Kwantae Cho

According to our database1, Kwantae Cho authored at least 15 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Lightweight Signature-based Range Proof.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

2020
How to Aggregate Acoustic Delta Features for Deep Speaker Embeddings.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

2019
Study on peak misdetection recovery of key exchange protocol using heartbeat.
J. Supercomput., 2019

End-to-end Korean Digits Speech Recognition.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

Lightweight Deep Embeddings Fusion Methods for Face Verification on Mobile Devices.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

A Performance Comparison of Loss Functions.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

2018
A Study on the Security Vulnerabilities of Fuzzy Vault Based on Photoplethysmogram.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

A Study on the Recovery Method of PPG Signal for IPI-Based Key Exchange.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

2017
Balance between Performance and Security in IPI-based Key Schemes using Heartbeats.
Proceedings of the 9th International Conference on Signal Processing Systems, 2017

2016
Client cloud Web service: reducing traffic consumption.
Secur. Commun. Networks, 2016

2014
Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2014

Low-priced and efficient replica detection framework for wireless sensor networks.
Peer-to-Peer Netw. Appl., 2014

2013
Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks.
IEEE Syst. J., 2013

Energy-efficient replica detection for resource-limited mobile devices in the internet of things.
IET Commun., 2013

2011
Biometric Based Secure Communications without Pre-deployed Key for Biosensor Implanted in Body Sensor Networks.
Proceedings of the Information Security Applications - 12th International Workshop, 2011


  Loading...