CS-Conference Papers(학술회의논문)

Recent Items

Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 5534

1

An Extension of Topic Models for Text Classification: a Term Weighting Approach

Lee, Seonggyu; Kim, Jinho; Myaeng, Sung-HyonresearcherKIISESecond International Conference on Big Data and Smart Computing (BigComp2015), 2015-02-10

2

Constrained Bayesian Reinforcement Learning via Approximate Linear Programming

Lee, Jongmin; Jang, Youngsoo; Poupart, Pascal; Kim, Kee-EungresearcherInternational Joint Conferences on Artificial Intelligence Organization (IJCAI)26th International Joint Conference on Artificial Intelligence, 2017-08-24

3

Mobility of Everything (MoE): An Integrated and Distributed Mobility Management

Han, Sang Yup; Park, Jaehyun; Kim, Haeun; Ha, Jaehee; Shin, Seungwonresearcher; Kang, Sungwon; Kim, Myung-ChulIEEEThe 26th International Conference on Computer Communications and Networks (ICCCN 2017), 2017-07-31

4

Ordinal Graphical Models: A Tale of Two Approaches

Suggala, Arun Sai; Yang, Eunhoresearcher; Ravikumar, PradeepInternational Machine Learning Society (IMLS)International Conference on Machine Learning (ICML) 34, 2017-08-06

5

Sparse + Group-Sparse Dirty Models: Statistical Guarantees without Unreasonable Conditions and a Case for Non-Convexity.

Yang, Eunhoresearcher; Lozano, AurelieInternational Machine Learning Society (IMLS)International Conference on Machine Learning (ICML) 34, 2017-08-06

6

A Dynamic Packet Fragmentation Extension to High Throughput WLANs for Real-Time H264/AVC Video Streaming

Abdullayev, Jalil; Shin, Byoungheon; Lee, Dong-ManresearcherCFIThe 10th International Conference on Future Internet Technologies (CFI2015), 2015-06-08

7

Multi-property-preserving domain extension using polynomial-based modes of operation

Lee, Jooyoungresearcher; Steinberger, JohnInternational Association for Cryptologic Research (IACR)29th in the Series of EuropeanConferences on the Theory and Application of Cryptographic Techniques, Eurocrypt 2010, pp.573 - 596, 2010-05-30

8

MJH: A faster alternative to MDC-2

Lee, Jooyoungresearcher; Stam, MartijnRSA11th Cryptographers' Track at the RSA Conference 2011: Topics in Cryptology, CT-RSA 2011, pp.213 - 236, 2011-02-14

9

The collision security of tandem-DM in the ideal cipher model

Lee, Jooyoungresearcher; Stam, Martijn; Steinberger, JohnInternational Association for Cryptologic Research (IACR)31st Annual International Cryptology Conference, CRYPTO 2011, pp.561 - 577, 2011-08-14

10

The preimage security of double-block-length compression functions

Armknecht, Frederik; Fleischmann, Ewan; Krause, Matthias; Lee, Jooyoungresearcher; Stam, Martijn; Steinberger, JohnIACR17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, pp.233 - 251, 2011-12-04

11

Minimizing the two-round Even-Mansour cipher

Chen, Shan; Lampe, Rodolphe; Lee, Jooyoungresearcher; Seurin, Yannick; Steinberger, JohnInternational Association for Cryptologic Research (IACR)34rd Annual International Cryptology Conference, CRYPTO 2014, pp.39 - 56, 2014-08-17

12

The security of multiple encryption in the ideal cipher model

Dai, Yuanxi; Lee, Jooyoungresearcher; Mennink, Bart; Steinberger, JohnInternational Association for Cryptologic Research (IACR)34rd Annual International Cryptology Conference, CRYPTO 2014, pp.20 - 38, 2014-08-17

13

Relaxing full-codebook security: A refined analysis of key-length extension schemes

Gaži, Peter; Seurin, Yannick; Lee, Jooyoungresearcher; Steinberger, John; Tessaro, StefanoSpringer Verlag22nd International Workshop on Fast Software Encryption, FSE 2015, pp.319 - 341, 2015-03-08

14

An Efficient Affine Equivalence Algorithm for Multiple S-Boxes and a Structured Affine Layer

Lee, Jooyoungresearcher; Cheon, Jung Hee; Hong, Hyunsook; Lee, JooheeMemorial University of NewfoundlandSelected Areas in Cryptography, 2016-08-12

15

Mode-expanded hybrid optical fiber Lissajous scanning probe for high signal-to-noise confocal imaging

장경원; 정기훈researcher; 양성표; 백승환; 김민혁(사)마이크로나노시스템학회KMEMS 2017, 2017-03-31

16

Protego: Cloud-Scale Multitenant IPsec Gateway

Jeongseok Son†; Moon, Sue-Bokresearcher; Yongqiang Xiong; Paul Wang; Ze Gan; Kun TanUSENIXUSENIX Annual Technical Conference 2017 (ATC '17), 2017-07-13

17

Toward building memory-safe network functions with modest performance overhead

Moon, Sue-BokresearcherUSENIXUSENIX Security '17, 2017-08-16

18

Hacking in Darkness: Return-oriented Programming against Secure Enclaves

Lee, JaeHyuk; Jinsoo Jang; Yeongjin Jang; Kwak, Nohyun; Choi, Yeseul; Choi, Changho; Taesoo Kim; Kang, Brent ByunghoonresearcherUSENIXUSENIX Security Symposium 2017, 2017-08-17

19

Observing Behaviors of Information Diffusion Models for Diverse Topics of Posts on VK

Myaeng, Sung-Hyonresearcher; Aisylu Khairullina; Jooyoung Lee; Gwan JangIEEEMobility Analytics from Spatial and Social Data, 2015-11-17

20

Food hazard event extraction based on news and social media: A preliminary work

Myaeng, Sung-Hyonresearcher; Kyoung-Rok Jang; Kangwook Lee; Gwan Jang; Seungyong Jung; Min-Gwan SeoKorean Institute of Information Scientists and Engineers2016 International Conference on Big Data and Smart Computing (BigComp), 2016-01-20

rss_1.0 rss_2.0 atom_1.0