Showing results 2541 to 2560 of 4025
Security of a multisignature scheme for specified group of verifiers Lv, Jiquing; Wang, Xinmei; Kim, Kwangjo, APPLIED MATHEMATICS AND COMPUTATION, v.166, pp.58 - 63, 2005-07 |
Security of permutation-based compression function lp231 Lee, Jooyoung; Kwon, Daesung, INFORMATION PROCESSING LETTERS, v.114, no.7, pp.372 - 381, 2014-07 |
Security of the Misty Structure beyond the Birthday Bound Lee, Jooyoung, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E97A, no.7, pp.1516 - 1522, 2014-07 |
Security of the Misty Structure Using Involutions as Round Functions Lee, Jooyoung; Koo, Bonwook, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E93A, no.9, pp.1612 - 1619, 2010-09 |
Security offloading network system for expanded security coverage in IPv6-based resource constrained data service networks Han, Jiyong; Kim, Daeyoung, WIRELESS NETWORKS, v.26, no.6, pp.4615 - 4635, 2020-08 |
SEDRIS Transmittal Storing and Retrieval System using Relational Databases Kim, Yong Kwon; Yang, Hee Jung; Chung, Chin Wan, JOURNAL OF DATABASE MANAGEMENT, v.25, no.4, pp.38 - 65, 2014-10 |
Segmental reliability weighting for robust recognition of partly corrupted speech Cho, HY; Kim, LY; Oh, Yung-Hwan, ELECTRONICS LETTERS, v.38, no.12, pp.611 - 612, 2002-06 |
Segmentation of handwritten characters for digitalizing Korean historical documents Kim, MS; Cho, KT; Kwag, HK; Kim, JinHyung, DOCUMENT ANALYSIS SYSTEMS VI, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3163, pp.114 - 124, 2004 |
Sego: Pervasive Trusted Metadata for Efficiently Verified Untrusted System Services Kwon, Youngjin; Dunn, Alan M.; Lee, Michael Z.; Hofmann, Owen S.; Xu, Yuanzhong; Witchel, Emmett, ACM SIGPLAN NOTICES, v.51, no.4, pp.277 - 290, 2016-04 |
Selecting a routing strategy for your ad hoc network Lee, SJ; Hsu, J; Hayashida, R; Gerla, M; Bagrodia, R, COMPUTER COMMUNICATIONS, v.26, no.7, pp.723 - 733, 2003-05 |
Selective advance reservations based on host movement detection and resource-aware handoff Lee, K; Kim, Myungchul; Yu, CS; Lee, B; Hong, S, INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, v.19, pp.163 - 184, 2006-03 |
Selective AP probing for indoor positioning in a large and AP-dense environment Jeon, Seokseong; Jeong, Jae-Pil; Suh, Young-Joo; Yu, Chansu; Han, Dongsoo, JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, v.99, pp.47 - 57, 2017-12 |
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.15, pp.526 - 538, 2020-01 |
Selective conjunction of context-sensitivity and octagon domain toward scalable and precise global static analysis Heo, Kihong; Oh, Hakjoo; Yi, Kwangkeun, SOFTWARE-PRACTICE & EXPERIENCE, v.47, no.11, pp.1677 - 1705, 2017-11 |
Selective Context-Sensitivity Guided by Impact Pre-Analysis Oh, Hakjoo; Lee, Wonchan; Heo, Kihong; Yang, Hongseok; Yi, Kwangkeun, ACM SIGPLAN NOTICES, v.49, no.6, pp.475 - 484, 2014-06 |
Selective Poisoning Attack on Deep Neural Networks Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, SYMMETRY-BASEL, v.11, no.7, 2019-07 |
Selective Untargeted Evasion Attack: An Adversarial Example That Will Not Be Classified as Certain Avoided Classes Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, IEEE ACCESS, v.7, pp.73493 - 73503, 2019-06 |
Selective X-Sensitive Analysis Guided by Impact Pre-Analysis Oh, Hakjoo; Lee, Wonchan; Heo, Kihong; Yang, Hongseok; Yi, Kwangkeun, ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, v.38, no.2, 2016-01 |
Self-Attention LSTM-FCN model for arrhythmia classification and uncertainty assessment Park, JaeYeon; Lee, Kichang; Park, Noseong; You, Seng Chan; Ko, JeongGil, ARTIFICIAL INTELLIGENCE IN MEDICINE, v.142, 2023-08 |
Self-certified signatures Lee, Byoungcheon; Kim, Kwangjo, PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2551, pp.199 - 214, 2002-12 |
Discover