Skip to main content

previous disabled Page of 3
and
  1. Chapter and Conference Paper

    Correction to: Generating BlobCell Label from Weak Annotations for Precise Cell Segmentation

    In the original version of this paper some errors occurred. This was corrected.

    Suk Min Ha, Young Sin Ko, Young** Park in Graphs in Biomedical Image Analysis, and O… (2024)

  2. No Access

    Chapter and Conference Paper

    Generating BlobCell Label from Weak Annotations for Precise Cell Segmentation

    Cell segmentation in histopathological image analysis is critical for identifying cancer cells and predicting disease severity. However, manual cell labeling is time-consuming. Many experiments speed up the ge...

    Suk Min Ha, Young Sin Ko, Young** Park in Graphs in Biomedical Image Analysis, and O… (2024)

  3. No Access

    Chapter and Conference Paper

    Intrusion Detection System for Industrial Network

    Various information and communication technologies are used to control industrial infrastructure. A programmable logic controller (PLC) manages and controls the detailed areas of each facility

    Woo Young Park, Sang Hyun Kim, Duy-Son Vu in Intelligent Systems and Applications (2023)

  4. No Access

    Chapter and Conference Paper

    Forensic Analysis of Apple CarPlay: A Case Study

    Apple CarPlay is a system that puts some features of your iPhone or iPad onto the infotainment screen of a CarPlay-equipped vehicle, allowing drivers to use those features when driving. Using Apple CarPlay, dr...

    Junsu Lee, Juwon Kim, Hojun Seong, Keonyong Lee, Seong-je Cho in Mobile Internet Security (2022)

  5. No Access

    Chapter and Conference Paper

    Consumers’ Perceived Benefits and Costs for Amazon Go Based on Social Media Data Using Text Mining

    This study aims to identify the perceived benefits and costs of Amazon Go, the first unmanned store with advanced technology, based on the value-based adoption model using a text-mining technique. We collected...

    Jaehye Suk, In-Hyoung Park, Cheol Lee in HCI International 2022 – Late Breaking Pap… (2022)

  6. Chapter and Conference Paper

    Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks

    Performance prediction in wireless mobile networks is essential for diverse purposes in network management and operation. Particularly, the position of mobile devices is crucial to estimating the performance i...

    Nikhil Sai Kanuri, Sang-Yoon Chang in Silicon Valley Cybersecurity Conference (2022)

  7. Chapter and Conference Paper

    A Blockchain-Based Retribution Mechanism for Collaborative Intrusion Detection

    Collaborative intrusion detection approach uses the shared detection signature between the collaborative participants to facilitate coordinated defense. In the context of collaborative intrusion detection syst...

    Wenjun Fan, Shubham Kumar, Sang-Yoon Chang in Silicon Valley Cybersecurity Conference (2022)

  8. No Access

    Chapter and Conference Paper

    Metaverse-Driven Interactive Performing Arts Content Development

    The ongoing COVID-19 pandemic necessitated platform diversification and the revitalization of interactive performance (the metaverse), a new paradigm for the performing arts. In 2019, the authors implemented a...

    ** Young Park, Yang Kyu Lim in HCI International 2022 – Late Breaking Posters (2022)

  9. No Access

    Chapter and Conference Paper

    A Privacy Preserving E-Voting System Based on Blockchain

    An electronic voting system can enable greater democracy by allowing virtual and remote voting and facilitating greater participation. However, the e-voting systems have experienced allegations due to corrupti...

    Wenjun Fan, Shubham Kumar, Vrushali Jadhav in Silicon Valley Cybersecurity Conference (2021)

  10. No Access

    Chapter and Conference Paper

    Reconstructing Classification to Enhance Machine-Learning Based Network Intrusion Detection by Embracing Ambiguity

    Network intrusion detection systems (IDS) has efficiently identified the profiles of normal network activities, extracted intrusion patterns, and constructed generalized models to evaluate (un)known attacks us...

    Chungsik Song, Wenjun Fan, Sang-Yoon Chang in Silicon Valley Cybersecurity Conference (2021)

  11. No Access

    Chapter and Conference Paper

    An Intelligence Criminal Tracker for Industrial Espionage

    The investigation of industrial espionage basically requires significant levels of expertise and a full data recovery on an entire device. In practice, an investigator cannot conduct an in-depth examination of...

    Jieun Dokko, Michael Shin, Soo Young Park in Digital Forensics and Cyber Crime (2021)

  12. No Access

    Chapter and Conference Paper

    Security Problems of 5G Voice Communication

    In April 2019, the world’s first 5G mobile communication was commercialized in South Korea. 5G mobile communication aims to provide 20 Gbps transmission speed which is 20 times faster than 4G mobile communicat...

    Seongmin Park, Hyung** Cho, Youngkwon Park in Information Security Applications (2020)

  13. No Access

    Chapter and Conference Paper

    Unsupervised Sentence Embedding Using Document Structure-Based Context

    We present a new unsupervised method for learning general-purpose sentence embeddings. Unlike existing methods which rely on local contexts, such as words inside the sentence or immediately neighboring sentenc...

    Taesung Lee, Youngja Park in Machine Learning and Knowledge Discovery in Databases (2020)

  14. No Access

    Chapter and Conference Paper

    Multi-site Evaluation of a Study-Level Classifier for Mammography Using Deep Learning

    We present a computer-aided diagnosis algorithm for mammography trained and validated on studies acquired from six clinical sites. We hold out the full dataset from a seventh hospital for testing to assess the...

    Dustin Sargent, Sun Young Park, Amod Jog in Medical Image Computing and Computer Assis… (2020)

  15. No Access

    Chapter and Conference Paper

    An Efficient NTRU-Based Authentication Protocol in IoT Environment

    Recently, to ensure privacy of user, the numerous elliptic curve cryptosystem based key distribution and authentication protocols for IoT environments have been proposed. However, most used public key based cr...

    SeongHa Jeong, KiSung Park, YoHan Park, YoungHo Park in Intelligent Computing (2019)

  16. Chapter and Conference Paper

    UAV Set Covering Problem for Emergency Network

    Recent technology allows UAVs to be implemented not only in fields of military, videography, or logistics but also in a social security area, especially for disaster management. UAVs can mount a router and pro...

    Youngsoo Park, Ilkyeong Moon in Advances in Production Management Systems.… (2019)

  17. No Access

    Chapter and Conference Paper

    Resilient SDN-Based Communication in Vehicular Network

    Vehicular ad-hoc network (VANET) is the key component of intelligent transportation system (ITS) for various services like road safety and traffic efficiency. However, current VANET architectures provide less ...

    Kamran Naseem Kalokhe, Younghee Park in Wireless Algorithms, Systems, and Applicat… (2018)

  18. Chapter and Conference Paper

    Repair Crew Scheduling Considering Variable Disaster Aspects

    Human beings have suffered from disasters continuously, therefore, the post-disaster efforts to reduce additional damages have been widely conducted. In this study, we focused on the repair crew scheduling to ...

    Sungwoo Kim, Youngsoo Park, Kihyun Lee in Advances in Production Management Systems.… (2017)

  19. No Access

    Chapter and Conference Paper

    Cognitive-Task-Based Information Aid Design for Clinical Diagnosis

    Clinical diagnosis systems are increasingly supported by advanced information technology but enhancing human diagnosis performance with intelligent aiding has not been found guaranteed. Diagnosis is an intense...

    Dong-Gyun Ko, Youkyoung Park, Yoochan Kim in AI 2016: Advances in Artificial Intelligen… (2016)

  20. No Access

    Chapter and Conference Paper

    Predicting Multiple Pregras** Poses by Combining Deep Convolutional Neural Networks with Mixture Density Networks

    In this paper, we propose a deep neural network to predict the pregrasp poses of a three-dimensional (3D) object. Specifically, a single RGB-D image is used to determine multiple pregrasp position of three fin...

    Sungphill Moon, Youngbin Park, Il Hong Suh in Neural Information Processing (2016)

previous disabled Page of 3