default search action
Youn Kyu Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Donghyun Kim, Jongwook Jeong, Soo-Hyun Lee, So Hyun Kang, Youn Kyu Lee:
Integrity Check Value, Are You a Spy? Information Leakage Attack on Archive Formats. IEEE Access 12: 105258-105267 (2024) - [j12]Seong Hee Park, Soo-Hyun Lee, Min Young Lim, Pyo Min Hong, Youn Kyu Lee:
A Comprehensive Risk Analysis Method for Adversarial Attacks on Biometric Authentication Systems. IEEE Access 12: 116693-116710 (2024) - [j11]Jung Won Yoon, Hyun Jun Yook, Pyo Min Hong, Youn Kyu Lee, Tae Hyung Kim:
Orthogonal Transform-Driven Data Augmentation for Limited Gaussian-Tainted Dataset. IEEE Access 12: 127272-127282 (2024) - [j10]Soohyun Park, Hankyul Baek, Jung Won Yoon, Youn Kyu Lee, Joongheon Kim:
AQUA: Analytics-driven quantum neural network (QNN) user assistance for software validation. Future Gener. Comput. Syst. 159: 545-556 (2024) - [j9]Dayeon Kim, Hyungdong Park, Inguk Yeo, Youn Kyu Lee, Youngmin Kim, Hyung-Min Lee, Kon-Woo Kwon:
Rowhammer Attacks in Dynamic Random-Access Memory and Defense Methods. Sensors 24(2): 592 (2024) - [j8]Min Young Lim, Seong Hee Park, Soo-Hyun Lee, Jung Won Yoon, Pyo Min Hong, Hwajung Yoo, Kon-Woo Kwon, Jongwook Jeong, Youn Kyu Lee:
VELCRO: A visual-based programming tool for effortless deep learning model construction. SoftwareX 26: 101656 (2024) - 2023
- [j7]Hwajung Yoo, Pyo Min Hong, Taeyong Kim, Jung Won Yoon, Youn Kyu Lee:
Defending Against Adversarial Fingerprint Attacks Based on Deep Image Prior. IEEE Access 11: 78713-78725 (2023) - [j6]Soohyun Park, Hao Feng, Chanyoung Park, Youn Kyu Lee, Soyi Jung, Joongheon Kim:
EQuaTE: Efficient Quantum Train Engine for Runtime Dynamic Analysis and Visual Feedback in Autonomous Driving. IEEE Internet Comput. 27(5): 24-31 (2023) - [j5]Youn Kyu Lee, Seong Hee Park, Min Young Lim, Soo-Hyun Lee, Jongwook Jeong:
Towards Ensuring Software Interoperability Between Deep Learning Frameworks. J. Artif. Intell. Soft Comput. Res. 13(4): 215-228 (2023) - [c24]Jaemin Song, Yong Oh Lee, Seho Park, Youn Kyu Lee, Hansang Park, Hyun-Bum Kim:
Enhancing Vocal-Based Laryngeal Cancer Screening with Additional Patient Information and Voice Signal Embedding. IEEE Big Data 2023: 3731-3735 - [c23]Soohyun Park, Hao Feng, Won Joon Yun, Chanyoung Park, Youn Kyu Lee, Soyi Jung, Joongheon Kim:
Demo: EQuaTE: Efficient Quantum Train Engine Design and Demonstration for Dynamic Software Analysis. ICDCS 2023: 1009-1012 - [c22]Jung Won Yoon, Hyun Jun Yook, Jae Eun Seo, Jae Hun Choi, Youn Kyu Lee:
Beyond Perspectives: Enhancing Pose Estimation via Viewpoint Transformation. ICTC 2023: 822-826 - [c21]Min Young Lim, Seong-Hee Park, Soo-Hyun Lee, Tae Hyung Kim, Dongwoo Kang, Youn Kyu Lee:
Enhancing Nighttime Vehicle Detection via Transformer-based Data Augmentation. ICTC 2023: 827-832 - [c20]Pyo Min Hong, So Hyun Kang, Jinhyeon Kim, Ji Hoo Kim, Youn Kyu Lee:
Adversarial2Adversarial: Defending against Adversarial Fingerprint Attacks without Clean Images. ICTC 2023: 1278-1282 - [c19]Min Young Lim, Pyo Min Hong, Youn Kyu Lee:
Two-Stage Image Restoration: A Shield against Adversarial Attacks on Face Identification. ICTC 2023: 1283-1285 - [i4]Soohyun Park, Won Joon Yun, Chanyoung Park, Youn Kyu Lee, Soyi Jung, Hao Feng, Joongheon Kim:
EQuaTE: Efficient Quantum Train Engine for Dynamic Analysis via HCI-based Visual Feedback. CoRR abs/2302.03853 (2023) - 2022
- [j4]Jongwook Jeong, Youn Kyu Lee:
Identifying Temporal Corpus for Enhanced User Comments Analysis. Int. J. Softw. Eng. Knowl. Eng. 32(3): 439-456 (2022) - [j3]Mpyana Mwamba Merlec, Md. Mainul Islam, Youn Kyu Lee, Hoh Peter In:
A Consortium Blockchain-Based Secure and Trusted Electronic Portfolio Management Scheme. Sensors 22(3): 1271 (2022) - [c18]Min Young Lim, Tae Yong Kim, Joung Eun Park, Pyo Min Hong, Youn Kyu Lee:
A Central Point-based Analysis for Fingerprint Liveness Detection. ICTC 2022: 1307-1309 - [c17]Soo-Hyun Lee, Min Young Lim, Seong-Hee Park, Hwajung Yoo, Youn Kyu Lee:
Towards Cross-materials: Fingerprint Liveness Detection based on Style Transfer. ICTC 2022: 1332-1334 - [c16]Seong-Hee Park, Min Young Lim, Dongwoo Kang, Youn Kyu Lee:
Towards Robust Combination of Neural Networks for Fingerprint Presentation Attack Detection. ICTC 2022: 1829-1834 - [c15]Donghyun Kim, Youn Kyu Lee, Jongwook Jeong:
NULL byte injection: anti-forensic technique for data hiding in FAT32 file system. MobiHoc 2022: 265-270 - [i3]Youngkee Kim, Won Joon Yun, Youn Kyu Lee, Joongheon Kim:
Two-Stage Architectural Fine-Tuning with Neural Architecture Search using Early-Stopping in Image Classification. CoRR abs/2202.08604 (2022) - 2021
- [j2]Youn Kyu Lee, Jongwook Jeong:
Securing biometric authentication system using blockchain. ICT Express 7(3): 322-326 (2021) - [j1]Mpyana Mwamba Merlec, Youn Kyu Lee, Seng-Phil Hong, Hoh Peter In:
A Smart Contract-Based Dynamic Consent Management System for Personal Data Usage under GDPR. Sensors 21(23): 7994 (2021) - [c14]Mpyana Mwamba Merlec, Youn Kyu Lee, Hoh Peter In:
SmartBuilder: A Block-based Visual Programming Framework for Smart Contract Development. Blockchain 2021: 90-94 - [c13]Hee won Kwon, Jae-Won Nam, Joongheon Kim, Youn Kyu Lee:
Generative Adversarial Attacks on Fingerprint Recognition Systems. ICOIN 2021: 483-485 - [c12]Jae-Won Nam, Youn Kyu Lee:
Machine-Learning based Analog and Mixed-signal Circuit Design and Optimization. ICOIN 2021: 874-876 - [c11]Lovemore Ngwira, Mpyana Mwamba Merlec, Youn Kyu Lee, Hoh Peter In:
Towards Context-Aware Smart Contracts for Blockchain IoT Systems. ICTC 2021: 82-87 - [c10]Youngkee Kim, Won Joon Yun, Youn Kyu Lee, Soyi Jung, Joongheon Kim:
Trends in Neural Architecture Search: Towards the Acceleration of Search. ICTC 2021: 421-424 - [c9]Soo-Hyun Lee, Gyung-Eun Yun, Min Young Lim, Youn Kyu Lee:
A Study on Effective Use of BPM Information in Deepfake Detection. ICTC 2021: 425-427 - [c8]Seok Bin Son, Seong-Hee Park, Youn Kyu Lee:
A Measurement Study on Gray Channel-based Deepfake Detection. ICTC 2021: 428-430 - [i2]Youngkee Kim, Won Joon Yun, Youn Kyu Lee, Soyi Jung, Joongheon Kim:
Trends in Neural Architecture Search: Towards the Acceleration of Search. CoRR abs/2108.08474 (2021)
2010 – 2019
- 2018
- [c7]Arman Shahbazian, Youn Kyu Lee, Duc Minh Le, Yuriy Brun, Nenad Medvidovic:
Recovering Architectural Design Decisions. ICSA 2018: 95-104 - [c6]Daye Nam, Youn Kyu Lee, Nenad Medvidovic:
EVA: a tool for visualizing software architectural evolution. ICSE (Companion Volume) 2018: 53-56 - [c5]Arman Shahbazian, Youn Kyu Lee, Yuriy Brun, Nenad Medvidovic:
Making well-informed software design decisions. ICSE (Companion Volume) 2018: 262-263 - 2017
- [c4]Youn Kyu Lee, Jae Young Bang, Gholamreza Safi, Arman Shahbazian, Yixue Zhao, Nenad Medvidovic:
A SEALANT for inter-app security holes in android. ICSE 2017: 312-323 - [c3]Youn Kyu Lee, Peera Yoodee, Arman Shahbazian, Daye Nam, Nenad Medvidovic:
SEALANT: a detection and visualization tool for inter-app security vulnerabilities in Android. ASE 2017: 883-888 - [i1]Arman Shahbazian, Youn Kyu Lee, Duc Minh Le, Nenad Medvidovic:
Uncovering Architectural Design Decisions. CoRR abs/1704.04798 (2017) - 2014
- [c2]Youn Kyu Lee, Hoh Peter In, Rick Kazman:
Customer Requirements Validation Method Based on Mental Models. APSEC (1) 2014: 199-206 - [c1]Youn Kyu Lee, Jae Young Bang, Joshua Garcia, Nenad Medvidovic:
ViVA: a visualization and analysis tool for distributed event-based systems. ICSE Companion 2014: 580-583
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 01:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint