Results 1-10 of 18 (Search time: 0.007 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
CAPTCHA Image Generation: Two-Step Style-Transfer Learning in Deep Neural Networks![]() Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, SENSORS, v.20, no.5, pp.1495, 2020-03 | |
Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.4, 2020-04 | |
Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.4, 2020-04 | |
Observing Actions through Immersive Virtual Reality Enhances Motor Imagery Training Choi, Jin Woo; Kim, Byung Hyung; Huh, Sejoon; Jo, Sung-Ho, IEEE TRANSACTIONS ON NEURAL SYSTEMS AND REHABILITATION ENGINEERING, v.28, no.7, pp.1614 - 1622, 2020-07 | |
순환 신경망을 활용한 코드 변경 추천 시스템의 학습 시간 단축 방법 배병일; 강성원; 이선아, 정보과학회논문지, v.47, no.10, pp.948 - 957, 2020-10 | |
PASS: Reducing Redundant Notifications between a Smartphone and a Smartwatch for Energy Saving Lee, Jemin; Lee, Uichin; Kim, Hyungshin, IEEE TRANSACTIONS ON MOBILE COMPUTING, v.19, no.11, pp.2656 - 2669, 2020-11 | |
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.15, pp.526 - 538, 2020-01 | |
시계열 access log data를 이용한 IT 인프라 이상징후 감지 앙상블 모델 김정원; 최호진, 정보과학회논문지, v.48, no.9, pp.1035 - 1043, 2021-09 | |
Machine Learning for Practical Localization System Using Multiview CSI![]() Kim, Minseuk; Han, Dongsoo; Rhee, June-Koo Kevin, IEEE ACCESS, v.8, pp.184575 - 184584, 2020-10 | |
SLO-Aware Inference Scheduler for Heterogeneous Processors in Edge Platforms![]() Seo, Wonik; Kim, Yeonjae; Cha, Sanghoon; Huh, Jaehyuk; Park, Jongse, ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, v.18, no.4, pp.1 - 26, 2021-07 |
Discover