Jong-Hyuk Roh

Orcid: 0000-0002-6269-7566

According to our database1, Jong-Hyuk Roh authored at least 15 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Facial Landmark, Head Pose, and Occlusion Analysis Using Multitask Stacked Hourglass.
IEEE Access, 2023

2021
LSFD: Lightweight Single Stage Masked Face Detector with a CPU Real-time Speed.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021

2020
One-Class Learning Method Based on Live Correlation Loss for Face Anti-Spoofing.
IEEE Access, 2020

How to Aggregate Acoustic Delta Features for Deep Speaker Embeddings.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

2019
End-to-end Korean Digits Speech Recognition.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

Lightweight Deep Embeddings Fusion Methods for Face Verification on Mobile Devices.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

A Performance Comparison of Loss Functions.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

2018
Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment.
J. Inf. Process. Syst., 2018

2016
A Study on Feature of Keystroke Dynamics for Improving Accuracy in Mobile Environment.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Keystroke dynamics for authentication in smartphone.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

2015
Anomaly detection of access patterns in database.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015

2008
Website Registration Using Link for Privacy.
Proceedings of the 2008 International Conference on Security & Management, 2008

2006
Topology-Aware Key Management Scheme for Secure Overlay Multicast.
Proceedings of the Information Networking, 2006

2005
Privacy Aware Identity Information Sharing Protocol.
Proceedings of the International Conference on Software Engineering Research and Practice, 2005

Key Management for Secure Overlay Multicast.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005


  Loading...