ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Noh Jong-Hyouk Principal Researcher
Department
AI Data Security Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Journal
2025 Siamese network-based user-independent model for surface electromyogram biometric authentication   Youngsam Kim   ETRI Journal, v.권호미정, pp.1-15 0
Journal
2023 Facial Landmark, Head Pose, and Occlusion Analysis using Multitask Stacked Hourglass   Youngsam Kim   IEEE Access, v.11, pp.30970-30981 3
Conference
2021 LSFD: Lightweight Single Stage Masked Face Detector with a CPU Real-time Speed   Youngsam Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1818-1822 1
Journal
2020 One-Class Learning Method Based on Live Correlation Loss for Face Anti-Spoofing   Seokjae Lim  IEEE Access, v.8, pp.201635-201648 13
Conference
2020 How to Aggregate Acoustic Delta Features for Deep Speaker Embeddings   Youngsam Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1225-1229 1
Conference
2019 Lightweight Deep Embeddings Fusion Methods for Face Verification on Mobile Devices   Youngsam Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1133-1136 0
Conference
2019 A Performance Comparison of Loss Functions   Kwantae Cho   International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1146-1151 10
Conference
2019 End-to-end Korean Digits Speech Recognition   Jong-hyuk Roh   International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1137-1139 1
Conference
2018 Learning based Biometric Key Generation Method using CNN and RNN   Jong-hyuk Roh   International Conference on Information Technology and Electrical Engineering (ICITEE) 2018, pp.136-139 12
Journal
2018 Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment   Sung-Hoon Lee   Journal of Information Processing Systems, v.14, no.2, pp.523-538 9
Conference
2017 A Study of Adaptive Feature Subset for Improving Accuracy of Keystroke Dynamics Authentication on Mobile Environment   이성훈  한국정보처리학회 학술 발표 대회 (춘계) 2017, pp.287-290
Conference
2016 Keystroke Dynamics for Authentication in Smartphone   Jong-hyuk Roh   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1155-1159 28
Conference
2016 A Study on Feature of Keystroke Dynamics for Improving Accuracy in Mobile Environment   Sung-Hoon Lee   World Conference on Information Security Applications (WISA) 2016 (LNCS 10144), v.10144, pp.1-10 2
Journal
2016 핀테크 보안 기술 동향 : 상황 인지 기반 인증 기술   김승현   정보과학회지, v.34, no.4, pp.20-24
Conference
2015 Anomaly Detection of Access Patterns in Database   Jong-hyuk Roh   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1115-1118
Conference
2014 Character Recognition Using a Target String   노종혁   한국통신학회 종합 학술 발표회 (하계) 2014, pp.756-757
Conference
2014 Implementation of TouchSign Certificate Management System   조상래   대한전자공학회 종합 학술 대회 (하계) 2014, pp.598-601
Conference
2014 Implementation of TouchSign Online System   김수형   대한전자공학회 종합 학술 대회 (하계) 2014, pp.595-597
Conference
2014 Implementation of TouchSign Offline Digital Signature System   조영섭   대한전자공학회 종합 학술 대회 (하계) 2014, pp.602-605
Conference
2014 Device Control Protocol Using Mobile Phone   Jong-hyuk Roh   International Conference on Advanced Communication Technology (ICACT) 2014, pp.355-359 14
Conference
2012 User Movement Behavior Analysis using the Environment Information   노종혁   한국통신학회 종합 학술 발표회 (하계) 2012, pp.321-322
Conference
2012 Personalized Advertisement Recommendation System based on User Profile in the Smart Phone   Jong-Hyuk Roh   International Conference on Advanced Communication Technology (ICACT) 2012, pp.1300-1303
Journal
2011 ID 관리 기술 국제표준화 동향 및 향후 전망   조상래   정보보호학회지, v.21, no.4, pp.14-21
Conference
2010 A Personalized Music Recommendation Service in Mobile Environment   Jong-Hyuk Roh   International Conference on Internet (ICONI) 2010 / Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2010, pp.1-2
Conference
2010 Personalized Service Recommendation System in Mobile Environment   노종혁   한국인터넷정보학회 학술 발표 대회 (추계) 2010, pp.1-2
Conference
2009 Identity Data Security System for the Digital Identity Wallet   Dae Seon Choi   International Conference on Advanced Communication Technology (ICACT) 2009, pp.1678-1681
Conference
2009 Personal Information Management using Attribute Provider   Jong Hyuk Roh   International Conference on Advanced Communication Technology (ICACT) 2009, pp.1293-1295
Conference
2008 Data Sharing in the Digital Identity Wallet   노종혁   한국정보처리학회 학술 발표 대회 (추계) 2008, pp.1521-1524
Conference
2008 Website Registration using Link for Privacy   Jong-Hyuk Roh   International Conference on Security and Management (SAM) 2008, pp.1-3
Journal
2007 Policy Based Privacy Technology in Web Environment   노종혁   전자통신동향분석, v.22, no.4, pp.144-155
Conference
2007 A Network Topology-based Key Management for Secure Overlay Multicast   노종혁   한국통신학회 종합 학술 발표회 (하계) 2007, pp.21-24
Journal
2007 Privacy Controller using XACML for Internet Identity Management System   노종혁   한국통신학회논문지 B : 네트워크 및 서비스, v.32, no.7, pp.438-447
Conference
2007 Video-on-Demand Streaming in P2P Environment   Jong-Hyuk Roh   International Symposium on Consumer Electronics (ISCE) 2007, pp.1-5 3
Journal
2006 Key Management Scheme for Providing the Confidentiality in Mobile Multicast   노종혁   정보보호학회지, v.16, no.1, pp.97-104
Conference
2006 Key Management Scheme for Providing the Confidentiality in Mobile Multicast   Jong Hyuk Roh   International Conference on Advanced Communication Technology (ICACT) 2006, pp.1205-1209 7
Conference
2006 Topology-Aware Key Management Scheme for Secure Overlay Multicast   Jong-Hyuk Roh   International Conference on Information Networking (ICOIN) 2006 (LNCS 3961), v.3961, pp.733-742 0
Conference
2005 Key Management for Secure Overlay Multicast   Jong-Hyuk Roh   Conference on Information Security and Cryptology (CISC) 2005 (LNCS 3822), v.3822, pp.336-345 0
Conference
2005 Key Management Scheme for Application Layer Multicast   노종혁   차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.364-368
Conference
2005 Key Tree Management for Providing the Confidentiality in Overlay Multicast   노종혁   한국정보보호학회 학술 대회 (동계) 2005, pp.1-5
Conference
2005 Key Management Scheme for Secure Overlay Multicast   노종혁   한국통신학회 종합 학술 발표회 (추계) 2005, pp.775-778
Conference
2005 Key Management Scheme for Secure Mobile Multicast   노종혁   한국정보과학회 학술 발표 (추계) 2005, pp.106-108
Journal
2005 Privacy Authorization for Internet Identity Management System   노종혁   한국통신학회논문지, v.30, no.10B, pp.648-659
Conference
2004 Multicast in Mobile Network   노종혁   차세대 통신소프트웨어 학술 대회 (NCS) 2004, pp.745-748
Conference
2003 Certificate Status Check for Verifying Signature   노종혁   한국통신학회 종합 학술 발표회 (추계) 2003, pp.588-591
Conference
2002 Validating Certificate of Certificate Validation Server   노종혁   한국정보처리학회 학술 발표 대회 (추계) 2002, pp.913-916
Conference
2002 TSP SDK Implementation   원형석   한국정보과학회 학술 발표 (가을) 2002, pp.589-591
Conference
2002 The Design of Integrated Cryptographic API   김태성   한국정보과학회 학술 발표 (가을) 2002, pp.505-507
Conference
2002 Building Certification Paths in Certificate Validation Server   노종혁   한국정보과학회 학술 발표 (가을) 2002, pp.604-606
Conference
2001 The Mechanism of Certification Path Validation   김태성   한국정보처리학회 학술 발표 대회 (추계) 2001, pp.931-934
Conference
2001 Collaborative VA Model   노종혁   한국정보과학회 학술 발표 (가을) 2001, pp.751-753