Journal
|
2023 |
An Intelligent Framework for Fault Diagnosis of Centrifugal Pump Leveraging Wavelet Coherence Analysis and Deep Learning
Niamat Ullah Sensors, v.23, no.21, pp.1-22 |
16 |
원문
|
Conference
|
2023 |
Federated Learning in Prediction of Dementia Stage: An Experimental Study
Eom Bo Yun International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1785-1788 |
2 |
원문
|
Conference
|
2023 |
Except-Condition Generative Adversarial Network for Generating Trajectory Data
송예지 International Conference on Database and Expert Systems Applications (DEXA) 2023 (LNCS 14147), v.14147, pp.289-294 |
3 |
원문
|
Journal
|
2022 |
A Robust Authentication Protocol for Wireless Medical Sensor Networks Using Blockchain and Physically Unclonable Functions
Yusungjin IEEE Internet of Things Journal, v.9, no.20, pp.20214-20228 |
94 |
원문
|
Conference
|
2020 |
Drone Security Module for UAV Data Encryption
Keonwoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1672-1674 |
31 |
원문
|
Conference
|
2019 |
Design and Development of Data Map Visualization Tool for Property Search of Police Information
Lee Sang Yun International Conference on Electronics, Information and Communication (ICEIC) 2019, pp.872-876 |
0 |
원문
|
Journal
|
2016 |
SecureDom: Secure Mobile-sensitive Information Protection with Domain Separation
Su Wan Park Journal of Supercomputing, v.72, no.7, pp.2682-2702 |
7 |
원문
|
Conference
|
2016 |
Practical Additive Homomorphic Encryption for Statistical Analysis over Encrypted Data
Taek-Young Youn International Conference on Platform Technology and Service (PlatCon) 2016, pp.1-7 |
6 |
원문
|
Conference
|
2015 |
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM
최규영 International Workshop on Information Security Applications (WISA) 2015 (LNCS 9503), v.9503, pp.411-422 |
8 |
원문
|
Conference
|
2015 |
A Methodology for Live Forensic Acquisition in Secure Domain Based on Domain Separation Technology
Lim Kyung Soo International Conference on Communication and Computer Engineering (ICOCOE) 2015 (LNEE 362), v.362, pp.1113-1123 |
3 |
원문
|
Journal
|
2014 |
An Improved Side Channel Attack Using Event Information of Subtraction
Park Jong-Yeon Journal of Network and Computer Applications, v.38, no.1, pp.99-105 |
6 |
원문
|
Journal
|
2013 |
Comments on an Improved RFID Security Protocol for ISO/IEC WD 29167-6
Yousung Kang ETRI Journal, v.35, no.1, pp.170-172 |
8 |
원문
|
Conference
|
2011 |
Seamless and Secure Service Framework using Multiple Network Interface Terminal
Yoon Sunghyun International Conference on Consumer Electronics (ICCE) 2011, pp.261-262 |
1 |
원문
|
Conference
|
2010 |
Privacy Preservation in SAT (Single Authentication Through)
Kim Geonwoo International Conference on Information Technology Convergence and Services (ITCS) 2010, pp.1-4 |
0 |
원문
|
Conference
|
2009 |
On the Challenges of Applying Selective Encryption on Region-of-Interest in H.264 Video Coding
Choi Sugil International Conference on Computer Science and its Applications (CSA) 2009, pp.1-5 |
5 |
원문
|
Conference
|
2009 |
The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device
Chung Bo-Heung Communications in Computer and Information Science (CCIS) 2009, pp.51-56 |
0 |
원문
|
Conference
|
2007 |
Cryptographic Issues in Database Security
Jeon Yong-Sung International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2007, pp.384-385 |
|
|
Conference
|
2005 |
Building secure agents on the semantic web
Jooyoung Lee International Conference on Advanced Communication Technology (ICACT) 2005, pp.386-389 |
|
|