Hae Young Lee
Orcid: 0000-0001-8918-3031
According to our database1,
Hae Young Lee
authored at least 52 papers
between 2006 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
KSII Trans. Internet Inf. Syst., 2020
Systematic Detection of State Variable Corruptions in Discrete Event System Specification Based Simulation.
IEICE Trans. Inf. Syst., 2020
Node Density Loss Resilient Report Generation Method for the Statistical Filtering Based Sensor Networks.
IEICE Trans. Inf. Syst., 2020
2019
Proceedings of the MEDINFO 2019: Health and Wellbeing e-Networks for All, 2019
Introduction of a Program to Improve the Information Sharing System of Food Allergy Patients.
Proceedings of the MEDINFO 2019: Health and Wellbeing e-Networks for All, 2019
2018
Proceedings of the International Conference on Software Security and Assurance, 2018
Proceedings of the International Conference on Software Security and Assurance, 2018
2017
Proceedings of the 2017 Winter Simulation Conference, 2017
Log generation for coding behavior analysis: For focusing on how kids are coding not what they are coding.
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017
Common Requirements for Web Application Vulnerability Scanners for the Internet of Things.
Proceedings of the International Conference on Software Security and Assurance, 2017
Proceedings of the International Conference on Software Security and Assurance, 2017
A Quantification of Effectiveness of Simulation Models by Managing Cost of Development.
Proceedings of the International Conference on Software Security and Assurance, 2017
2016
Proceedings of the Winter Simulation Conference, 2016
COIN-VASE: Code Injection Vulnerability Scanning Environment for HTML5-Based Android Apps.
Proceedings of the 8th EAI International Conference on Mobile Computing, 2016
Proceedings of the International Conference on Software Security and Assurance, 2016
Toward Automated Scanning for Code Injection Vulnerabilities in HTML5-Based Mobile Apps.
Proceedings of the International Conference on Software Security and Assurance, 2016
Poster Abstract: Modeling, Simulation and Verification Environment for Engineering Cyber-Physical Systems Based on Discrete Event System Specification.
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016
2015
Fuzzy-Based Adaptive Countering Method against False Endorsement Insertion Attacks in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015
Fuzzy-Based Adaptive Countering Method against False Data Injection Attacks in Wireless Sensor Networks.
IEICE Trans. Inf. Syst., 2015
Proceedings of the Poster Session and Student Colloquium Symposium, 2015
2014
Proceedings of the 2014 SpringSim Poster Session, Tampa, FL, USA, April 13 - 16, 2014, 2014
2013
An agent-based self-adaptation architecture for implementing smart devices in Smart Space.
Telecommun. Syst., 2013
Proceedings of the 19th IEEE International Conference on Parallel and Distributed Systems, 2013
Proceedings of the HCI International 2013 - Posters' Extended Abstracts, 2013
2012
Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, 2012
2011
IEICE Trans. Commun., 2011
Location Based Hierarchical Secure Multicast Group Building in Wireless Sensor Networks.
Proceedings of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, 2011
Proceedings of the Control and Automation, and Energy System Engineering, 2011
Proceedings of the Control and Automation, and Energy System Engineering, 2011
2010
J. Networks, 2010
Int. J. Softw. Eng. Knowl. Eng., 2010
A Scheme for Adaptively Countering Application Layer Security Attacks in Wireless Sensor Networks.
IEICE Trans. Commun., 2010
Fuzzy-Based Filtering Solution Selection Method For Dynamic Sensor Networks<sup>1</sup>.
Intell. Autom. Soft Comput., 2010
Proceedings of the Information Security and Assurance - 4th International Conference, 2010
Implementation of Cloud Computing Environment for Discrete Event System Simulation using Service Oriented Architecture.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
2009
A Path Selection Method for Improving the Detection Power of Statistical Filtering in Sensor Networks.
J. Inf. Sci. Eng., 2009
Fuzzy-Based Path Selection Method for Improving the Detection of False Reports in Sensor Networks.
IEICE Trans. Inf. Syst., 2009
Adaptive threshold determination method for the dynamic filtering in wireless sensor networks using fuzzy logic.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009
2008
IEICE Trans. Inf. Syst., 2008
A General Framework for Adaptive Filtering in Wireless Sensor Networks Based on Fuzzy Logic.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2008
2007
Fuzzy Rule-Based Enhancing Key Dissemination Method for the Dynamic Filtering-Based Sensor Networks.
Int. J. Inf. Acquis., 2007
IEICE Trans. Commun., 2007
Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007
Proceedings of the New Trends in Applied Artificial Intelligence, 2007
Fuzzy Key Dissemination Limiting Method for the Dynamic Filtering-Based Sensor Networks.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007
Fuzzy Security Parameter Determining Method for the Commutative Cipher Based Filtering in Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2007
2006
Fuzzy-Based Adaptive Threshold Determining Method for the Interleaved Authentication in Sensor Networks.
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006
Proceedings of the Distributed Computing and Internet Technology, 2006