Conference
|
2024 |
An open video security platform for edge AI cameras
Su Wan Park International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.643-646 |
0 |
원문
|
Conference
|
2022 |
Development of a Safety Monitoring System for Hazardous Areas in the Manufacturing Environments
Kang Sang Seung International Conference on Control, Automation and Systems (ICCAS) 2022, pp.1275-1276 |
|
|
Conference
|
2022 |
Lightweight framework for the violence and falling-down event occurrence detection for surveillance videos
Hyungmin Kim International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.1629-1634 |
2 |
원문
|
Conference
|
2022 |
Anomaly Detection and Reporting System for POS
Yoon Changwoo International Conference on Electronics, Information and Communication (ICEIC) 2022, pp.723-726 |
0 |
원문
|
Conference
|
2020 |
Autonomous Reckless Driving Detection Using Deep Learning on Embedded GPUs
남우진 International Conference on Mobile Ad Hoc and Sensor Systems (MASS) 2020, pp.464-472 |
|
|
Conference
|
2020 |
Autonomous Reckless Driving Detection Using Deep Learning on Embedded GPUs
Heo Tae-Wook International Conference on Mobile Ad Hoc and Sensor Systems (MASS) 2020, pp.464-472 |
|
|
Conference
|
2020 |
Infant abnormal behavior classification through weakly supervised learning
Ye Jin Lee International Conference on Intelligent Robots and Systems (IROS) 2020, pp.12118-12121 |
|
|
Conference
|
2018 |
Pedestrian Abnormal Behavior Detection Using Spatio-Temporal Classifier
Shin Hochul Annual Conference on Engineering and Applied Science (ACEAT) 2018, pp.597-598 |
|
|
Conference
|
2018 |
Detection of High-Risk Intoxicated Passengers in Video Surveillance
Lee Jae-Yeong International Conference on Advanced Video and Signal-based Surveillance (AVSS) 2018, pp.283-303 |
3 |
원문
|
Conference
|
2015 |
Behavior-Based Anomaly Detection on Big Data
Kim Hyun Joo SRI Security Congress 2015, pp.73-80 |
|
|
Conference
|
2015 |
Metaverse Based Context Aware for Assist Living
Kim Ji Yeon International Conference on Computer Science and Information Engineering (CSIE) 2015, pp.386-388 |
|
|
Conference
|
2015 |
Host Behavior Characteristic Description Method Against APT Attack Detection
Moon Dae Sung World Congress on Information Technology Applications and Services (World IT Congress) 2015, pp.1-7 |
|
|
Conference
|
2014 |
Detecting Abnormal Behavior in SCADA Networks Using Normal Traffic Pattern Learning
Byoung Koo Kim International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), v.330, pp.121-126 |
9 |
원문
|
Conference
|
2014 |
Video based Abnormal Behavior Analysis System for Surveillance
Ko Jong-Gook International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV) 2014, pp.1-2 |
|
|
Conference
|
2014 |
Feature Extraction for Host based Anomaly Detection
Moon Dae Sung 대한전자공학회 종합 학술 대회 (하계) 2014, pp.591-594 |
|
|
Conference
|
2014 |
Abnormal Behavior Detection Technique based on Big Data
Kim Hyun Joo International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), v.301, pp.553-563 |
6 |
원문
|
Journal
|
2012 |
A Rule Based Event Correlation Approach for Physical and Logical Security Convergence
Dong Ho Kang International Journal of Computer Science and Network Security, v.12, no.1, pp.28-31 |
|
|
Conference
|
2010 |
An Effective Defense Mechanism Against DoS/DDoS Attacks in Flow-based Routers
Park Pyung-Koo International Conference on Advances in Mobile Computing and Multimedia (MoMM) 2010, pp.442-446 |
6 |
원문
|
Journal
|
2008 |
Effects of Gate Bias Stress on the Electrical Characteristics of ZnO Thin Film Transistor
전재홍 Journal of the Korean Physical Society, v.53, no.1, pp.412-415 |
8 |
원문
|
Conference
|
2008 |
P‐22: Electrical Stability of ZnO TFT during Gate‐Bias Stress
김태현 Society for Information Display (SID) International Symposium 2008, pp.1250-1253 |
1 |
원문
|
Conference
|
2003 |
CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection
Kim Jin Suk International Workshop on Information Security Applications (WISA) 2003 (LNCS 2908), v.2908, pp.84-96 |
5 |
원문
|