Browse "School of Computing(전산학부)" by Issue Date 

Jump to a point in the index:

Showing results 121 to 140 of 15262

121
Efficient exact k-flexible aggregate nearest neighbor search in road networks using the M-tree

Chung, Moonyoung; Hyun, Soon-Jooresearcher; Loh, Woong-Kee, JOURNAL OF SUPERCOMPUTING, v.78, no.14, pp.16286 - 16302, 2022-09

122
3rdParTEE: Securing Third-Party IoT Services Using the Trusted Execution Environment

Jang, Jinsoo; Kang, Brent Byunghoonresearcher, IEEE INTERNET OF THINGS JOURNAL, v.9, no.17, pp.15814 - 15826, 2022-09

123
Yin-Yang: Programming Abstractions for Cross-Domain Multi-Acceleration

Kim, Joon Kyung; Ahn, Byung Hoon; Kinzer, Sean; Ghodrati, Soroush; Mahapatra, Rohan; Yatham, Brahmendra; Wang, Shu-Ting; et al, IEEE MICRO, v.42, no.5, pp.89 - 98, 2022-09

124
FuzzDocs: An Automated Security Evaluation Framework for IoT

You, Myoungsung; Kim, Yeonkeun; Kim, Jaehan; Seo, Minjae; Son, Sooelresearcher; Shin, Seungwonresearcher; Lee, Seungsoo, IEEE ACCESS, v.10, no.0, pp.102406 - 102420, 2022-09

125
Bayesian inductive learning in group recommendations for seen and unseen groups

Lee, Kwang Hee; Kim, Myoung Horesearcher, INFORMATION SCIENCES, v.610, pp.725 - 745, 2022-09

126
Self-supervised Learning for Medical Image

박진아researcher; 강인하, 제36회 대한의학영상정보학회 학술대회, 대한의학영상정보학회, 2022-08-27

127
Label Geometry Aware Discriminator for Conditional Generative Networks

Sapkota, Suman; Bhattarai, Binod; Kim, Tae-Kyunresearcher, 26th International Conference on Pattern Recognition, ICPR 2022, IAPR, IEEE, 2022-08-22

128
Adaptive Model Pooling for Online Deep Anomaly Detection from a Complex Evolving Data Stream

Yoon, Susik; Lee, Youngjun; Lee, Jae-Gilresearcher; Lee, Byung Suk, 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, KDD 2022, pp.2347 - 2357, Association for Computing Machinery, 2022-08-16

129
SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis

Chen, Ju; Han, Wookhyun; Yin, Mingjun; Zeng, Haochen; Song, Chengyu; Lee, Byoungyoung; Yin, Heng; et al, 31st USENIX Security Symposium, Security 2022, pp.2531 - 2548, USENIX, 2022-08-11

130
Watching the Watchers: Practical Video Identification Attack in LTE Networks

Base, Sangwook; Son, Mincheol; Kim, Donghwan; Park, CheolJun; Lee, Jiho; Son, Sooelresearcher; Kim, Yongdaeresearcher, 31th USENIX Security Symposium (USENIX Security 2022), 31th USENIX Security Symposium (USENIX Security 2022), 2022-08-10

131
FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities

Park, Sunnyeo; Kim, Daejun; Jana, Suman; Son, Sooelresearcher, 31th USENIX Security Symposium (USENIX Security 2022), 31th USENIX Security Symposium (USENIX Security 2022), 2022-08-10

132
Differentiable Appearance Acquisition from a Flash/No-flash RGB-D Pair

Ku, Hyun Jin; Ha, Hyunho; Lee, Joo Ho; Kang, Dahyun; Tompkin, James; Kim, Min Hyukresearcher, International Conference on Computational Photography, ICCP 2022, IEEE, 2022-08-03

133
Downscaling Earth System Models with Deep Learning

Park, Sungwon; Singh, Karandeep; Nellikkattil, Arjun; Zeller, Elke; Mai, Tung Duong; Cha, Meeyoungresearcher, 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, KDD 2022, pp.3733 - 3742, Association for Computing Machinery, 2022-08

134
Computer Science for Continuous Data: Survey, Vision, Theory, and Practice of a Computer Analysis System

Brauße, Franz; Collins, Pieter; Ziegler, Martin Aresearcher, 24th International Workshop on Computer Algebra in Scientific Computing, CASC 2022, pp.62 - 82, Springer Science and Business Media Deutschland GmbH, 2022-08

135
Learning JPEG Compression Artifacts for Image Manipulation Detection and Localization

Kwon, Myung-Joon; Nam, Seung-Hun; Yu, In-Jae; Lee, Heung-Kyuresearcher; Kim, Changickresearcher, INTERNATIONAL JOURNAL OF COMPUTER VISION, v.130, no.8, pp.1875 - 1895, 2022-08

136
TENAS: Using Taylor Expansion and Channel-level Skip Connection for Neural Architecture Search

Lim, Heechul; Kim, Min-Sooresearcher, IEEE ACCESS, v.10, pp.84790 - 84798, 2022-08

137
Exploiting Missing Value Patterns for a Backdoor Attack on Machine Learning Models of Electronic Health Records: Development and Validation Study

Joe, Byunggill; Park, Yonghyeon; Hamm, Jihun; Shin, Insikresearcher; Lee, Jiyeon, JMIR MEDICAL INFORMATICS, v.10, no.8, 2022-08

138
A Telemanipulation Suite for Deformable Object Manipulation

박봉경; 박대형researcher; 안찬영, 2022 한국인공지능학회 하계학술대회, 한국인공지능학회, 2022-08

139
WonderScope: Practical Near-surface AR Device for Museum Exhibits

Yi, HyeonBeom; Shin, Yeeun; Lee, Sehee; Youn, Eunhye; Ham, Auejin; Lee, Geehyukresearcher; Lee, Woohunresearcher, Emerging Technologies, SIGGRAPH 2022, Association for Computing Machinery, Inc, 2022-08

140
고차 그래프 뉴럴 네트워크를 활용한 이질형 그래프에서의 링크 예측

안성진; 김명호researcher, 정보과학회 컴퓨팅의 실제 논문지, v.28, no.8, pp.421 - 426, 2022-08

Discover

Type

. next

Open Access

Date issued

. next

Subject

. next

rss_1.0 rss_2.0 atom_1.0