199 results on '"Yoon, Hyunsoo"'
Search Results
2. Biologically-informed deep neural networks provide quantitative assessment of intratumoral heterogeneity in post-treatment glioblastoma
3. Detection of Fall Risk Behaviors in Patients with Severe Mobility Issues Using FMCW Radar: Sitting Up and Sitting on the Side of the Bed
4. Evaluation of the impact of intensive PM2.5 reduction policy in Seoul, South Korea using machine learning
5. Avatar: Adversarial Self-Supervised Domain Adaptation Network for Target Domain
6. A Shoreline Change Prediction Technique Combining Physics and Data-driven Model
7. A framework for generalizing critical heat flux detection models using unsupervised image-to-image translation
8. CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network
9. Pontine Infarction Presenting as Millard-Gubler Syndrome
10. Harmonizing Healthy Cohorts to Support Multicenter Studies on Migraine Classification using Brain MRI Data
11. One-Pixel Adversarial Example that Is Safe for Friendly Deep Neural Networks
12. OpenCL Based Implementation of ECDSA Signature Verification for V2X Communication
13. Friend-Safe Adversarial Examples in an Evasion Attack on a Deep Neural Network
14. Detecting Online Game Chargeback Fraud Based on Transaction Sequence Modeling Using Recurrent Neural Network
15. Uniformaly: Towards Task-Agnostic Unified Framework for Visual Anomaly Detection
16. Eigen-Entropy: A metric for multivariate sampling decisions
17. Mobile Thrombus with an Ulcerative Plaque Diagnosed Using Ultrasonography in a Patient with Nonstenotic Carotid Artery Disease
18. A Case of Klebsiella pneumoniae Meningitis Associated with Brain Abscess and Endophthalmitis
19. Biologically-informed deep neural networks provide quantitative assessment of intratumoral heterogeneity in post-treatment glioblastoma
20. Enhanced measurement of human activity using FMCW radar
21. A cosine-based correlation information entropy approach for building automatic fault detection baseline construction
22. Why is sub‐Saharan Africa an attractive destination to foreign land grabbers? Evidence from country characteristics
23. Real vs. simulated: Questions on the capability of simulated datasets on building fault detection for energy efficiency from a data-driven perspective
24. Fully Batch Processing Enabled Memory Integrity Verification Algorithm Based on Merkle Tree
25. Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants
26. A Novel Semi-Supervised Learning Model for Smartphone-Based Health Telemonitoring
27. Prediction of fall risk among community-dwelling older adults using a wearable system
28. Health literacy and health information-seeking behavior of immigrants in South Korea
29. An Efficient Audit Scheme for Cloud Storage
30. Protecting Mobile Devices from Adversarial User by Fine-Grained Analysis of User Behavior
31. Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage
32. OTEH-6. Algorithmic approach to characterize post-treatment recurrent glioma using RNA sequencing and quantitative histopathology
33. Deep learning strategies for critical heat flux detection in pool boiling
34. Mind control attack: Undermining deep learning with GPU memory exploitation
35. The Design of a Policy-based Attack-Resilient Intrusion Tolerant System
36. A Novel Intrusion Tolerant System Based on Adaptive Recovery Scheme (ARS)
37. A Secure Self-Encryption Scheme for Resource Limited Mobile Devices
38. A novel multi-task linear mixed model for smartphone-based telemonitoring
39. Prediction of Fall Risk Among Community-Dwelling Older Adults Using a Wearable System
40. An intelligent recommendation algorithm for red team strategy in edge computing powered massive Cyber Defense Exercise
41. Acoustic-decoy: Detection of adversarial examples through audio modification on speech recognition system
42. A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks
43. An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks
44. Classification score approach for detecting adversarial example in deep neural network
45. Artificial Intelligence for the Computer-aided Detection of Periapical Lesions in Cone-beam Computed Tomographic Images
46. A feature transfer enabled multi-task deep learning model on medical imaging
47. Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods
48. Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks
49. CAPTCHA Image Generation: Two-Step Style-Transfer Learning in Deep Neural Networks
50. TargetNet Backdoor
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.