Ji Won Yoon
Orcid: 0000-0003-2123-9849
According to our database1,
Ji Won Yoon
authored at least 97 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Cons-KD: Dropout-Robust Knowledge Distillation for CTC-Based Automatic Speech Recognition.
IEEE Access, 2024
An Analysis of GPS Spoofing Attack and Efficient Approach to Spoofing Detection in PX4.
IEEE Access, 2024
Ghost in the Radio: An Audio Adversarial Attack Using Environmental Noise Through Radio.
IEEE Access, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
Proceedings of the IEEE International Conference on Advanced Video and Signal Based Surveillance, 2024
2023
IEEE/ACM Trans. Netw., August, 2023
Oracle Teacher: Leveraging Target Information for Better Knowledge Distillation of CTC Models.
IEEE ACM Trans. Audio Speech Lang. Process., 2023
IACR Cryptol. ePrint Arch., 2023
Development of deep biological ages aware of morbidity and mortality based on unsupervised and semi-supervised deep learning approaches.
CoRR, 2023
Voice Spoofing Detection Through Residual Network, Max Feature Map, and Depthwise Separable Convolution.
IEEE Access, 2023
IEEE Access, 2023
Proceedings of the Information Security Applications - 24th International Conference, 2023
Proceedings of the IEEE Statistical Signal Processing Workshop, 2023
Discretization Error Reduction for High Precision Torus Fully Homomorphic Encryption.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
MCR-Data2vec 2.0: Improving Self-supervised Speech Pre-training via Model-level Consistency Regularization.
Proceedings of the 24th Annual Conference of the International Speech Communication Association, 2023
Secure Dimensionality Reduction: Applying Linear Discriminant Analysis over the TFHE Homomorphic Encryption Scheme.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Proceedings of the Asian Conference on Machine Learning, 2023
2022
IEEE Signal Process. Lett., 2022
IEEE Signal Process. Lett., 2022
Inter-KD: Intermediate Knowledge Distillation for CTC-Based Automatic Speech Recognition.
Proceedings of the IEEE Spoken Language Technology Workshop, 2022
Manifold Learning-based Frequency Estimation for extracting ENF signal from digital video.
Proceedings of the 26th International Conference on Pattern Recognition, 2022
Proceedings of the 3rd European Symposium on Software Engineering, 2022
2021
IEEE ACM Trans. Audio Speech Lang. Process., 2021
Pattern Recognit. Lett., 2021
IEEE Access, 2021
Proceedings of the Information Security Applications - 22nd International Conference, 2021
2020
Filtering-Based Correlation Power Analysis (CPA) with Signal Envelopes Against Shuffling Methods.
Proceedings of the Information Security Applications - 21st International Conference, 2020
Proceedings of the 21st Annual Conference of the International Speech Communication Association, 2020
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020
Comparison of various interpolation techniques to infer localization of audio files using ENF signals.
Proceedings of the International Conference on Software Security and Assurance, 2020
Proceedings of the 25th International Conference on Pattern Recognition, 2020
2019
A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms.
Secur. Commun. Networks, 2019
Secur. Commun. Networks, 2019
Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression.
Proceedings of the Information Security Applications - 20th International Conference, 2019
A Bitwise Logistic Regression Using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme.
Proceedings of the Information Security Practice and Experience, 2019
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
Speech Intention Understanding in a Head-final Language: A Disambiguation Utilizing Intonation-dependency.
CoRR, 2018
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Proceedings of the Information Security Applications - 19th International Conference, 2018
A New Bayesian Approach to Exploring Damaged Assets by Monitoring Mission Failures Caused by Undetected Attack.
Proceedings of the Information Security Applications - 19th International Conference, 2018
A Study on the Audiovisual Art of Nam June Paik in the Context of Multimodality and Synesthesia.
Proceedings of the 2018 International Computer Music Conference, 2018
2017
The Vulnerability Exploitation Conveying Digital Data Over Mobile Voice Call Channels.
Wirel. Pers. Commun., 2017
IACR Cryptol. ePrint Arch., 2017
Honey Chatting: A novel instant messaging system robust to eavesdropping over communication.
IACR Cryptol. ePrint Arch., 2017
Side channel attack on digital door lock with vibration signal analysis: Longer password does not guarantee higher security level.
Proceedings of the 2017 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2017
Proceedings of the KDD 2017 Workshop on Anomaly Detection in Finance, 2017
Proceedings of the International Conference on Software Security and Assurance, 2017
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017
2016
Symmetry, 2016
J. Intell. Fuzzy Syst., 2016
A Practical Approach to Constructing Triple-Blind Review Process with Maximal Anonymity and Fairness.
Proceedings of the Information Security Applications - 17th International Workshop, 2016
An efficient geometric shape coding and representation approach to obtain both skeleton and contours.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
A New Approach to Building a Disguised Server Using the Honey Port Against General Scanning Attacks.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2016
2015
Neurocomputing, 2015
A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis.
Int. J. Distributed Sens. Networks, 2015
IEICE Trans. Inf. Syst., 2015
Various Threat Models to Circumvent Air-Gapped Systems for Preventing Network Attack.
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015
A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers.
Proceedings of the 1st International Conference on Software Security and Assurance, 2015
Proceedings of the 23rd European Signal Processing Conference, 2015
2014
Comput. Biol. Medicine, 2014
Biomed. Signal Process. Control., 2014
2013
Efficient Estimation of the number of neighbours in Probabilistic K Nearest Neighbour Classification
CoRR, 2013
CoRR, 2013
CoRR, 2013
CoRR, 2013
2012
J. Informetrics, 2012
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012
Proceedings of the 15th International IEEE Conference on Intelligent Transportation Systems, 2012
Proceedings of the 21st International Conference on Pattern Recognition, 2012
Proceedings of the 21st International Conference on Pattern Recognition, 2012
Proceedings of the 21st International Conference on Pattern Recognition, 2012
2011
Bayesian inference for an adaptive Ordered Probit model: An application to Brain Computer Interfacing.
Neural Networks, 2011
Effective measurement selection in truncated kernel density estimator: Voronoi mean shift algorithm for truncated kernels.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011
2010
IEEE Signal Process. Lett., 2010
A highly efficient blocked Gibbs sampler reconstruction of multidimensional NMR spectra.
Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, 2010
Proceedings of the 20th International Conference on Pattern Recognition, 2010
2009
Adaptive classification for Brain Computer Interface systems using Sequential Monte Carlo sampling.
Neural Networks, 2009
Proceedings of the 7th International Symposium on Modeling and Optimization in Mobile, 2009
2008
Proceedings of the IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2008
Adaptive Classification by Hybrid EKF with Truncated Filtering: Brain Computer Interfacing.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2008
2007
Proceedings of the 2007 International Computer Music Conference, 2007
Proceedings of the Bioinformatics Research and Development, First International Conference, 2007
2006
Proceedings of the 14th European Signal Processing Conference, 2006