Sangjin Lee

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
Forensic investigation of the dark web on the Tor network: pathway toward the surface web.
Int. J. Inf. Sec., February, 2024

Decrypting IndexedDB in private mode of Gecko-based browsers.
Forensic Sci. Int. Digit. Investig., 2024

ECo-Bag: An elastic container based on merkle tree as a universal digital evidence bag.
Forensic Sci. Int. Digit. Investig., 2024

Multi-Scale Feature Prediction with Auxiliary-Info for Neural Image Compression.
CoRR, 2024

STT: Stateful Tracking with Transformers for Autonomous Driving.
CoRR, 2024

STT: Stateful Tracking with Transformers for Autonomous Driving.
Proceedings of the IEEE International Conference on Robotics and Automation, 2024

Enhancing Video Frame Interpolation with Flow-Guided Deformable Convolution.
Proceedings of the International Conference on Electronics, Information, and Communication, 2024

2023
One-Shot Video Inpainting.
CoRR, 2023

An Improved Point-Level Supervision Method for Temporal Action Localization.
IEEE Access, 2023

Exploring Discontinuity for Video Frame Interpolation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
A Deep Learning Approach for Identifying User Interest from Targeted Advertising.
J. Inf. Process. Syst., 2022

Beyond Natural Motion: Exploring Discontinuity for Video Frame Interpolation.
CoRR, 2022

Expanded Adaptive Scaling Normalization for End to End Image Compression.
Proceedings of the Computer Vision - ECCV 2022, 2022

2021
Predicting post-operative right ventricular failure using video-based deep learning.
CoRR, 2021

Block-Attentive Subpixel Prediction Networks for Computationally Efficient Image Restoration.
IEEE Access, 2021

Highly Reliable 28nm Embedded Flash Process Development for High-Density and High-Speed Automotive Grade-1 Application.
Proceedings of the IEEE International Memory Workshop, 2021

Test-Time Adaptation for Out-Of-Distributed Image Inpainting.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

2020
Extrapolative-Interpolative Cycle-Consistency Learning For Video Frame Extrapolation.
Proceedings of the IEEE International Conference on Image Processing, 2020

2019
Extended Object Tracking via Positive and Negative Information Fusion.
IEEE Trans. Signal Process., 2019

2018
Embeddability of right-angled Artin groups on complements of trees.
Int. J. Algebra Comput., 2018

2017
A Study on Stability of the Interacting Multiple Model Algorithm.
IEEE Trans. Autom. Control., 2017

Noncrossing partitions for periodic braids.
J. Comb. Theory A, 2017

2016
Data-Driven Modeling and Analysis Framework for Cockpit Human-Machine Interaction Issues.
J. Aerosp. Inf. Syst., 2016

Formal Verification for Mode Confusion in the Flight Deck Using Intent-Based Abstraction.
J. Aerosp. Inf. Syst., 2016

A methodology for quantitative assessment of the features and capabilities of software frameworks for model composition.
Int. J. Model. Simul. Sci. Comput., 2016

2015
Markov Chain Approximation Algorithm for Event-Based State Estimation.
IEEE Trans. Control. Syst. Technol., 2015

Intent Inference-Based Flight-Deck Human-Automation Mode-Confusion Detection.
J. Aerosp. Inf. Syst., 2015

2014
AddSIM: a new Korean engagement simulation environment using high resolution models.
Proceedings of the 2014 Winter Simulation Conference, 2014

2013
Topic based photo set retrieval using user annotated tags.
Multim. Tools Appl., 2013

Event-based state estimation algorithm using Markov chain approximation.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

2012
Detection of Zombie PCs Based on Email Spam Analysis.
KSII Trans. Internet Inf. Syst., 2012

Bursty event detection from text streams for disaster management.
Proceedings of the 21st World Wide Web Conference, 2012

Event-triggered filtering with application to target tracking in binary sensor networks.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

2011
Online Video Recommendation through Tag-Cloud Aggregation.
IEEE Multim., 2011

2010
Image Enhancement for Reducing LCD Backlight Power Based on Human Visual Characteristics.
Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, 2010

2009
Soft-output ML detector for spatial modulation OFDM systems.
IEICE Electron. Express, 2009

Estimate-based goodness-of-fit test for large sparse multinomial distributions.
Comput. Stat. Data Anal., 2009

Successive MAP Detection with Soft Interference Cancellation for Iterative Receivers in Hierarchical M-ary QAM Systems.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009

A Scoring Function for Retrieving Photo Sets with Broad Topic Coverage.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

2007
Synchronization and Channel Estimation in Cyclic Postfix Based OFDM System.
IEICE Trans. Commun., 2007

2002
Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

2001
Pseudorandomness from Braid Groups.
Proceedings of the Advances in Cryptology, 2001

An Efficient Implementation of Braid Groups.
Proceedings of the Advances in Cryptology, 2001

2000
A lower bound on the linear span of an FCSR.
IEEE Trans. Inf. Theory, 2000

New Public-Key Cryptosystem Using Braid Groups.
Proceedings of the Advances in Cryptology, 2000

1998
A New Hash Function Based on MDx-Family and Its Application to MAC.
Proceedings of the Public Key Cryptography, 1998

1997
Improving Bounds for the Number of Correlation Immune Boolean Functions.
Inf. Process. Lett., 1997

1996
On the Design of a Stream Cipher and a Hash Function Suitable to Smart Card Applications.
Proceedings of the Second Smart Card Research and Advanced Application Conference, 1996

Conditional Correlation Attack on Nonlinear Filter Generators.
Proceedings of the Advances in Cryptology, 1996

On the Correlation Immune Functions and Their Nonlinearity.
Proceedings of the Advances in Cryptology, 1996

1995
On the Security of the Gollmann Cascades.
Proceedings of the Advances in Cryptology, 1995

1994
Semi-bent Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994


  Loading...