Type | Year | Title | Cited | Download |
---|---|---|---|---|
Journal
|
2023 | Facial Landmark, Head Pose, and Occlusion Analysis using Multitask Stacked Hourglass Youngsam Kim IEEE Access, v.11, pp.30970-30981 | 1 | |
Conference
|
2021 | LSFD: Lightweight Single Stage Masked Face Detector with a CPU Real-time Speed Youngsam Kim International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1818-1822 | 1 | |
Journal
|
2020 | One-Class Learning Method Based on Live Correlation Loss for Face Anti-Spoofing Seokjae Lim IEEE Access, v.8, pp.201635-201648 | 8 | |
Conference
|
2020 | How to Aggregate Acoustic Delta Features for Deep Speaker Embeddings Youngsam Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1225-1229 | 1 | |
Conference
|
2019 | Lightweight Deep Embeddings Fusion Methods for Face Verification on Mobile Devices Youngsam Kim International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1133-1136 | 0 | |
Conference
|
2019 | A Performance Comparison of Loss Functions Kwantae Cho International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1146-1151 | 5 | |
Conference
|
2019 | End-to-end Korean Digits Speech Recognition Jong-hyuk Roh International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1137-1139 | 1 | |
Conference
|
2018 | Learning based Biometric Key Generation Method using CNN and RNN Jong-hyuk Roh International Conference on Information Technology and Electrical Engineering (ICITEE) 2018, pp.136-139 | 11 | |
Journal
|
2018 | Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment Sung-Hoon Lee Journal of Information Processing Systems, v.14, no.2, pp.523-538 | 9 | |
Conference
|
2017 | A Study of Adaptive Feature Subset for Improving Accuracy of Keystroke Dynamics Authentication on Mobile Environment 이성훈 한국정보처리학회 학술 발표 대회 (춘계) 2017, pp.287-290 | ||
Conference
|
2016 | Keystroke Dynamics for Authentication in Smartphone Jong-hyuk Roh International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1155-1159 | 27 | |
Conference
|
2016 | A Study on Feature of Keystroke Dynamics for Improving Accuracy in Mobile Environment Sung-Hoon Lee World Conference on Information Security Applications (WISA) 2016 (LNCS 10144), v.10144, pp.1-10 | 2 | |
Journal
|
2016 | 핀테크 보안 기술 동향 : 상황 인지 기반 인증 기술 김승현 정보과학회지, v.34, no.4, pp.20-24 | ||
Conference
|
2015 | Anomaly Detection of Access Patterns in Database Jong-hyuk Roh International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1115-1118 | ||
Conference
|
2014 | Implementation of TouchSign Certificate Management System 조상래 대한전자공학회 종합 학술 대회 (하계) 2014, pp.598-601 | ||
Conference
|
2014 | Implementation of TouchSign Offline Digital Signature System 조영섭 대한전자공학회 종합 학술 대회 (하계) 2014, pp.602-605 | ||
Conference
|
2014 | Character Recognition Using a Target String 노종혁 한국통신학회 종합 학술 발표회 (하계) 2014, pp.756-757 | ||
Conference
|
2014 | Implementation of TouchSign Online System 김수형 대한전자공학회 종합 학술 대회 (하계) 2014, pp.595-597 | ||
Conference
|
2014 | Device Control Protocol Using Mobile Phone Jong-hyuk Roh International Conference on Advanced Communication Technology (ICACT) 2014, pp.355-359 | 14 | |
Conference
|
2012 | User Movement Behavior Analysis using the Environment Information 노종혁 한국통신학회 종합 학술 발표회 (하계) 2012, pp.321-322 | ||
Conference
|
2012 | Personalized Advertisement Recommendation System based on User Profile in the Smart Phone Jong-Hyuk Roh International Conference on Advanced Communication Technology (ICACT) 2012, pp.1300-1303 | ||
Journal
|
2011 | ID 관리 기술 국제표준화 동향 및 향후 전망 조상래 정보보호학회지, v.21, no.4, pp.14-21 | ||
Conference
|
2010 | A Personalized Music Recommendation Service in Mobile Environment Jong-Hyuk Roh International Conference on Internet (ICONI) 2010 / Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2010, pp.1-2 | ||
Conference
|
2010 | Personalized Service Recommendation System in Mobile Environment 노종혁 한국인터넷정보학회 학술 발표 대회 (추계) 2010, pp.1-2 | ||
Conference
|
2009 | Identity Data Security System for the Digital Identity Wallet Dae Seon Choi International Conference on Advanced Communication Technology (ICACT) 2009, pp.1678-1681 | ||
Conference
|
2009 | Personal Information Management using Attribute Provider Jong Hyuk Roh International Conference on Advanced Communication Technology (ICACT) 2009, pp.1293-1295 | ||
Conference
|
2008 | Data Sharing in the Digital Identity Wallet 노종혁 한국정보처리학회 학술 발표 대회 (추계) 2008, pp.1521-1524 | ||
Conference
|
2008 | Website Registration using Link for Privacy Jong-Hyuk Roh International Conference on Security and Management (SAM) 2008, pp.1-3 | ||
Journal
|
2007 | Policy Based Privacy Technology in Web Environment 노종혁 전자통신동향분석, v.22, no.4, pp.144-155 | ||
Conference
|
2007 | A Network Topology-based Key Management for Secure Overlay Multicast 노종혁 한국통신학회 종합 학술 발표회 (하계) 2007, pp.21-24 | ||
Journal
|
2007 | Privacy Controller using XACML for Internet Identity Management System 노종혁 한국통신학회논문지 B : 네트워크 및 서비스, v.32, no.7, pp.438-447 | ||
Conference
|
2007 | Video-on-Demand Streaming in P2P Environment Jong-Hyuk Roh International Symposium on Consumer Electronics (ISCE) 2007, pp.1-5 | 3 | |
Journal
|
2006 | Key Management Scheme for Providing the Confidentiality in Mobile Multicast 노종혁 정보보호학회지, v.16, no.1, pp.97-104 | ||
Conference
|
2006 | Key Management Scheme for Providing the Confidentiality in Mobile Multicast Jong Hyuk Roh International Conference on Advanced Communication Technology (ICACT) 2006, pp.1205-1209 | 7 | |
Conference
|
2006 | Topology-Aware Key Management Scheme for Secure Overlay Multicast Jong-Hyuk Roh International Conference on Information Networking (ICOIN) 2006 (LNCS 3961), v.3961, pp.733-742 | 0 | |
Conference
|
2005 | Key Tree Management for Providing the Confidentiality in Overlay Multicast 노종혁 한국정보보호학회 학술 대회 (동계) 2005, pp.1-5 | ||
Conference
|
2005 | Key Management for Secure Overlay Multicast Jong-Hyuk Roh Conference on Information Security and Cryptology (CISC) 2005 (LNCS 3822), v.3822, pp.336-345 | 0 | |
Conference
|
2005 | Key Management Scheme for Application Layer Multicast 노종혁 차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.364-368 | ||
Conference
|
2005 | Key Management Scheme for Secure Overlay Multicast 노종혁 한국통신학회 종합 학술 발표회 (추계) 2005, pp.775-778 | ||
Conference
|
2005 | Key Management Scheme for Secure Mobile Multicast 노종혁 한국정보과학회 학술 발표 (추계) 2005, pp.106-108 | ||
Journal
|
2005 | Privacy Authorization for Internet Identity Management System 노종혁 한국통신학회논문지, v.30, no.10B, pp.648-659 | ||
Conference
|
2004 | Multicast in Mobile Network 노종혁 차세대 통신소프트웨어 학술 대회 (NCS) 2004, pp.745-748 | ||
Conference
|
2003 | Certificate Status Check for Verifying Signature 노종혁 한국통신학회 종합 학술 발표회 (추계) 2003, pp.588-591 | ||
Conference
|
2002 | Validating Certificate of Certificate Validation Server 노종혁 한국정보처리학회 학술 발표 대회 (추계) 2002, pp.913-916 | ||
Conference
|
2002 | The Design of Integrated Cryptographic API 김태성 한국정보과학회 학술 발표 (가을) 2002, pp.505-507 | ||
Conference
|
2002 | Building Certification Paths in Certificate Validation Server 노종혁 한국정보과학회 학술 발표 (가을) 2002, pp.604-606 | ||
Conference
|
2002 | TSP SDK Implementation 원형석 한국정보과학회 학술 발표 (가을) 2002, pp.589-591 | ||
Conference
|
2001 | The Mechanism of Certification Path Validation 김태성 한국정보처리학회 학술 발표 대회 (추계) 2001, pp.931-934 | ||
Conference
|
2001 | Collaborative VA Model 노종혁 한국정보과학회 학술 발표 (가을) 2001, pp.751-753 |