Junwon Lee

Orcid: 0000-0003-2729-9113

According to our database1, Junwon Lee authored at least 21 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Implementation of a Virtual Assistant System Based on Deep Multi-modal Data Integration.
J. Signal Process. Syst., March, 2024

Challenge on Sound Scene Synthesis: Evaluating Text-to-Audio Generation.
CoRR, 2024

Video-Foley: Two-Stage Video-To-Sound Generation via Temporal Event Condition For Foley Sound.
CoRR, 2024

CONMOD: Controllable Neural Frame-based Modulation Effects.
CoRR, 2024

Correlation of Fréchet Audio Distance With Human Perception of Environmental Audio Is Embedding Dependant.
CoRR, 2024

T-Foley: A Controllable Waveform-Domain Diffusion Model for Temporal-Event-Guided Foley Sound Synthesis.
Proceedings of the IEEE International Conference on Acoustics, 2024

Correlation of Fréchet Audio Distance With Human Perception of Environmental Audio Is Embedding Dependent.
Proceedings of the 32nd European Signal Processing Conference, 2024

2023
Predicting the Refrigerant Amounts Across Air Conditioners With a Domain Adaptive Lightweight Transformer.
IEEE Trans. Consumer Electron., August, 2023

A Novel Patent Similarity Measurement Methodology: Semantic Distance and Technological Distance.
CoRR, 2023

Music Playlist Title Generation Using Artist Information.
CoRR, 2023

Pose Tracking of Supermicrosurgical Robot Towards Multi-User Teleoperation.
Proceedings of the 45th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2023

2022
An SSH predictive model using machine learning with web proxy session logs.
Int. J. Inf. Sec., 2022

Improving SSH detection model using IPA time and WGAN-GP.
Comput. Secur., 2022

2021
Music Playlist Title Generation: A Machine-Translation Approach.
CoRR, 2021

Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC Security.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

2015
Design of the Real-Time Mobile Push System for Implementation of the Shipboard Smart Working.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

2013
A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed.
Mob. Networks Appl., 2013

Intentional Movement Performance Ability (IMPA): A method for robot-aided quantitative assessment of motor function.
Proceedings of the IEEE 13th International Conference on Rehabilitation Robotics, 2013

2012
Humanoid's dual arm object manipulation based on virtual dynamics model.
Proceedings of the IEEE International Conference on Robotics and Automation, 2012

2011
A Suggestion for Cloud Environments New Layer Contemplating and Its Security Factors.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

2009
Link Stability-Aware Ad Hoc Routing Protocol with Multiple Sampling Rates.
Proceedings of the Smart Spaces and Next Generation Wired/Wireless Networking, 2009


  Loading...