Search for persons
X
?
Companion of the 2024 ACM/IEEE International Conference on Human-Robot Interaction ,
1
Snapbot : Enabling Dynamic Human Robot Interactions for Rea..:
, In:
?
2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC) ,
2
Thermal Array Sensor Resolution-Aware Activity Recognition ..:
, In:
?
2019 IEEE International Electron Devices Meeting (IEDM) ,
3
Low-Latency Interactive Sensing for Machine Vision:
, In:
?
Proceedings of the 2010 ACM Symposium on Applied Computing ,
4
An approach to developing reusable domain services for serv..:
, In:
?
A Contemporary Portrait of Life in Korea ,
5
Interpersonal Trust and Its Associations with Respondents' ..:
, In:
?
Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing ,
6
"Do you know existing accuracy metrics overrate time-series..:
, In:
?
Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing ,
7
Residual size is not enough for anomaly detection : impr..:
, In:
?
ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology ,
8
Revitalizing Self-Organizing Map: Anomaly Detection Using F..:
, In:
?
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security ,
9
POSTER: Expanding a Programmable CPS Testbed for Network At..:
, In:
?
Computer Security; Lecture Notes in Computer Science ,
10
Anomaly Detection for Industrial Control Systems Using Sequ..:
, In:
?
Communications in Computer and Information Science; HCI International 2020 - Posters ,
11
Co-occurrence Based Security Event Analysis and Visualizati..:
, In:
?
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security ,
12
Vendor-Independent Monitoring on Programmable Logic Control..:
, In:
?
IFIP Advances in Information and Communication Technology; Critical Infrastructure Protection XIII ,
13
Data-Driven Field Mapping of Security Logs for Integrated M..:
, In:
?
Communications in Computer and Information Science; HCI International 2019 - Posters ,
14
Layered Information Structure for Hierarchical Security Man..:
, In:
?
Proceedings of the 28th ACM International Conference on Information and Knowledge Management ,
15