Seungyeop Han

According to our database1, Seungyeop Han authored at least 30 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Terminal Soft Landing Guidance Law Using Analytic Gravity Turn Trajectory.
CoRR, 2024

Analysis and Design of Satellite Constellation Spare Strategy Using Markov Chain.
CoRR, 2024

Time Efficient Rate Feedback Tracking Controller with Slew Rate and Control Constraint.
CoRR, 2024

Optimal Strip Attitude Command of Earth Observation Satellite using Differential Dynamic Programming.
CoRR, 2024

2019
Sensitivity of the Gravity Model and Orbital Frame for On-board Real-Time Orbit Determination: Operational Results of GPS-12 GPS Receiver.
Remote. Sens., 2019

2017
One-versus-one air combat algorithm considering direction of the lift vector.
Proceedings of the 25th Mediterranean Conference on Control and Automation, 2017

Three-dimensional velocity maximizing agile turn of air-to-air missile with collision triangle constraint.
Proceedings of the 25th Mediterranean Conference on Control and Automation, 2017

Fast Video Classification via Adaptive Cascading of Deep Models.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition, 2017

2016
Efficient Security and Privacy Enhancing Solutions in Untrusted Environments.
PhD thesis, 2016

MetaSync: Coordinating Storage across Multiple File Synchronization Services.
IEEE Internet Comput., 2016

MCDNN: An Approximation-Based Execution Framework for Deep Stream Processing Under Resource Constraints.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Trajectory optimization and control algorithm of longitudinal perch landing assisted by thruster.
Proceedings of the 15th European Control Conference, 2016

2015
MetaSync: File Synchronization Across Multiple Untrusted Storage Services.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

Exploring Cyberbullying and Other Toxic Behavior in Team Competition Online Games.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.
ACM Trans. Comput. Syst., 2014

Brahmastra: Driving Apps to Test the Security of Third-Party Components.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

GlimpseData: towards continuous vision-based personal analytics.
Proceedings of the 2014 Workshop on Physical Analytics, 2014

Collaborative Verification of Information Flow for a High-Assurance App Store.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
ACM HotMobile 2013 demo: NLify: mobile spoken natural language interfaces for everyone.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2013

Expressive privacy control with pseudonyms.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

NLify: lightweight spoken natural language interfaces via exhaustive paraphrasing.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

The Case for Onloading Continuous High-Datarate Perception to the Phone.
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013

2012
Structured Learning of Gaussian Graphical Models.
Proceedings of the Advances in Neural Information Processing Systems 25: 26th Annual Conference on Neural Information Processing Systems 2012. Proceedings of a meeting held December 3-6, 2012

Short paper: enhancing mobile application permissions with runtime feedback and constraints.
Proceedings of the SPSM'12, 2012

2011
Accelerating SSL with GPUs.
Comput. Commun. Rev., 2011

SSLShader: Cheap SSL Acceleration with Commodity Processors.
Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation, 2011

Privacy Revelations for Web and Mobile Apps.
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011

Tor instead of IP.
Proceedings of the Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), 2011

These aren't the droids you're looking for: retrofitting android to protect data from imperious applications.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2007
Analysis of topological characteristics of huge online social networking services.
Proceedings of the 16th International Conference on World Wide Web, 2007


  Loading...