Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Shape Prior is Not All You Need: Discovering Balance Between Texture and Shape Bias in CNN

    As Convolutional Neural Network (CNN) trained under ImageNet is known to be biased in image texture rather than object shapes, recent works proposed that elevating shape awareness of the CNNs makes them simila...

    Hyunhee Chung, Kyung Ho Park in Computer Vision – ACCV 2022 (2023)

  2. No Access

    Chapter and Conference Paper

    Don’t Wait Until the Accident Happens: Few-Shot Classification Framework for Car Accident Inspection in a Real World

    Car accident inspection is a binary classification task to recognize whether a given car image includes a damaged surface or not. While the prior studies utilized various computer vision algorithms under the f...

    Kyung Ho Park, Hyunhee Chung in Image Analysis and Processing – ICIAP 2022 (2022)

  3. No Access

    Chapter and Conference Paper

    Unsupervised Driver Behavior Profiling Leveraging Recurrent Neural Networks

    In the era of intelligent transportation, driver behavior profiling has become a beneficial technology as it provides knowledge regarding the driver’s aggressiveness. Previous approaches achieved promising dri...

    Young Ah Choi, Kyung Ho Park, Eunji Park, Huy Kang Kim in Information Security Applications (2021)

  4. No Access

    Chapter and Conference Paper

    Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort

    Along with the importance of safety, an IDS has become a significant task in the real world. Prior studies proposed various intrusion detection models for the UAV. Past rule-based approaches provided a concret...

    Kyung Ho Park, Eunji Park, Huy Kang Kim in Information Security Applications (2020)

  5. No Access

    Chapter and Conference Paper

    Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM

    With the rapid growth of MMORPG market, game bot detection has become an essential task for maintaining stable in-game ecosystem. To classify bots from normal users, detection methods are proposed in both game...

    Kyung Ho Park, Eunjo Lee, Huy Kang Kim in Information Security Applications (2020)

  6. No Access

    Chapter and Conference Paper

    A Multi-protocol Baseband Modem Processor for a Mobile RFID Reader

    In RFID (Radio Frequency IDentification) systems, a tag reader communicates with tags, reads their identification codes, and accesses their related database through network infrastructure. There are many resea...

    Seok Joong Hwang, Joon Goo Lee, Seon Wook Kim in Embedded and Ubiquitous Computing (2006)