CS-Conference Papers(학술회의논문)

Recent Items

Collection's Items (Sorted by Submit Date in Descending order): 121 to 140 of 5726

121

Neural Theorem Prover with Word Embedding for Efficient Automatic Annotation

Yang, Wonsuk; Park, Hancheol; Park, Jong-CheolresearcherProceedings of the 28th Annual Conference on Human and Cognitive Language Technology (HCLT)Proceedings of the 28th Annual Conference on Human and Cognitive Language Technology (HCLT), pp.79 - 84, 2016-10

122

NEW METHOD OF VIEW SYNTHESIS FOR SOLID MODELLING.

Chung WonrlangresearcherInternational Conference and Exhibition on Computers in Design EngineeringCAD 84, 6th International Conference and Exhibition on Computers in Design Engineering., pp.470 - 480, 1984-04

123

간략화한 Telegram의 상관 평문 문자에 대한 avalanche 검증

이지은; 강웅규; 정민; 최락용; 김광조researcher한국정보보호학회2016년 한국정보보호학회 동계학술대회 (CISC-W'16), 2016-12-03

124

Detecting Active Attacks in WiFi Network by Semi-supervised Deep Learning

Aminanto, Erza; 김광조researcher한국정보보호학회2016년 한국정보보호학회 동계학술대회 (CISC-W'16), 2016-12-03

125

블록체인을 이용한 스마트 그리드 시스템의 기기 인증 방안

이성훈; 김광조researcher한국정보보호학회2016년 한국정보보호학회 동계학술대회 (CISC-W'16), 2016-12-03

126

Timing and fault attacks on lattice-based cryptographic libraries

An, Hyeongcheol; Kim, Sungsook; Lee, Jeeun; Choi, Rakyong; Kim, KwangjoresearcherIEICE Technical Committee on Information Security2017 Symposium on Cryptography and Information Security (SCIS 2017), 2017-01-25

127

A classification of lattice-based trapdoor functions

Choi, Rakyong; Kim, KwangjoresearcherIEICE Technical Committee on Information Security2017 Symposium on Cryptography and Information Security (SCIS 2017), 2017-01-25

128

Design of new linearly homomorphic signatures on lattice

Choi, Rakyong; Kim, KwangjoresearcherIEICE Technical Committee on Information Security2017 Symposium on Cryptography and Information Security (SCIS 2017), 2017-01-25

129

Weighted feature selection techniques for detecting impersonation attack in Wi-Fi networks

Aminanto, Erza; Tanuwidjaja, Harry; Yoo, Paul D.; Kim, KwangjoresearcherIEICE Technical Committee on Information Security2017 Symposium on Cryptography and Information Security (SCIS 2017), 2017-01-25

130

Security analysis of end-to-end encryption in Telegram

Lee, Jeeun; Choi, Rakyong; Kim, Sungsook; Kim, KwangjoresearcherIEICE Technical Committee on Information Security2017 Symposium on Cryptography and Information Security (SCIS 2017), 2017-01-26

131

래티스 기반 키 교환 프로토콜의 비교

안형철; 최락용; 이지은; 김광조researcher한국정보보호학회2017년 한국정보보호학회 하계학술대회 (CISC-S'17), 2017-06-23

132

Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning

Aminanto, Erza; Kim, KwangjoresearcherKorea Institute of Information Security and CryptologyThe 18th World Conference on Information Security Applications (WISA 2017), 2017-08

133

Tree-oriented vs. line-oriented observation-based slicing

Binkley, Dave; Gold, Nicolas; Islam, Syed; Krinke, Jens; Yoo, ShinresearcherIEEE COMPUTER SOCSource Code Analysis and Manipulation (SCAM), 2017-09-17

134

Constrained Bayesian Reinforcement Learning via Approximate Linear Programming

Lee, Jongmin; Jang, Youngsoo; Poupart, Pascal; Kim, Kee-EungresearcherScaling-Up Reinforcement Learning Workshop at ECML PKDD 2017Scaling-Up Reinforcement Learning Workshop at ECML PKDD 2017, 2017-09-18

135

Learning Task Structure Via Sparsity Grouped Multitask Learning

Kshirsagar, Meghana; Yang, Eunhoresearcher; Lozano, AurelieEuropean Conference on Machine Learning and Principles and Practice of Knowledge DiscoveryEuropean Conference on Machine Learning and Principles and Practice of Knowledge Discovery, 2017-09-19

136

Generative Local Metric Learning for Kernel Regression

Noh, Yung-Kyun; Sugiyama, Masashi; Kim, Kee-Eungresearcher; Park, Frank; Lee, DanielNeural Information Processing Systems FoundationAdvances in Neural Information Processing Systems, 2017-12-04

137

GAN-D: Generative Adversarial Networks for Image Deconvolution

Lee, Hayeon; Kwak, Jin-Myung; Ban, Byunghyun; Na, Seon-Jin; Lee, Se-Ra; Lee, Heung-KyuresearcherIEEE Computer Society8th Int. Conf. on ICT Convergence, pp.132 - 137, 2017-10-18

138

IMF: Inferred Model-based Fuzzer

Han, HyungSeok; Cha, Sang KilresearcherACM Special Interest Group on Security, Audit and Control (SIGSAC)ACM Conference on Computer and Communications Security, 2017-11-03

139

Urban Image Stitching using Planar Perspective Guidance

Lee, Joo Ho; Baek, Seung-Hwan; Kim, Min HyukresearcherBritish Machine Vision Association (BMVA)British Machine Vision Conference (BMVC 2017), 2017-09-04

140

Image Completion with Intrinsic Reflectance Guidance

Kim, Soomin; Kim, Taeyoung; Kim, Min Hyukresearcher; Yoon, Sung-EuiresearcherBritish Machine Vision Association (BMVA)British Machine Vision Conference (BMVC 2017), 2017-09-04

rss_1.0 rss_2.0 atom_1.0