Youn Kyu Lee

Orcid: 0000-0002-4569-2640

According to our database1, Youn Kyu Lee authored at least 41 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Rowhammer Attacks in Dynamic Random-Access Memory and Defense Methods.
Sensors, January, 2024

VELCRO: A visual-based programming tool for effortless deep learning model construction.
SoftwareX, 2024

AQUA: Analytics-driven quantum neural network (QNN) user assistance for software validation.
Future Gener. Comput. Syst., 2024

Orthogonal Transform-Driven Data Augmentation for Limited Gaussian-Tainted Dataset.
IEEE Access, 2024

Attention Map Is All We Need for Lightweight Fingerprint Liveness Detection.
IEEE Access, 2024

A Comprehensive Risk Analysis Method for Adversarial Attacks on Biometric Authentication Systems.
IEEE Access, 2024

Integrity Check Value, Are You a Spy? Information Leakage Attack on Archive Formats.
IEEE Access, 2024

2023
Towards Ensuring Software Interoperability Between Deep Learning Frameworks.
J. Artif. Intell. Soft Comput. Res., October, 2023

EQuaTE: Efficient Quantum Train Engine for Runtime Dynamic Analysis and Visual Feedback in Autonomous Driving.
IEEE Internet Comput., 2023

EQuaTE: Efficient Quantum Train Engine for Dynamic Analysis via HCI-based Visual Feedback.
CoRR, 2023

Defending Against Adversarial Fingerprint Attacks Based on Deep Image Prior.
IEEE Access, 2023

Beyond Perspectives: Enhancing Pose Estimation via Viewpoint Transformation.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

Enhancing Nighttime Vehicle Detection via Transformer-based Data Augmentation.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

Two-Stage Image Restoration: A Shield against Adversarial Attacks on Face Identification.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

Adversarial2Adversarial: Defending against Adversarial Fingerprint Attacks without Clean Images.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

Demo: EQuaTE: Efficient Quantum Train Engine Design and Demonstration for Dynamic Software Analysis.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Enhancing Vocal-Based Laryngeal Cancer Screening with Additional Patient Information and Voice Signal Embedding.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
A Consortium Blockchain-Based Secure and Trusted Electronic Portfolio Management Scheme.
Sensors, 2022

Identifying Temporal Corpus for Enhanced User Comments Analysis.
Int. J. Softw. Eng. Knowl. Eng., 2022

Two-Stage Architectural Fine-Tuning with Neural Architecture Search using Early-Stopping in Image Classification.
CoRR, 2022

NULL byte injection: anti-forensic technique for data hiding in FAT32 file system.
Proceedings of the MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, Seoul, Republic of Korea, October 17, 2022

Towards Robust Combination of Neural Networks for Fingerprint Presentation Attack Detection.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

A Central Point-based Analysis for Fingerprint Liveness Detection.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

Towards Cross-materials: Fingerprint Liveness Detection based on Style Transfer.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

2021
A Smart Contract-Based Dynamic Consent Management System for Personal Data Usage under GDPR.
Sensors, 2021

Securing biometric authentication system using blockchain.
ICT Express, 2021

A Measurement Study on Gray Channel-based Deepfake Detection.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021

Towards Context-Aware Smart Contracts for Blockchain IoT Systems.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021

A Study on Effective Use of BPM Information in Deepfake Detection.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021

Trends in Neural Architecture Search: Towards the Acceleration of Search.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021

Machine-Learning based Analog and Mixed-signal Circuit Design and Optimization.
Proceedings of the International Conference on Information Networking, 2021

Generative Adversarial Attacks on Fingerprint Recognition Systems.
Proceedings of the International Conference on Information Networking, 2021

SmartBuilder: A Block-based Visual Programming Framework for Smart Contract Development.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2018
Making well-informed software design decisions.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

EVA: a tool for visualizing software architectural evolution.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Recovering Architectural Design Decisions.
Proceedings of the IEEE International Conference on Software Architecture, 2018

2017
Uncovering Architectural Design Decisions.
CoRR, 2017

SEALANT: a detection and visualization tool for inter-app security vulnerabilities in Android.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

A <i>SEALANT</i> for inter-app security holes in android.
Proceedings of the 39th International Conference on Software Engineering, 2017

2014
ViVA: a visualization and analysis tool for distributed event-based systems.
Proceedings of the 36th International Conference on Software Engineering, 2014

Customer Requirements Validation Method Based on Mental Models.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014


  Loading...