Showing results 121 to 140 of 15262
Efficient exact k-flexible aggregate nearest neighbor search in road networks using the M-tree Chung, Moonyoung; Hyun, Soon-Jooresearcher; Loh, Woong-Kee, JOURNAL OF SUPERCOMPUTING, v.78, no.14, pp.16286 - 16302, 2022-09 |
3rdParTEE: Securing Third-Party IoT Services Using the Trusted Execution Environment Jang, Jinsoo; Kang, Brent Byunghoonresearcher, IEEE INTERNET OF THINGS JOURNAL, v.9, no.17, pp.15814 - 15826, 2022-09 |
Yin-Yang: Programming Abstractions for Cross-Domain Multi-Acceleration Kim, Joon Kyung; Ahn, Byung Hoon; Kinzer, Sean; Ghodrati, Soroush; Mahapatra, Rohan; Yatham, Brahmendra; Wang, Shu-Ting; et al, IEEE MICRO, v.42, no.5, pp.89 - 98, 2022-09 |
FuzzDocs: An Automated Security Evaluation Framework for IoT You, Myoungsung; Kim, Yeonkeun; Kim, Jaehan; Seo, Minjae; Son, Sooelresearcher; Shin, Seungwonresearcher; Lee, Seungsoo, IEEE ACCESS, v.10, no.0, pp.102406 - 102420, 2022-09 |
Bayesian inductive learning in group recommendations for seen and unseen groups Lee, Kwang Hee; Kim, Myoung Horesearcher, INFORMATION SCIENCES, v.610, pp.725 - 745, 2022-09 |
Self-supervised Learning for Medical Image 박진아researcher; 강인하, 제36회 대한의학영상정보학회 학술대회, 대한의학영상정보학회, 2022-08-27 |
Label Geometry Aware Discriminator for Conditional Generative Networks Sapkota, Suman; Bhattarai, Binod; Kim, Tae-Kyunresearcher, 26th International Conference on Pattern Recognition, ICPR 2022, IAPR, IEEE, 2022-08-22 |
Adaptive Model Pooling for Online Deep Anomaly Detection from a Complex Evolving Data Stream Yoon, Susik; Lee, Youngjun; Lee, Jae-Gilresearcher; Lee, Byung Suk, 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, KDD 2022, pp.2347 - 2357, Association for Computing Machinery, 2022-08-16 |
SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis Chen, Ju; Han, Wookhyun; Yin, Mingjun; Zeng, Haochen; Song, Chengyu; Lee, Byoungyoung; Yin, Heng; et al, 31st USENIX Security Symposium, Security 2022, pp.2531 - 2548, USENIX, 2022-08-11 |
Watching the Watchers: Practical Video Identification Attack in LTE Networks Base, Sangwook; Son, Mincheol; Kim, Donghwan; Park, CheolJun; Lee, Jiho; Son, Sooelresearcher; Kim, Yongdaeresearcher, 31th USENIX Security Symposium (USENIX Security 2022), 31th USENIX Security Symposium (USENIX Security 2022), 2022-08-10 |
FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities Park, Sunnyeo; Kim, Daejun; Jana, Suman; Son, Sooelresearcher, 31th USENIX Security Symposium (USENIX Security 2022), 31th USENIX Security Symposium (USENIX Security 2022), 2022-08-10 |
Differentiable Appearance Acquisition from a Flash/No-flash RGB-D Pair Ku, Hyun Jin; Ha, Hyunho; Lee, Joo Ho; Kang, Dahyun; Tompkin, James; Kim, Min Hyukresearcher, International Conference on Computational Photography, ICCP 2022, IEEE, 2022-08-03 |
Downscaling Earth System Models with Deep Learning Park, Sungwon; Singh, Karandeep; Nellikkattil, Arjun; Zeller, Elke; Mai, Tung Duong; Cha, Meeyoungresearcher, 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, KDD 2022, pp.3733 - 3742, Association for Computing Machinery, 2022-08 |
Computer Science for Continuous Data: Survey, Vision, Theory, and Practice of a Computer Analysis System Brauße, Franz; Collins, Pieter; Ziegler, Martin Aresearcher, 24th International Workshop on Computer Algebra in Scientific Computing, CASC 2022, pp.62 - 82, Springer Science and Business Media Deutschland GmbH, 2022-08 |
Learning JPEG Compression Artifacts for Image Manipulation Detection and Localization Kwon, Myung-Joon; Nam, Seung-Hun; Yu, In-Jae; Lee, Heung-Kyuresearcher; Kim, Changickresearcher, INTERNATIONAL JOURNAL OF COMPUTER VISION, v.130, no.8, pp.1875 - 1895, 2022-08 |
TENAS: Using Taylor Expansion and Channel-level Skip Connection for Neural Architecture Search Lim, Heechul; Kim, Min-Sooresearcher, IEEE ACCESS, v.10, pp.84790 - 84798, 2022-08 |
Exploiting Missing Value Patterns for a Backdoor Attack on Machine Learning Models of Electronic Health Records: Development and Validation Study Joe, Byunggill; Park, Yonghyeon; Hamm, Jihun; Shin, Insikresearcher; Lee, Jiyeon, JMIR MEDICAL INFORMATICS, v.10, no.8, 2022-08 |
A Telemanipulation Suite for Deformable Object Manipulation 박봉경; 박대형researcher; 안찬영, 2022 한국인공지능학회 하계학술대회, 한국인공지능학회, 2022-08 |
WonderScope: Practical Near-surface AR Device for Museum Exhibits Yi, HyeonBeom; Shin, Yeeun; Lee, Sehee; Youn, Eunhye; Ham, Auejin; Lee, Geehyukresearcher; Lee, Woohunresearcher, Emerging Technologies, SIGGRAPH 2022, Association for Computing Machinery, Inc, 2022-08 |
고차 그래프 뉴럴 네트워크를 활용한 이질형 그래프에서의 링크 예측 안성진; 김명호researcher, 정보과학회 컴퓨팅의 실제 논문지, v.28, no.8, pp.421 - 426, 2022-08 |
Discover