Journal
|
2024 |
Blockchain-Enabled Key Aggregate Searchable Encryption Scheme for Personal Health Record Sharing With Multidelegation
Lee Joonyoung IEEE Internet of Things Journal, v.11, no.10, pp.17482-17494 |
12 |
원문
|
Journal
|
2023 |
Generating Labeled Multiple Attribute Trajectory Data With Selective Partial Anonymization Based on Exceptional Conditional Generative Adversarial Network
송예지 IEEE Access, v.11, pp.117190-117199 |
3 |
원문
|
Conference
|
2023 |
Implementation of deep learning based intelligent image analysis on an edge AI platform using heterogeneous AI accelerators
Ryangsoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1347-1349 |
2 |
원문
|
Conference
|
2023 |
Hybrid AI system to blurring the car license plate for protection of personal information in life safety protection system
Jeong Young Sic International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2023, pp.1623-1625 |
|
|
Conference
|
2022 |
A study on the sleep quality analysis of single-person households based on life pattern data using ambient sensors
Lee Jungi International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.1879-1881 |
1 |
원문
|
Conference
|
2022 |
Fast and energy-efficient object detection and tracking for de-identification in video
이준혁 International Conference on Consumer Electronics (ICCE) 2022 : Asia, pp.404-405 |
0 |
원문
|
Conference
|
2022 |
Accelerating Face De-identification System for Real-time Video Surveillance Services
Ryangsoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.1477-1479 |
2 |
원문
|
Journal
|
2021 |
A Secure Key Aggregate Searchable Encryption with Multi Delegation in Cloud Data Sharing Service
이준영 Applied Sciences, v.11, no.19, pp.1-20 |
11 |
원문
|
Journal
|
2020 |
Trends in Data Privacy Protection Technologies with Enhanced Utilization
Kim Juyoung 전자통신동향분석, v.35, no.6, pp.88-96 |
|
원문
|
Conference
|
2020 |
Block-based Masking Region Relocation and Detection Method for Image Privacy Masking
Park So Hee International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1586-1588 |
3 |
원문
|
Conference
|
2020 |
De-identification and Restoration Methods for Protecting Privacy in Off-line Documents
Han Jin Hee International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1543-1545 |
0 |
원문
|
Journal
|
2020 |
Trends in Dynamic Crime Prediction Technologies based on Intelligent CCTV
Park Sangwook 전자통신동향분석, v.35, no.2, pp.17-27 |
|
원문
|
Conference
|
2019 |
클라우드상에서 보안 실행 환경에 기반한 민감 데이터 처리
Soocheol Oh International Conference on Big data, IoT, and Cloud Computing (BIC) 2019, pp.1-6 |
|
|
Conference
|
2019 |
Character Detection and Recognition for Personal Information Security in Real-World Document Image
Kye Kyung Kim International Workshop on Frontiers of Computer Vision (IW-FCV) 2019, pp.1-2 |
|
|
Conference
|
2018 |
Design of the Driver-Adaptive Vehicle Interaction System
Kim Kyong Ho International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.297-299 |
5 |
원문
|
Journal
|
2018 |
Trends in Implicit Continuous Authentication Technology
Kim Seung-Hyun 전자통신동향분석, v.33, no.1, pp.57-67 |
|
원문
|
Journal
|
2017 |
An Energy-Efficient Virtualization-Based Secure Platform for Protecting Sensitive User Data
Lim Kyung Soo Sustainability, v.9, no.7, pp.1-16 |
1 |
원문
|
Conference
|
2017 |
An open interactive survey platform to collect and analyse users' privacy decisions in pervasive computing environments
Kim Seung-Hyun International Conference on Advanced Communication Technology (ICACT) 2017, pp.744-750 |
0 |
원문
|
Conference
|
2016 |
Visualization of Malware Detection Based on API Call Sequence Alignment
Kim Jonghyun International Conference on Internet (ICONI) 2016, pp.175-178 |
|
|
Journal
|
2015 |
Estimating Korean Residence Registration Numbers from Public Information on SNS
Choi Dae Seon IEICE Transactions on Communications, v.E98.B, no.4, pp.565-574 |
2 |
원문
|
Journal
|
2015 |
A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization
Su Wan Park International Journal of Distributed Sensor Networks, v.2015, pp.1-9 |
11 |
원문
|
Conference
|
2014 |
Secure Filesystem for Trusted Virtual Domain in Mobile Device
Su Wan Park International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), pp.411-417 |
0 |
원문
|
Conference
|
2013 |
A Based on Single Image Authentication System in Aviation Security
Lee Deok Gyu International Conference on Multimedia and Ubiquitous Engineering (MUE) 2013 (LNEE 240), v.240, pp.293-302 |
0 |
원문
|
Journal
|
2013 |
Personal Lifelog Upstreaming System for Secure and Reliable Lifelog Transmission
Kwon Yongjin International Journal of Information Processing and Management, v.4, no.2, pp.36-44 |
2 |
원문
|
Conference
|
2012 |
PLUS: Personal Lifelog Upstreaming System
Kwon Yongjin International Conference on Computing and Convergence Technology (ICCCT) 2012, pp.278-283 |
|
|
Conference
|
2012 |
A based on Identity Surveillance System in Aviation Security
Lee Deok Gyu International Conference on Future Information Technology (FutureTech) 2012 (LNEE 179), v.179, pp.215-224 |
0 |
원문
|
Conference
|
2012 |
Personalized Advertisement Recommendation System based on User Profile in the Smart Phone
Noh Jong-Hyouk International Conference on Advanced Communication Technology (ICACT) 2012, pp.1300-1303 |
|
|
Conference
|
2011 |
A Design of Authentication Architecture for Service Safety in Heterogeneous Network
Yoon Sunghyun International Conference on Signal Processing and Communication Systems (ICSPCS) 2011, pp.1-5 |
0 |
원문
|
Conference
|
2011 |
Rooting attack detection method on the Android-based smart phone
장원준 International Conference on Computer Science and Network Technology (ICCSNT) 2011, pp.477-481 |
9 |
원문
|
Conference
|
2011 |
Method of Reducing Caller ID Spoofing using Subscriber Number in VoIP
International Conference on Computers, Communications and Systems (ICCCS) 2011, pp.1-4 |
|
|
Conference
|
2011 |
Seamless and Secure Service Framework in Heterogeneous Mobile Network Environment
Yoon Sunghyun Vehicular Technology Conference (VTC) 2011 (Fall), pp.1-5 |
0 |
원문
|
Conference
|
2009 |
Situation-Awareness Model for Higher Order Network Knowledge Management Platform
Moon Ae Kyeung International Workshop on Semantic Sensor Networks (SSN) 2009, pp.110-121 |
|
|
Journal
|
2009 |
RHS-US: Real-Time Hash-Chain Scheme Decreasing Pre-Calculation Mechanism for Ubiquitous Services
Lee Deok Gyu Wireless Personal Communications, v.51, no.1, pp.193-207 |
0 |
원문
|
Conference
|
2009 |
Personal Information Management using Attribute Provider
Noh Jong-Hyouk International Conference on Advanced Communication Technology (ICACT) 2009, pp.1293-1295 |
|
|
Conference
|
2008 |
Personalized healthcare through intelligent gadgets
Jang Hyeju International Conference of the IEEE Engineering in Medicine and Biology Society (EMBS) 2008, pp.3308-3311 |
|
원문
|
Conference
|
2008 |
Website Registration using Link for Privacy
Noh Jong-Hyouk International Conference on Security and Management (SAM) 2008, pp.1-3 |
|
|
Conference
|
2008 |
Personalized Identity Agent for User-Centric IdM
Kim Seung-Hyun International Conference on Advanced Communication Technology (ICACT) 2008, pp.1308-1313 |
2 |
원문
|
Conference
|
2008 |
A User Friendly Internet Identity Management System
Choi Dae Seon International Conference on Advanced Communication Technology (ICACT) 2008, pp.1163-1166 |
2 |
원문
|
Conference
|
2007 |
Communication Utility for Service Provisioning and Management in Personal Information Terminal
Kang Kyu Chang International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2007, pp.1322-1323 |
|
|
Conference
|
2007 |
Usability Enhanced Privacy Protection System Based on Users' Responses
Han-Gyu Ko International Symposium on Consumer Electronics (ISCE) 2007, pp.1-6 |
4 |
원문
|
Conference
|
2007 |
The Real-Time User Consent Acquisition System for Secure Use of Personal Information
고한규 International Conference on Advanced Communication Technology (ICACT) 2007, pp.1343-1346 |
1 |
원문
|
Conference
|
2006 |
A Personal Information Leakage Prevention Method on the Internet
Choi Dae Seon International Symposium on Consumer Electronics (ISCE) 2006, pp.646-650 |
4 |
|
Conference
|
2006 |
Privacy-Friendly Mobile RFID Reader Protocol Design based on trusted Agent and PKI
Kim In Seop International Symposium on Consumer Electronics (ISCE) 2006, pp.672-677 |
3 |
|
Conference
|
2006 |
A Method for Preventing the Leakage of the Personal Information on the Internet
Choi Dae Seon International Conference on Advanced Communication Technology (ICACT) 2006, pp.1195-1198 |
4 |
|
Conference
|
2005 |
A Design of Privacy Conscious RFID System Using Customizing Privacy Policy Based Access Control
Lee Byung-Gil International Conference on Embedded and Ubiquitous Computing (EUC) 2005 (LNCS 3823), v.3823, pp.673-682 |
5 |
원문
|
Journal
|
2002 |
SyncML Data Synchronization System based on Session Manager
Lee Byung Yun 정보과학회논문지 : 컴퓨팅의 실제, v.8, no.6, pp.647-656 |
|
|