Min, Woong-ki
58  results:
Search for persons X
?
1

Implementation of 100CMM Thermal Storage Combustion Oxidize..:

, In: 2022 22nd International Conference on Control, Automation and Systems (ICCAS),
Yoon, Dal-Hwan ; Han, Beom-Soon ; Lim, Tae-Yeung... - p. 1814-1818 , 2022
 
?
2

Per-bank refresh with adaptive early termination for high d..:

, In: Proceedings of the 4th International Conference on Communication and Information Processing,
Yang, Hyun-Woong ; Lee, Min-Kyu ; Chung, Ki-Seok - p. 169-173 , 2018
 
?
3

Side-Channel Based Device Authentication in Wireless Chargi..:

, In: 2023 IEEE Sixth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE),
Ahn, Sung-Kyu ; Choi, Sang-Hoon ; Park, Ki-Woong - p. 125-128 , 2023
 
?
4

I Know Where You Are: A Non-intrusive Geospatial–Electrical..:

, In: 2023 IEEE Sixth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE),
 
?
5

CO-TRIS: Container Orchestration – Transforming container u..:

, In: 2023 IEEE Sixth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE),
 
?
6

Analysis of Electrode Configuration of Underwater Electric ..:

, In: 2022 22nd International Conference on Control, Automation and Systems (ICCAS),
Kim, Jason ; Lee, Ingyu ; Lee, Meungsuk.. - p. 59-63 , 2022
 
?
7

Axis Calibration Method of Underwater Electric Field Measur..:

, In: 2022 19th International Conference on Ubiquitous Robots (UR),
Kim, Jason ; Lee, Ingyu ; Kim, Byeongjin.. - p. 326-331 , 2022
 
?
8

TargetNet Backdoor : Attack on Deep Neural Network with ..:

, In: Proceedings of the 2020 5th International Conference on Intelligent Information Technology,
Kwon, Hyun ; Roh, Jungmin ; Yoon, Hyunsoo. - p. 140-145 , 2020
 
?
9

CERT Training Platform over the Event-Recordable Container:

, In: Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications,
Kim, Namjun ; Yang, Chanmo ; Cho, Daebeom.. - p. 1-6 , 2020
 
?
10

Reduction of Data Leakage Using Software Streaming:

, In: Communications in Computer and Information Science; Mobile Internet Security,
Kim, Sung-Kyung ; Jang, Eun-Tae ; Lim, Seung-Ho. - p. 99-111 , 2020
 
?
11

Toward a Fine-Grained Evaluation of the Pwnable CTF:

, In: Information Security Applications; Lecture Notes in Computer Science,
Kim, Sung-Kyung ; Jang, Eun-Tae ; Park, Ki-Woong - p. 179-190 , 2020
 
?
12

Toward Software-Defined Moving Target Defense for Secure Se..:

, In: Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications,
Kang, Ki-Wan ; Park, Ki-Woong - p. 1-5 , 2020
 
?
13

FriendNet Backdoor : Indentifying Backdoor Attack that i..:

, In: Proceedings of the 3rd International Conference on Software Engineering and Information Management,
Kwon, Hyun ; Yoon, Hyunsoo ; Park, Ki-Woong - p. 53-57 , 2020
 
?
14

CAPTCHA Image Generation Using Style Transfer Learning in D..:

, In: Information Security Applications; Lecture Notes in Computer Science,
Kwon, Hyun ; Yoon, Hyunsoo ; Park, Ki-Woong - p. 234-246 , 2020
 
?
15

Blueprint for a Secure Container to Protect Data in Edge Cl..:

, In: Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications,
Kim, Seong-Jin ; Park, Ki-Woong - p. 1-3 , 2020
 
1-15