Mooseop Kim

Orcid: 0000-0003-4914-0584

According to our database1, Mooseop Kim authored at least 27 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Impact of Device and Environment on Visual-Auditory Sensory Substitution: A Comprehensive Behavioral Analysis Using the vOICe Algorithm.
IEEE Access, 2024

An Improved YOLOF for Scale Imbalance with Dilated Attention.
Proceedings of the Pattern Recognition - 27th International Conference, 2024

2023
Online Continual Learning in Acoustic Scene Classification: An Empirical Study.
Sensors, August, 2023

An end-to-end deep learning approach for real-time single image dehazing.
J. Real Time Image Process., February, 2023

Deep Learning-Based Optimization of Visual-Auditory Sensory Substitution.
IEEE Access, 2023

Impaired Visual Capability Augmenting Framework based on reconfiguring sensory-brain pathway.
Proceedings of the IEEE International Conference on Consumer Electronics, 2023

2022
Real-time semantic segmentation on edge devices: A performance comparison of segmentation models.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

Sound Event Localization and Detection using Spatial Feature Fusion.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

2021
Accelerating On-Device Learning with Layer-Wise Processor Selection Method on Unified Memory.
Sensors, 2021

Sensor-data augmentation for human activity recognition with time-warping and data masking.
Multim. Tools Appl., 2021

Label-preserving data augmentation for mobile sensor data.
Multidimens. Syst. Signal Process., 2021

2019
An Energy-Efficient Method for Human Activity Recognition with Segment-Level Change Detection and Deep Learning.
Sensors, 2019

2018
Activity Recognition using Fully Convolutional Network from Smartphone Accelerometer.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

Soft assignment and multiple keypoint analysis-based pedestrian counting method.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

2015
System Architecture for Real-Time Face Detection on Analog Video Camera.
Int. J. Distributed Sens. Networks, 2015

2014
Data forgery detection for vehicle black box.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014

2013
Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing.
Pers. Ubiquitous Comput., 2013

An efficient data integrity scheme for preventing falsification of car black box.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013

Real-time face detection on reconfigurable device.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013

2012
Compact hardware architecture for first one detector using priority-based uniform partition.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2012

2010
Design and implementation of mobile trusted module for trusted mobile computing.
IEEE Trans. Consumer Electron., 2010

2009
Design of Cryptographic Hardware Architecture for Mobile Computing.
J. Inf. Process. Syst., 2009

2008
Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
Low Power AES Hardware Architecture for Radio Frequency Identification.
Proceedings of the Advances in Information and Computer Security, 2006


  Loading...