Type | Year | Title | Cited | Download |
---|---|---|---|---|
Conference
|
2016 | A Comparison of Keypoint Detectors in the Context of Pedestrian Counting Chi Yoon Jeong International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1179-1181 | 3 | |
Journal
|
2016 | Detecting Weak Signal of Emerging Technologies 최수길 전자통신동향분석, v.31, no.2, pp.18-27 | ||
Journal
|
2015 | Hierarchical Soft Clustering Tree for Fast Approximate Search of Binary Codes S. Choi Electronics Letters, v.51, no.24, pp.1992-1994 | 1 | |
Conference
|
2014 | New Binary Descriptors based on BRISK Sampling Pattern for Image Retrieval SuGil Choi International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.575-576 | 7 | |
Conference
|
2014 | Fast Image Retrieval with Grid-based Keypoint Detector and Binary Descriptor SuGil Choi International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.679-680 | 1 | |
Conference
|
2013 | Evaluating Weighting Schemes for Adult Image Detection Using Bag of Visual Words SuGil Choi International Conference on Information and Communication Technology Convergence (ICTC) 2013, pp.815-816 | 2 | |
Conference
|
2013 | A Method for Counting Moving and Stationary People by Interest Point Classification Chi Yoon Jeong International Conference on Image Processing (ICIP) 2013, pp.4545-4548 | 14 | |
Conference
|
2013 | Security Functions for Reliable Video Surveillance System Geon Woo Kim International Conference on Computing Technology and Information Management (ICCM) 2013, pp.1-4 | ||
Conference
|
2012 | Fine-level Moving Object Detection using Region-based Background/Foreground Model SuGil Choi International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.761-762 | 1 | |
Journal
|
2012 | Security Issues and Trends in Automotive Black-Box 김무섭 전자통신동향분석, v.27, no.4, pp.123-129 | ||
Journal
|
2011 | Privacy-Preserving H.264 Video Encryption Scheme SuGil Choi ETRI Journal, v.33, no.6, pp.935-944 | 11 | |
Conference
|
2011 | Real-Time Privacy Masking and Evaluation on Consecutive Video Frames Geon Woo Kim International Conference on Advancements in Computing Technology (ICACT) 2011, pp.1-3 | ||
Conference
|
2010 | Region-based Video Encryption Method 최수길 차세대 통신 소프트웨어 학술 대회 (NCS) 2010, pp.1-4 | ||
Conference
|
2010 | Privacy Preservation in SAT (Single Authentication Through) Geon-Woo Kim International Conference on Information Technology Convergence and Services (ITCS) 2010, pp.1-4 | 0 | |
Conference
|
2010 | Partial Encryption and Watermarking of H.264 Video in Codestream Domain Jin-Hee Han International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2010, pp.1-3 | ||
Conference
|
2010 | Partial Encryption and Watermarking of H.264 Video in Codestream Domain 한진희 한국통신학회 종합 학술 발표회 (하계) 2010, pp.1147-1148 | ||
Conference
|
2009 | On the Challenges of Applying Selective Encryption on Region-of-Interest in H.264 Video Coding Su Gil Choi International Conference on Computer Science and its Applications (CSA) 2009, pp.1-5 | 5 | |
Conference
|
2008 | Implementation of a TCG-based Trusted Computing in Mobile Device Su Gil Choi International Conference on Trust, Privacy and Security in Digital Business (TrustBus) 2008 (LNCS 5185), v.5185, pp.18-27 | 6 | |
Conference
|
2007 | Improvement on TCG Attestation and Its Implication for DRM Su Gil Choi International Conference on Computational Science and its Applications (ICCSA) 2007 (LNCS 4705), v.4705, pp.912-925 | ||
Conference
|
2007 | The Issues in Implementing Integrity Measurement Agent Specified in TCG Su Gil Choi International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2007, pp.376-377 | ||
Journal
|
2007 | Trusted Computing & Trusted Computing Group Standardization Trends 김영수 전자통신동향분석, v.22, no.1, pp.83-96 | ||
Conference
|
2006 | Secure Boot at the Mobile Platform using a TPM 주홍일 차세대 통신 소프트웨어 학술 대회 (NCS) 2006, pp.1-4 | ||
Conference
|
2006 | An Objectionable Image Detection System based on Region of Interest Chi Yoon Jeong International Conference on Image Processing (ICIP) 2006, pp.1477-1480 | 9 | |
Conference
|
2006 | Location Privacy-Aware Route Optimization in Mobile IPv6 Su Gil Choi International Workshop on Information Security Applications (WISA) 2006 (LNCS 4298), v.4298, pp.1-7 | ||
Conference
|
2006 | A New Method of Creating Skin Color Model Su Gil Choi International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2006, pp.1-3 | ||
Journal
|
2006 | 인터넷 윤리 관련 기술 : 유해 이미지 콘텐츠 차단 기술을 중심으로 한승완 정보처리학회지, v.13, no.1, pp.78-86 | ||
Conference
|
2005 | 유해 웹 문서 분류 시스템을 위한 웹 로봇 SuGil Choi IEC 2005, pp.2177-2180 | ||
Conference
|
2005 | An Efficient Classification System of Objectionable Images by cascaded SVMs using MPEG-7 descriptors Chi Yoon Jeong International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.1553-1554 | ||
Conference
|
2005 | Design and Prototype Development of Web Crawler for Objectionable Web Content Classification SuGil Choi International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.655-656 | ||
Journal
|
2005 | 유해 이미지 분류 기술 동향 한승완 주간기술동향, v.알수없음, no.1197, pp.1-13 |