Showing results 33861 to 33880 of 51620
Secure quantum communication by preserving an optimal measurement Bae, Joonwoo, QCrypt2019, University of Montreal, 2019-08-29 |
Secure Remote Desktop with Necklace-Type Security Device Park, Kyu Ho; Seok, Hyunchul; Park, Ki-Woong, IEEE International Symposium on ISWC, IEEE, 2010-10 |
Secure Transmission for Hierarchical Information Accessibility in Downlink MU-MIMO Lee, Kanguk; Choi, Jinseok; Kim, Dong Ku; Park, Jeonghun, IEEE TRANSACTIONS ON COMMUNICATIONS, v.70, no.9, pp.6181 - 6195, 2022-09 |
Secure transmission for multi-antenna two-way relay cellular networks with no eavesdropper's CSI Lee, Jae Hwan; Kang, Jae Mo; Kim, Hyung Myung, 22nd International Conference on Telecommunications: ICT 2015, Engineers Australia, 2015-04 |
Secure transmission in downlink cellular network with a Cooperative Jammer Jeong, S.; Lee, Keon-Kook; Huh, Hoon; Kang, Joonhyuk, IEEE Wireless Communications Letters, v.2, no.4, pp.463 - 466, 2013-08 |
Secure transmission using lens antenna array in millimeter wave MISO systems = 밀리미터 대역 MISO 시스템에서 렌즈 안테나 어레이를 사용하여 통신의 보안을 유지하는 방법에 대한 연구link Lee, Hyojin; Kang, Joonhyuk; et al, 한국과학기술원, 2020 |
Secure Transmission via Lens Antenna Array in Millimeter Wave MISO Systems Lee, Hyojin; Kim, WanJik; Kang, Joonhyuk, 2019 IEEE Military Communications Conference, MILCOM 2019, Institute of Electrical and Electronics Engineers Inc., 2019-11 |
Secure Type-Based Muliple Access with Power Control 황대성; 전형석; 이혁재; 하정석, 2011 JCCI - the 21th Joint Conference on Communications & Information, JCCI, 2011-05 |
Secure Type-Based Multiple Access Jeon, Hyoungsuk; Hwang, Daesung; Choi, JH; Lee, HyuckJae; Ha, Jeongseok, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.6, pp.763 - 774, 2011-09 |
Secure type-based multiple access: transmission strategy and analysis for perfect secrecy Ha, Jeongseok, IEEE ITW 2010, IEEE, 2009-12 |
Secure type-based multiple access: Transmission strategy and analysis for perfect secrecy Jeon, Hyoungsuk; Hwang, Daesung; Lee, Hyuck-Jae; Ha, Jeongseok; Choi, Jinho, Information Theory Workshop (ITW), 2010 IEEE, pp.1 - 5, IEEE, 2010-08-30 |
Secure UAV Communications with Transmit-array Antenna Kim, Jeongbin; Gong, Jinu; KIM, SANGHYUK; Kang, Joonhyuk, 2022 The Seventh International Conference On Consumer Electronics (ICCE) Asia, Institute of Electrical and Electronics Engineers Inc., 2022-10-27 |
Secure uplink transmission strategy for deep learning-based surveillance UAV = 인공지능 기반 감시 무인 항공기의 보안성 강화 상향링크 송신 전략link KIM, Hee-Chan; 김희찬; et al, 한국과학기술원, 2024 |
Secure wireless communication evading eavesdropper via adversarial machine learning = 보안성 높은 무선통신을 위한 적대적 기계학습 기반의 도청자 회피 기법link Seo, Junghaa; Kang, Joonhyuk; et al, 한국과학기술원, 2022 |
Secure wireless communication via adversarial machine learning: A Priori vs. A Posteriori Seo, Junghaa; Park, Sangwoo; Kang, Joonhyuk, ICT EXPRESS, v.8, no.2, pp.220 - 224, 2022-06 |
SecureLinQ: Joint Precoding and Scheduling for Secure Device-to-Device Networks Choi, Jinseok; Park, Jeonghun, IEEE WIRELESS COMMUNICATIONS LETTERS, v.9, no.12, pp.2078 - 2082, 2020-12 |
Securing Distributed Storage: Challenges, Techniques, and Systems, Kher, V; Kim, Yongdae, International Workshop onStorage Security and Survivability 2005, ACM, 2005-11-11 |
Securing software-defined WAN through analyzing network attack surfaces = 네트워크 공격 표면 분석을 통한 소프트웨어 정의 WAN 보안성 향상에 관한 연구link Kim, Jinwoo; Shin, Seungwon; et al, 한국과학기술원, 2022 |
Securing Web Service by Automatic Robot Detection Park, KyoungSoo, USENIX Annual Technical Conference (USENIX ATC), USENIX, 2006-06-02 |
Security analysis of FHSS-based drone controller = 주파수 도약식 드론 조종기의 보안성 분석link SHIN, HOCHEOL; 신호철; et al, 한국과학기술원, 2015 |
Discover