Gyusang Cho

Orcid: 0009-0002-3943-5397

According to our database1, Gyusang Cho authored at least 13 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Tilt and Average : Geometric Adjustment of the Last Layer for Recalibration.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

2023
FREEDOM: Target Label & Source Data & Domain Information-Free Multi-Source Domain Adaptation for Unsupervised Personalization.
CoRR, 2023

DELCAS: Deep Reinforcement Learning Based GPU CaaS Packet Scheduling for Stabilizing QoE in 5G Multi-Access Edge Computing.
Proceedings of the Current Trends in Web Engineering, 2023

2022
Controlling Dependency: Selectively Resetting Channels for Pre-trained CNN Backbone Network on Hand Pose Estimation.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

Supervised vs. Self-supervised Pre-trained models for Hand Pose Estimation.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

2019
Performance Analysis of Adaptive Resource Allocation Scheme for OpenCL-based FPGA Virtualization System.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

2016
A New Timestamp Digital Forensic Method Using a Modified Superincreasing Sequence.
Int. J. Digit. Crime Forensics, 2016

2015
Development of an anti-forensic tool for hiding message in a directory index of NTFS.
Proceedings of the 2015 World Congress on Internet Security, 2015

NTFS Directory Index Analysis for Computer Forensics.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

2014
An Intuitive Computer Forensic Method by Timestamp Changing Patterns.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

2013
A computer forensic method for detecting timestamp forgery in NTFS.
Comput. Secur., 2013

2011
Finding Forensic Information on Creating a Folder in $LogFile of NTFS.
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011

2006
Design and Implementation of a Fast DIO (Digital I/O) and Motion Control System.
Proceedings of the Intelligent Computing, 2006


  Loading...