ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Noh Jong-Hyouk
Department
AI Data Security Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Journal
2023 Facial Landmark, Head Pose, and Occlusion Analysis using Multitask Stacked Hourglass   Youngsam Kim   IEEE Access, v.11, pp.30970-30981 1
Conference
2021 LSFD: Lightweight Single Stage Masked Face Detector with a CPU Real-time Speed   Youngsam Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1818-1822 1
Journal
2020 One-Class Learning Method Based on Live Correlation Loss for Face Anti-Spoofing   Seokjae Lim  IEEE Access, v.8, pp.201635-201648 6
Conference
2020 How to Aggregate Acoustic Delta Features for Deep Speaker Embeddings   Youngsam Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1225-1229 1
Conference
2019 Lightweight Deep Embeddings Fusion Methods for Face Verification on Mobile Devices   Youngsam Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1133-1136 0
Conference
2019 End-to-end Korean Digits Speech Recognition   Jong-hyuk Roh   International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1137-1139 1
Conference
2019 A Performance Comparison of Loss Functions   Kwantae Cho   International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1146-1151 5
Conference
2018 Learning based Biometric Key Generation Method using CNN and RNN   Jong-hyuk Roh   International Conference on Information Technology and Electrical Engineering (ICITEE) 2018, pp.136-139 11
Journal
2018 Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment   Sung-Hoon Lee   Journal of Information Processing Systems, v.14, no.2, pp.523-538 9
Conference
2017 A Study of Adaptive Feature Subset for Improving Accuracy of Keystroke Dynamics Authentication on Mobile Environment   이성훈  한국정보처리학회 학술 발표 대회 (춘계) 2017, pp.287-290
Conference
2016 Keystroke Dynamics for Authentication in Smartphone   Jong-hyuk Roh   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1155-1159 27
Conference
2016 A Study on Feature of Keystroke Dynamics for Improving Accuracy in Mobile Environment   Sung-Hoon Lee   World Conference on Information Security Applications (WISA) 2016 (LNCS 10144), v.10144, pp.1-10 2
Journal
2016 핀테크 보안 기술 동향 : 상황 인지 기반 인증 기술   김승현   정보과학회지, v.34, no.4, pp.20-24
Conference
2015 Anomaly Detection of Access Patterns in Database   Jong-hyuk Roh   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1115-1118
Conference
2014 Character Recognition Using a Target String   노종혁   한국통신학회 종합 학술 발표회 (하계) 2014, pp.756-757
Conference
2014 Implementation of TouchSign Certificate Management System   조상래   대한전자공학회 종합 학술 대회 (하계) 2014, pp.598-601
Conference
2014 Implementation of TouchSign Online System   김수형   대한전자공학회 종합 학술 대회 (하계) 2014, pp.595-597
Conference
2014 Implementation of TouchSign Offline Digital Signature System   조영섭   대한전자공학회 종합 학술 대회 (하계) 2014, pp.602-605
Conference
2014 Device Control Protocol Using Mobile Phone   Jong-hyuk Roh   International Conference on Advanced Communication Technology (ICACT) 2014, pp.355-359 14
Conference
2012 User Movement Behavior Analysis using the Environment Information   노종혁   한국통신학회 종합 학술 발표회 (하계) 2012, pp.321-322
Conference
2012 Personalized Advertisement Recommendation System based on User Profile in the Smart Phone   Jong-Hyuk Roh   International Conference on Advanced Communication Technology (ICACT) 2012, pp.1300-1303
Journal
2011 ID 관리 기술 국제 표준화 동향 및 향후 전망   조상래   정보보호학회지, v.21, no.4, pp.14-21
Conference
2010 A Personalized Music Recommendation Service in Mobile Environment   Jong-Hyuk Roh   International Conference on Internet (ICONI) 2010 / Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2010, pp.1-2
Conference
2010 Personalized Service Recommendation System in Mobile Environment   노종혁   한국인터넷정보학회 학술 발표 대회 (추계) 2010, pp.1-2
Conference
2009 Identity Data Security System for the Digital Identity Wallet   Dae Seon Choi   International Conference on Advanced Communication Technology (ICACT) 2009, pp.1678-1681
Conference
2009 Personal Information Management using Attribute Provider   Jong Hyuk Roh   International Conference on Advanced Communication Technology (ICACT) 2009, pp.1293-1295
Conference
2008 Data Sharing in the Digital Identity Wallet   노종혁   한국정보처리학회 학술 발표 대회 (추계) 2008, pp.1521-1524
Conference
2008 Website Registration using Link for Privacy   Jong-Hyuk Roh   International Conference on Security and Management (SAM) 2008, pp.1-3
Journal
2007 Policy Based Privacy Technology in Web Environment   노종혁   전자통신동향분석, v.22, no.4, pp.144-155
Journal
2007 Privacy Controller using XACML for Internet Identity Management System   노종혁   한국통신학회논문지 B : 네트워크 및 서비스, v.32, no.7, pp.438-447
Conference
2007 A Network Topology-based Key Management for Secure Overlay Multicast   노종혁   한국통신학회 종합 학술 발표회 (하계) 2007, pp.21-24
Conference
2007 Video-on-Demand Streaming in P2P Environment   Jong-Hyuk Roh   International Symposium on Consumer Electronics (ISCE) 2007, pp.1-5 3
Journal
2006 Key Management Scheme for Providing the Confidentiality in Mobile Multicast   노종혁   정보보호학회지, v.16, no.1, pp.97-104
Conference
2006 Key Management Scheme for Providing the Confidentiality in Mobile Multicast   Jong Hyuk Roh   International Conference on Advanced Communication Technology (ICACT) 2006, pp.1205-1209 7
Conference
2006 Topology-Aware Key Management Scheme for Secure Overlay Multicast   Jong-Hyuk Roh   International Conference on Information Networking (ICOIN) 2006 (LNCS 3961), v.3961, pp.733-742 0
Conference
2005 Key Management Scheme for Application Layer Multicast   노종혁   차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.364-368
Conference
2005 Key Tree Management for Providing the Confidentiality in Overlay Multicast   노종혁   한국정보보호학회 학술 대회 (동계) 2005, pp.1-5
Conference
2005 Key Management for Secure Overlay Multicast   Jong-Hyuk Roh   Conference on Information Security and Cryptology (CISC) 2005 (LNCS 3822), v.3822, pp.336-345 0
Conference
2005 Key Management Scheme for Secure Mobile Multicast   노종혁   한국정보과학회 학술 발표 (추계) 2005, pp.106-108
Conference
2005 Key Management Scheme for Secure Overlay Multicast   노종혁   한국통신학회 종합 학술 발표회 (추계) 2005, pp.775-778
Journal
2005 Privacy Authorization for Internet Identity Management System   노종혁   한국통신학회논문지, v.30, no.10B, pp.648-659
Conference
2004 Multicast in Mobile Network   노종혁   차세대 통신소프트웨어 학술 대회 (NCS) 2004, pp.745-748
Conference
2003 Certificate Status Check for Verifying Signature   노종혁   한국통신학회 종합 학술 발표회 (추계) 2003, pp.588-591
Conference
2002 Validating Certificate of Certificate Validation Server   노종혁   한국정보처리학회 학술 발표 대회 (추계) 2002, pp.913-916
Conference
2002 Building Certification Paths in Certificate Validation Server   노종혁   한국정보과학회 학술 발표 (가을) 2002, pp.604-606
Conference
2002 The Design of Integrated Cryptographic API   김태성   한국정보과학회 학술 발표 (가을) 2002, pp.505-507
Conference
2002 TSP SDK Implementation   원형석   한국정보과학회 학술 발표 (가을) 2002, pp.589-591
Conference
2001 Collaborative VA Model   노종혁   한국정보과학회 학술 발표 (가을) 2001, pp.751-753
Conference
2001 The Mechanism of Certification Path Validation   김태성   한국정보처리학회 학술 발표 대회 (추계) 2001, pp.931-934