Kim, Jeonghan
21  results:
Search for persons X
?
1

Snapbot : Enabling Dynamic Human Robot Interactions for Rea..:

, In: Companion of the 2024 ACM/IEEE International Conference on Human-Robot Interaction,
Choi, Chanyeok ; Kim, Jeonghan ; Nam, Yunjae. - p. 327-331 , 2024
 
?
2

Thermal Array Sensor Resolution-Aware Activity Recognition ..:

, In: 2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC),
 
?
3

Low-Latency Interactive Sensing for Machine Vision:

, In: 2019 IEEE International Electron Devices Meeting (IEDM),
Park, Paul K. J. ; Soloveichik, Evgeny ; Ryu, Hyunsurk Eric... - p. 10.6.1-10.6.4 , 2019
 
?
4

An approach to developing reusable domain services for serv..:

, In: Proceedings of the 2010 ACM Symposium on Applied Computing,
Park, Joonseok ; Kim, Jeonghan ; Yun, Sanghyun.. - p. 2252-2256 , 2010
 
?
5

Interpersonal Trust and Its Associations with Respondents' ..:

, In: A Contemporary Portrait of Life in Korea,
Kang, Jeong-han ; Kim, Eehyun - p. 193-210 , 2023
 
?
6

"Do you know existing accuracy metrics overrate time-series..:

, In: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing,
Hwang, Won-Seok ; Yun, Jeong-Han ; Kim, Jonguk. - p. 403-412 , 2022
 
?
7

Residual size is not enough for anomaly detection : impr..:

, In: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing,
Yun, Jeong-Han ; Kim, Jonguk ; Hwang, Won-Seok... - p. 87-96 , 2022
 
?
8

Revitalizing Self-Organizing Map: Anomaly Detection Using F..:

, In: ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology,
Kim, Young Geun ; Yun, Jeong-Han ; Han, Siho.. - p. 382-397 , 2021
 
?
9

POSTER: Expanding a Programmable CPS Testbed for Network At..:

, In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security,
Choi, Seungoh ; Yun, Jeong-Han ; Min, Byung-Gil. - p. 928-930 , 2020
 
?
10

Anomaly Detection for Industrial Control Systems Using Sequ..:

, In: Computer Security; Lecture Notes in Computer Science,
 
?
11

Co-occurrence Based Security Event Analysis and Visualizati..:

, In: Communications in Computer and Information Science; HCI International 2020 - Posters,
Kim, HyungKwan ; Choi, Seungoh ; Yun, Jeong-Han.. - p. 540-548 , 2020
 
?
12

Vendor-Independent Monitoring on Programmable Logic Control..:

, In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security,
Choi, Jongwon ; Kim, HyungKwan ; Choi, Seungoh... - p. 682-684 , 2019
 
?
13

Data-Driven Field Mapping of Security Logs for Integrated M..:

, In: IFIP Advances in Information and Communication Technology; Critical Infrastructure Protection XIII,
Choi, Seungoh ; Kim, Yesol ; Yun, Jeong-Han.. - p. 253-268 , 2019
 
?
14

Layered Information Structure for Hierarchical Security Man..:

, In: Communications in Computer and Information Science; HCI International 2019 - Posters,
Choi, Seungoh ; Kim, Yesol ; Yun, Jeong-Han.. - p. 197-204 , 2019
 
?
15

Time-Series Aware Precision and Recall for Anomaly Detectio..:

, In: Proceedings of the 28th ACM International Conference on Information and Knowledge Management,
Hwang, Won-Seok ; Yun, Jeong-Han ; Kim, Jonguk. - p. 2241-2244 , 2019
 
1-15