Byung kwan Lee

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Understanding the role of new media literacy in the diffusion of unverified information during the COVID-19 pandemic.
New Media Soc., 2024

Phantom of Latent for Large Language and Vision Models.
CoRR, 2024

SPARK: Multi-Vision Sensor Perception and Reasoning Benchmark for Large-scale Vision-Language Models.
CoRR, 2024

TroL: Traversal of Layers for Large Language and Vision Models.
CoRR, 2024

Meteor: Mamba-based Traversal of Rationale for Large Language and Vision Models.
CoRR, 2024

MoAI: Mixture of All Intelligence for Large Language and Vision Models.
CoRR, 2024

CoLLaVO: Crayon Large Language and Vision mOdel.
Proceedings of the Findings of the Association for Computational Linguistics, 2024

2023
Causal Unsupervised Semantic Segmentation.
CoRR, 2023

Mitigating Dataset Bias in Image Captioning Through Clip Confounder-Free Captioning Network.
Proceedings of the IEEE International Conference on Image Processing, 2023

Mitigating Adversarial Vulnerability through Causal Parameter Estimation by Adversarial Double Machine Learning.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Demystifying Causal Features on Adversarial Examples and Causal Inoculation for Robust Network by Adversarial Instrumental Variable Regression.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
The Braking-Pressure and Driving-Direction Determination System (BDDS) Using Road Roughness and Passenger Conditions of Surrounding Vehicles.
Sensors, 2022

Rejected or ignored?: the effect of social exclusion on Instagram use motivation and behaviour.
Behav. Inf. Technol., 2022

Masking Adversarial Damage: Finding Adversarial Saliency for Robust and Sparse Network.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
A validation of the modified democratic e-governance website evaluation model.
Gov. Inf. Q., 2021

Distilling Robust and Non-Robust Features in Adversarial Examples by Information Bottleneck.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

2020
The effects of information literacy on trust in government websites: Evidence from an online experiment.
Int. J. Inf. Manag., 2020

Are pictures worth a thousand words? The effect of information presentation type on citizen perceptions of government websites.
Gov. Inf. Q., 2020

A Driving Decision Strategy(DDS) Based on Machine learning for an autonomous vehicle.
Proceedings of the 2020 International Conference on Information Networking, 2020

Autonomous Vehicles Diagnosis Platform(AVDP) based on deep learning and loopback.
Proceedings of the 2020 International Conference on Information Networking, 2020

2019
An Audification and Visualization System (AVS) of an Autonomous Vehicle for Blind and Deaf People Based on Deep Learning.
Sensors, 2019

The Lightweight Autonomous Vehicle Self-Diagnosis (LAVS) Using Machine Learning Based on Sensors and Multi-Protocol IoT Gateway.
Sensors, 2019

An Optimal Driving Support Strategy(ODSS) for Autonomous Vehicles based on an Genetic Algorithm.
KSII Trans. Internet Inf. Syst., 2019

A Deep Learning Part-diagnosis Platform(DLPP) based on an In-vehicle On-board gateway for an Autonomous Vehicle.
KSII Trans. Internet Inf. Syst., 2019

2017
An App Visualization design based on IoT Self-diagnosis Micro Control Unit for car accident prevention.
KSII Trans. Internet Inf. Syst., 2017

2016
A Black Hole Detection Protocol Design based on a Mutual Authentication Scheme on VANET.
KSII Trans. Internet Inf. Syst., 2016

2015
An efficient block classification for media healthcare service in mobile cloud computing.
Multim. Tools Appl., 2015

A Disease Inference Scheme based on Fuzzy Logic for Patient's-customized Healthcare.
Proceedings of the IEEE Pacific Rim Conference on Communications, 2015

2014
An IP Traceback Protocol using a Compressed Hash Table, a Sinkhole Router and Data Mining based on Network Forensics against Network Attacks.
Future Gener. Comput. Syst., 2014

2006
PGNIDS(Pattern-Graph Based Network Intrusion Detection System) Design.
Proceedings of the Computational Science and Its Applications, 2006

A HIICA(Highly-Improved Intra CA) Design for M-Commerce.
Proceedings of the Computational Science and Its Applications, 2006

Enhanced Fuzzy Single Layer Learning Algorithm Using Automatic Tuning of Threshold.
Proceedings of the Computational Science and Its Applications, 2006

2005
Dimensions of Interactivity: Differential Effects of Social and Psychological Factors.
J. Comput. Mediat. Commun., 2005

A SEEP (Security Enhanced Electronic Payment) Protocol Design Using 3BC, ECC (F), and HECC Algorithm.
Int. J. Bus. Data Commun. Netw., 2005

HESSL (Highly Enhanced Security Socket Layer) Protocol.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005

HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment.
Proceedings of the Computational Science and Its Applications, 2005

A MEP (Mobile Electronic Payment) and IntCA Protocol Design.
Proceedings of the High Performance Computing and Communications, 2005

2004
How Attitude Toward the Web Site Influences Consumer Brand Choice and Confidence While Shopping Online.
J. Comput. Mediat. Commun., 2004

A HSEP (Highly Secure Electronic Payment) Protocol Design using HECC Algorithm.
Proceedings of the iiWAS'2004, 2004

A Feature-Based Algorithm for Recognizing Gestures on Portable Computers.
Proceedings of the Computational Science and Its Applications, 2004

An ASEP (Advanced Secure Electronic Payment) Protocol Design Using 3BC and ECC (F^2) Algorithm.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

2003
Performance Evaluation of a Relocation Method for Mobile Computing Maintaining Data Consistency.
Proceedings of the Computational Science - ICCS 2003, 2003

An ISEP (Improved Secure Electronic Payment) Protocol Design Using 3BC Algorithm.
Proceedings of the International Conference on Security and Management, 2003


  Loading...