Browse "CS-Journal Papers(저널논문)" by Title 

Showing results 2541 to 2560 of 4025

2541
Security of a multisignature scheme for specified group of verifiers

Lv, Jiquing; Wang, Xinmei; Kim, Kwangjo, APPLIED MATHEMATICS AND COMPUTATION, v.166, pp.58 - 63, 2005-07

2542
Security of permutation-based compression function lp231

Lee, Jooyoung; Kwon, Daesung, INFORMATION PROCESSING LETTERS, v.114, no.7, pp.372 - 381, 2014-07

2543
Security of the Misty Structure beyond the Birthday Bound

Lee, Jooyoung, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E97A, no.7, pp.1516 - 1522, 2014-07

2544
Security of the Misty Structure Using Involutions as Round Functions

Lee, Jooyoung; Koo, Bonwook, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E93A, no.9, pp.1612 - 1619, 2010-09

2545
Security offloading network system for expanded security coverage in IPv6-based resource constrained data service networks

Han, Jiyong; Kim, Daeyoung, WIRELESS NETWORKS, v.26, no.6, pp.4615 - 4635, 2020-08

2546
SEDRIS Transmittal Storing and Retrieval System using Relational Databases

Kim, Yong Kwon; Yang, Hee Jung; Chung, Chin Wan, JOURNAL OF DATABASE MANAGEMENT, v.25, no.4, pp.38 - 65, 2014-10

2547
Segmental reliability weighting for robust recognition of partly corrupted speech

Cho, HY; Kim, LY; Oh, Yung-Hwan, ELECTRONICS LETTERS, v.38, no.12, pp.611 - 612, 2002-06

2548
Segmentation of handwritten characters for digitalizing Korean historical documents

Kim, MS; Cho, KT; Kwag, HK; Kim, JinHyung, DOCUMENT ANALYSIS SYSTEMS VI, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3163, pp.114 - 124, 2004

2549
Sego: Pervasive Trusted Metadata for Efficiently Verified Untrusted System Services

Kwon, Youngjin; Dunn, Alan M.; Lee, Michael Z.; Hofmann, Owen S.; Xu, Yuanzhong; Witchel, Emmett, ACM SIGPLAN NOTICES, v.51, no.4, pp.277 - 290, 2016-04

2550
Selecting a routing strategy for your ad hoc network

Lee, SJ; Hsu, J; Hayashida, R; Gerla, M; Bagrodia, R, COMPUTER COMMUNICATIONS, v.26, no.7, pp.723 - 733, 2003-05

2551
Selective advance reservations based on host movement detection and resource-aware handoff

Lee, K; Kim, Myungchul; Yu, CS; Lee, B; Hong, S, INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, v.19, pp.163 - 184, 2006-03

2552
Selective AP probing for indoor positioning in a large and AP-dense environment

Jeon, Seokseong; Jeong, Jae-Pil; Suh, Young-Joo; Yu, Chansu; Han, Dongsoo, JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, v.99, pp.47 - 57, 2017-12

2553
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System

Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.15, pp.526 - 538, 2020-01

2554
Selective conjunction of context-sensitivity and octagon domain toward scalable and precise global static analysis

Heo, Kihong; Oh, Hakjoo; Yi, Kwangkeun, SOFTWARE-PRACTICE & EXPERIENCE, v.47, no.11, pp.1677 - 1705, 2017-11

2555
Selective Context-Sensitivity Guided by Impact Pre-Analysis

Oh, Hakjoo; Lee, Wonchan; Heo, Kihong; Yang, Hongseok; Yi, Kwangkeun, ACM SIGPLAN NOTICES, v.49, no.6, pp.475 - 484, 2014-06

2556
Selective Poisoning Attack on Deep Neural Networks

Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, SYMMETRY-BASEL, v.11, no.7, 2019-07

2557
Selective Untargeted Evasion Attack: An Adversarial Example That Will Not Be Classified as Certain Avoided Classes

Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, IEEE ACCESS, v.7, pp.73493 - 73503, 2019-06

2558
Selective X-Sensitive Analysis Guided by Impact Pre-Analysis

Oh, Hakjoo; Lee, Wonchan; Heo, Kihong; Yang, Hongseok; Yi, Kwangkeun, ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, v.38, no.2, 2016-01

2559
Self-Attention LSTM-FCN model for arrhythmia classification and uncertainty assessment

Park, JaeYeon; Lee, Kichang; Park, Noseong; You, Seng Chan; Ko, JeongGil, ARTIFICIAL INTELLIGENCE IN MEDICINE, v.142, 2023-08

2560
Self-certified signatures

Lee, Byoungcheon; Kim, Kwangjo, PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2551, pp.199 - 214, 2002-12

Discover

Type

Open Access

Date issued

. next

rss_1.0 rss_2.0 atom_1.0