Browse "School of Computing(전산학부)" by Title 

Showing results 5361 to 5380 of 16112

5361
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier

Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; Yoon, Hyunsoo; Choi, Daeseon, COMPUTERS & SECURITY, v.78, pp.380 - 397, 2018-08

5362
Friendly-community detection considering bad relationships on social networks = 소셜 네트워크 상에서 사용자들간의 비선호도를 고려한 친밀한 커뮤니티 발견link

Kim, Sang-Yeon; 김상연; et al, 한국과학기술원, 2014

5363
FriendNet Backdoor: Indentifying Backdoor Attack that is safe for Friendly Deep Neural Network

Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, The 3rd International Conference on Software Engineering and Information Management (ICSIM 2020), ACM’s International Conference Proceedings Series, 2020-01-13

5364
FriSM: Malicious exploit kit detection via feature-based string-similarity matching

Kim, Sungjin; Kang, Brent Byunghoon, 14th International EAI Conference on Security and Privacy in Communication Networks, SecureComm 2018, pp.416 - 432, Springer Verlag, 2018-08

5365
From Anticipation to Action: Data Reveal Mobile Shopping Patterns During a Yearly Mega Sale Event in China

Guan, Muzhi; Cha, Meeyoung; Li, Yong; Wang, Yue; Sun, Jingbo, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, v.34, no.4, pp.1775 - 1787, 2022-04

5366
From awareness to resonance: enhancing socio-emotional intelligence through a socially translucent community stress = 인식에서 울림까지: 사회적 반투명 커뮤니티 스트레스를 통한 사회적-정서 지능 향상link

Choi, Ryuhaerang; Lee, Sung-Ju; et al, 한국과학기술원, 2021

5367
From Crash Consistency to Transactions

Hu, Yige; Kwon, Youngjin; Chidambaram, Vijay; Witchel, Emmett, 16th Workshop on Hot Topics in Operating Systems, HotOS 2017, pp.100 - 105, USENIX (THE ADVANCED COMPUTIONG SYSTEMS ASSOCIATION), 2017-05-08

5368
From Tensors to FPGAs: Accelerating Deep Learning

Sharma, Hardik; PARK, JONGSE; Samynathan, Balavinayagam; Robatmili, Behnam; Mirkhani, Shahrzad; Esmaeilzadeh, Hadi, Hot Chips: Symposium on High Performance Chips, IEEE/ACM, 2018-08-19

5369
From Text to Sign Language: Exploiting Spatial and Motioning Dimension

Choi, Ji-Won; Lee, Hee-Jin; Park, Jong Cheol, Association for Computational Linguistics and Chinese Language Processing, pp.61 - 69, Pacific Asia Conference on Language, Information and Computation, 2005-12-01

5370
FromTo-CLIR (TM): web-based natural language interface for cross-language information retrieval

Kim, T; Sim, CM; Yuh, S; Jung, H; Kim, YK; Choi, SK; Park, DI; et al, INFORMATION PROCESSING MANAGEMENT, v.35, no.4, pp.559 - 586, 1999-07

5371
FS-Pad: Video Game Interactions with a Force Feedback Gamepad

Shim, Youngbo; PARK, KEUNWOO; Lee, Sangyoon; Son, Jeongmin; Woo, Taeyun; Lee, Geehyuk, UIST `20: The 33rd Annual ACM Symposium on User Interface software and Technology, pp.938 - 950, ACM, 2020-10-22

5372
FSF: Code Coverage-Driven Fuzzing for Software-Defined Networking

Kim, Hyuntae; Wi, Seongil; Lee, Hyunjoo; Son, Sooel, 20th World Conference on Information Security Applications, WISA 2019, pp.41 - 54, the Korea Institute of Information Security and Cryptology (KIISC), 2019-08-22

5373
FSM에 기초한 다이나믹 테스트 시퀀스 선택

유상조; 김명철, 한국통신학회 하계종합 학술대회, 한국통신학회, 1996

5374
FSP Model을 이용한 C&C View 아키텍처의 검증

김정호; 강성원, 한국IT서비스학회 추계학술대회, pp.0 - 0, 한국IT서비스학회, 2006-11-15

5375
FTL design exploration in reconfigurable high-performance SSD for server applications

Shin, Ji-Yong; Xia, Zeng-Lin; Xu, Ning-Yi; Gao, Rui; Cai, Xiong-Fei; Maeng, SeungRyoul; Hsu, Feng-Hsiung, 23rd International Conference on Supercomputing, ICS'09, pp.338 - 349, ACM SIGARCH, 2009-06-08

5376
FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities

Park, Sunnyeo; Kim, Daejun; Jana, Suman; Son, Sooel, 31th USENIX Security Symposium (USENIX Security 2022), 31th USENIX Security Symposium (USENIX Security 2022), 2022-08-10

5377
Fully automated interoperability test suite derivation for communication protocols

Ryu, H; Seol, S; Kim, Myungchul; Kang, Sungwon, COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, v.43, no.6, pp.735 - 759, 2003-12

5378
Fully Batch Processing Enabled Memory Integrity Verification Algorithm based on Merkle Tree

Kim, Se Hwan; Kim, Yonggon; Kwon, Ohmin; Yoon, Hyunsoo, WISA 2015 - The 16th International Workshop on Information Security Applications, KIISC, 2015-08-20

5379
Fully complex deep learning classifiers for automatic modulation recognition in non-cooperative environment = 비협조적 환경에서의 자동 변조 인식용 복소수 딥러닝 분류기link

Kim, Sangkyu; Kim, Daeyoung; et al, 한국과학기술원, 2023

5380
Fully Complex Deep Learning Classifiers for Signal Modulation Recognition in Non-Cooperative Environment

Kim, Sangkyu; Yang, Hae-Yong; Kim, Daeyoung, IEEE ACCESS, v.10, pp.20295 - 20311, 2022

Discover

Type

. next

Open Access

Date issued

Subject

. next

rss_1.0 rss_2.0 atom_1.0