Chanhee Lee
Orcid: 0009-0008-0215-8799
According to our database1,
Chanhee Lee
authored at least 59 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
An efficient approach for incremental erasable utility pattern mining from non-binary data.
Knowl. Inf. Syst., October, 2024
Dialogue act-based partner persona extraction for consistent personalized response generation.
Expert Syst. Appl., 2024
Incremental Top-k High Utility Pattern Mining and Analyzing Over the Entire Accumulated Dynamic Database.
IEEE Access, 2024
DRAINCLoG: Detecting Rogue Accounts with Illegally-obtained NFTs using Classifiers Learned on Graphs.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Tree-of-Question: Structured Retrieval Framework for Korean Question Answering Systems.
Proceedings of the 2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies: Industry Track, 2024
Hyper-BTS Dataset: Scalability and Enhanced Analysis of Back TranScription (BTS) for ASR Post-Processing.
Proceedings of the Findings of the Association for Computational Linguistics: EACL 2024, 2024
Interrupting for Microlearning: Understanding Perceptions and Interruptibility of Proactive Conversational Microlearning Services.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
2023
IEEE Trans. Cybern., December, 2023
Miniaturized MR-compatible ultrasound system for real-time monitoring of acoustic effects in mice using high-resolution MRI.
NeuroImage, August, 2023
Pre-large based high utility pattern mining for transaction insertions in incremental database.
Knowl. Based Syst., 2023
Towards Reliable and Fluent Large Language Models: Incorporating Feedback Learning Loops in QA Systems.
CoRR, 2023
Efficient Method for Mining High Utility Occupancy Patterns Based on Indexed List Structure.
IEEE Access, 2023
Data Visualization for Mental Health Monitoring in Smart Home Environment: A Case Study.
Proceedings of the Workshop on Visual Analytics in Healthcare, 2023
Concept-based Persona Expansion for Improving Diversity of Persona-Grounded Dialogue.
Proceedings of the 17th Conference of the European Chapter of the Association for Computational Linguistics, 2023
Persona Expansion with Commonsense Knowledge for Diverse and Consistent Response Generation.
Proceedings of the 17th Conference of the European Chapter of the Association for Computational Linguistics, 2023
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
2022
Efficient approach of sliding window-based high average-utility pattern mining with list structures.
Knowl. Based Syst., 2022
Knowl. Based Syst., 2022
Inf. Sci., 2022
Occupancy-based utility pattern mining in dynamic environments of intelligent systems.
Int. J. Intell. Syst., 2022
EHMIN: Efficient approach of list based high-utility pattern mining with negative unit profits.
Expert Syst. Appl., 2022
Analysis of Utterance Embeddings and Clustering Methods Related to Intent Induction for Task-Oriented Dialogue.
CoRR, 2022
Language Chameleon: Transformation analysis between languages using Cross-lingual Post-training based on Pre-trained language models.
CoRR, 2022
IEEE Access, 2022
A 1/1.57-inch 50Mpixel CMOS Image Sensor With 1.0μm All-Directional Dual Pixel by 0.5μm-Pitch Full-Depth Deep-Trench Isolation Technology.
Proceedings of the IEEE International Solid-State Circuits Conference, 2022
2021
Proceedings of the 2021 Symposium on VLSI Circuits, Kyoto, Japan, June 13-19, 2021, 2021
Proceedings of the 18th International SoC Design Conference, 2021
BTS: Back TranScription for Speech-to-Text Post-Processor using Text-to-Speech-to-Text.
Proceedings of the 8th Workshop on Asian Translation, 2021
Do Response Selection Models Really Know What's Next? Utterance Manipulation Strategies for Multi-turn Response Selection.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
Automatic extraction of named entities of cyber threats using a deep Bi-LSTM-CRF network.
Int. J. Mach. Learn. Cybern., 2020
Variational Reward Estimator Bottleneck: Learning Robust Reward Estimator for Multi-Domain Task-Oriented Dialog.
CoRR, 2020
Comparison of the Evaluation Metrics for Neural Grammatical Error Correction With Overcorrection.
IEEE Access, 2020
Proceedings of the 21st Annual Conference of the International Speech Communication Association, 2020
2019
Sensors, 2019
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019
2018
Proceedings of the 2018 IEEE 26th International Conference on Network Protocols, 2018
Proceedings of the Internet of Things - ICIOT 2018, 2018
Rich Character-Level Information for Korean Morphological Analysis and Part-of-Speech Tagging.
Proceedings of the 27th International Conference on Computational Linguistics, 2018
Proceedings of the 27th International Conference on Computational Linguistics, 2018
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018
2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
2016
Proceedings of the 32nd IEEE International Conference on Data Engineering Workshops, 2016
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
Proceedings of the 2016 International Conference on Big Data and Smart Computing, 2016
2015
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015
2014
J. Supercomput., 2014
Dynamic Behavior Specification and Dynamic Mapping for Real-Time Embedded Systems: HOPES Approach.
ACM Trans. Embed. Comput. Syst., 2014
Software platform for hybrid resource management of a many-core accelerator for multimedia applications.
Proceedings of the 12th IEEE Symposium on Embedded Systems for Real-time Multimedia, 2014
2013
Failure-Aware Task Scheduling of Synchronous Data Flow Graphs Under Real-Time Constraints.
J. Signal Process. Syst., 2013
Efficient run-time resource management of a manycore accelerator for stream-based applications.
Proceedings of the 11th IEEE Symposium on Embedded Systems for Real-time Multimedia, 2013
2012
An Android Security Extension to Protect Personal Information against Illegal Accesses and Privilege Escalation Attacks.
J. Internet Serv. Inf. Secur., 2012
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012
2011
Proceedings of the 9th International Conference on Hardware/Software Codesign and System Synthesis, 2011
2010
Proceedings of the 8th International Conference on Hardware/Software Codesign and System Synthesis, 2010