergraduate Summer research
                 
                Knowledge graphs
                
                
                
                  Worked on knowledge graph completion for ontology reasoning.
                 
               | 
              
        
        
          
          
            
               
             | 
            
              Trapdoor attacks on Cayley hash function parameters
               
              Alexander Allin,              
              Woojoo Na, 
              Christophe Petit
               
              IMACC-17
               
                IMACC 2019
              
              
                By leveraging group properties in Cayley hash functions, we introduce a trapdoor attacks on Cayley hash function parameters.
               
             | 
           
        
      
    
   
   |