Directions
AI technology is contributing greatly to enhancing the accuracy of automatic security vulnerability detection technology. At the same time, countermeasures against security threats targeting AI itself are being actively developed.
Crowdsourcing in the Development of a Multilingual FrameNet: A Case Study of Korean FrameNet
Young Gyun Hahm, Noh, Y, Han, Jiyoon, Oh, Taehwan, Choi, Hyonsu, Kim, Hansaem, Key-Sun CHOI
12th Edition of its Language Resources and Evaluation Conference (LREC 2020)
2020
Measuring Generalisation to Unseen Viewpoints, Articulations, Shapes and Objects for 3D Hand Pose Estimation under Hand-Object Interaction
Armagan, Anil, Garcia-Hernando, Guillermo, Baek, Seungryul, Kim Tae Kyun
16th European Conference on Computer Vision, ECCV 2020
2020
Physics-Based Dexterous Manipulations with Estimated Hand Poses and Residual Reinforcement Learning
Garcia-Hernando, Guillermo, Johns, Edward, Kim Tae Kyun
IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)
2020
Residual Neural Processes
Lee, Byung-Jun, seunghoon.hong, Kee-Eung Kim
34th AAAI Conference on Artificial Intelligence (AAAI 2020)
2020
TRAP: Two-level Regularized Autoencoder-based Embedding for Power-law Distributed Data
Park. D, Song, H, 김민석, Lee Jae-Gil
29th International World Wide Web Conference, WWW 2020
2020
Variational Interaction Information Maximization for Cross-domain Disentanglement
Hwang, Hyeongjoo, Kim, Geon-Hyeong, seunghoon.hong, Kee-Eung Kim
Thirty-fourth Conference on Neural Information Processing Systems (NeurIPS 2020)
2020
Finding Robust Domain from Attacks: a Learning Framework for Blind Watermarking
SEUNGMIN MUN, Seunghun Nam, HANUL JANG, Dongkyu Kim, Heung-Kyu LEE
NEUROCOMPUTING
2019
LF-PPL: A Low-Level First Order Probabilistic Programming Language for Non-Differentiable Models
Zhou, Yuan, Gram-Hansen, Bradley, Kohn, Tobias, Rainforth, Tom, Hongseok Yang, Wood, Frank
The 22nd International Conference on Artificial Intelligence and Statistics (AISTATS 2019)
2019
[] []
Learning Deep Features for Source Color Laser Printer Identification based on Cascaded Learning
Kim, Do-Guk, Hou, Jong-Uk, Heung-Kyu LEE
NEUROCOMPUTING
2019
Real-Time Scheduling for Preventing Information Leakage with Preemption Overheads
백형부, 이진규, 이재원, 김평, Kang, Brent Byunghoon
Advances in Electrical and Computer Engineering
2017
[] []
An Enhanced Rule-Based Web Scanner Based on Similarity Score
MinSoo Lee, 이연호, Hyunsoo Yoon
ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING
2016
[]
Anytime RRBT for Handling Uncertainty and Dynamic Objects
양현철, 임종우, Sung-Eui Yoon
IEEE/RSJ International Conference on Intelligent Robots and Systems(IROS)
2016
[]
Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection
Omar Y. Al-Jarrah, Omar Alhussein, Paul D. Yoo, Sami Muhaidat, Kamal Taha, Kwangjo Kim
IEEE TRANSACTIONS ON CYBERNETICS
2016
[] []
PTE: Enumerating Trillion Triangles On Distributed Systems
Ha-Myung Park, 강유, Sung-Hyon Myaeng
ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD)
2016
[]
Reactive bandits with attitude
Pedro A.Ortega, Kee-Eung Kim, Daniel D.LeeLee
International Conference on Artificial Intelligence and Statistics (AISTATS)
2015
[]
Temporal Information Extraction from Korean Texts
Hyunwoo Do, Chae-Gyun Lim, Ho-Jin Choi, 영섭 정, Kim Zae Myung
Conference on Computational Natural Language Learning (CoNLL)
2015
[]
Diversity-seeking Users and Their Influence on Social News Sites
Kim Jooyeon, Kim Joon Hee, Dongwoo Kim, Alice Oh
ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD)(KDD)
2014
[] []
Estimation of Linear Transformation by Analyzing the Periodicity of Interpolation
Seung Jin Ryu, Heung-Kyu LEE
PATTERN RECOGNITION LETTERS
2014
[] []
Exploring the User-Generated Contents (UGC) Uploading Behavior on YouTube
Jaimie Y. Park, Jiyeon Jang, Jaimes, Alejandro, Sung-Hyon Myaeng, Chin-Wan Chung
International World Wide Web Conference(WWW)
2014
[]
Introducing the Ω-machine
Lei Zhang, Thannassis Tropanis, Wendy Hall, Sung-Hyon Myaeng
International World Wide Web Conference(WWW)
2014
[]