Search Results - "Lim, Jongin"

Refine Results
  1. 1

    Scene conditional background update for moving object detection in a moving camera by Yun, Kimin, Lim, Jongin, Choi, Jin Young

    Published in Pattern recognition letters (01-03-2017)
    “…•This paper proposes a moving object detection algorithm adapting to various scene changes in a moving camera.•Our method estimates three scene condition…”
    Get full text
    Journal Article
  2. 2

    Weaknesses in an Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks by YOUN, Taek-Young, PARK, Young-Ho, LIM, Jongin

    Published in IEEE communications letters (01-07-2009)
    “…Recently, Chang, Lee, and Chiu proposed an enhanced anonymous authentication scheme which permits mobile users to anonymously enjoy roaming service in global…”
    Get full text
    Journal Article
  3. 3

    Improved Delegation-Based Authentication Protocol for Secure Roaming Service with Unlinkability by YOUN, Taek-Young, LIM, Jongin

    Published in IEEE communications letters (01-09-2010)
    “…Recently, Lee et al. proposed a delegation-based authentication protocol which provides secure and private roaming service for portable communication systems…”
    Get full text
    Journal Article
  4. 4

    A Study of K-ISMS Fault Analysis for Constructing Secure Internet of Things Service by Kim, Hwankuk, Lim, Jongin, Lee, Kyungho

    “…Although Internet of Things (IoT) technologies and services are being developed rapidly worldwide, concerns of potential security threats such as privacy…”
    Get full text
    Journal Article
  5. 5

    Attention-inspired moving object detection in monocular dashcam videos by Kimin Yun, Jongin Lim, Sangdoo Yun, Soo Wan Kim, Jin Young Choi

    “…This paper proposes a moving object detection algorithm for a monocular dashcam mounted on a vehicle. To deal with dynamic changes of the scene from the…”
    Get full text
    Conference Proceeding
  6. 6

    Influence-Balanced Loss for Imbalanced Visual Classification by Park, Seulki, Lim, Jongin, Jeon, Younghan, Choi, Jin Young

    “…In this paper, we propose a balancing training method to address problems in imbalanced data learning. To this end, we derive a new loss used in the balancing…”
    Get full text
    Conference Proceeding
  7. 7

    Hypergraph-Induced Semantic Tuplet Loss for Deep Metric Learning by Lim, Jongin, Yun, Sangdoo, Park, Seulki, Choi, Jin Young

    “…In this paper, we propose Hypergraph-Induced Semantic Tuplet (HIST) loss for deep metric learning that leverages the multilateral semantic relations of…”
    Get full text
    Conference Proceeding
  8. 8

    Situation-aware Framework for Moving Object Detection in Moving Cameras by Kimin Yun, Jongin Lim, Jin Young Choi

    “…In this paper, we propose a situation-aware background learning scheme to detect moving objects in the dynamic background environments using moving cameras. To…”
    Get full text
    Conference Proceeding
  9. 9

    Known-IV, known-in-advance-IV, and replayed-and-known-IV attacks on multiple modes of operation of block ciphers by HONG, Deukjo, HONG, Seokhie, LEE, Wonil, LEE, Sangjin, LIM, Jongin, SUNG, Jaechul, YI, Okyeon

    Published in Journal of cryptology (01-10-2006)
    “…Normally, it has been believed that the initial values of cryptographic schemes do not need to be managed secretly unlike the secret keys. However, we show…”
    Get full text
    Journal Article
  10. 10

    Pose transforming network: Learning to disentangle human posture in variational auto-encoded latent space by Lim, Jongin, Yoo, Youngjoon, Heo, Byeongho, Choi, Jin Young

    Published in Pattern recognition letters (01-09-2018)
    “…•Deep conditional generative model for human pose transforms.•Model formulation to disentangle human posture from image identity in latent space.•Deep…”
    Get full text
    Journal Article
  11. 11

    A new hardware architecture for operations in GF(2/sup n/) by Kim, Chang Han, Oh, Sangho, Lim, Jongin

    Published in IEEE transactions on computers (01-01-2002)
    “…The efficient computation of the arithmetic operations in finite fields is closely related to the particular ways in which the field elements are presented…”
    Get full text
    Journal Article
  12. 12

    BiasAdv: Bias-Adversarial Augmentation for Model Debiasing by Lim, Jongin, Kim, Youngdong, Kim, Byungjai, Ahn, Chanho, Shin, Jinwoo, Yang, Eunho, Han, Seungju

    “…Neural networks are often prone to bias toward spurious correlations inherent in a dataset, thus failing to generalize unbiased test criteria. A key challenge…”
    Get full text
    Conference Proceeding
  13. 13

    Efficient normal basis multipliers in composite fields by Oh, Sangho, Kim, Chang Han, Lim, Jongin, Cheon, Dong Hyeon

    Published in IEEE transactions on computers (01-10-2000)
    “…It is well-known that a class of finite fields GF(2/sup n/) using an optimal normal basis is most suitable for a hardware implementation of arithmetic in…”
    Get full text
    Journal Article
  14. 14

    Impossible differential cryptanalysis using matrix method by Kim, Jongsung, Hong, Seokhie, Lim, Jongin

    Published in Discrete mathematics (06-03-2010)
    “…The general strategy of impossible differential cryptanalysis is to first find impossible differentials and then exploit them for retrieving subkey material…”
    Get full text
    Journal Article
  15. 15

    National cyber security enhancement scheme for intelligent surveillance capacity with public IoT environment by Kim, Kwangho, Kim, InJung, Lim, Jongin

    Published in The Journal of supercomputing (01-03-2017)
    “…As the age of Internet of Things (IoT) has come, national-level cyber security measures should be prepared and concrete implementation plans should be…”
    Get full text
    Journal Article
  16. 16

    Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home by Jong Hyuk Park, Sangjin Lee, Dong Hoon Lee, Jongin Lim, In-Hwa Hong, Yang, L.T.

    “…In this paper, we propose UsMSS (User-centric secure Multimedia Service System) which provides interoperability of multimedia contents among incompatible…”
    Get full text
    Conference Proceeding
  17. 17

    Arbitrated quantum signature scheme with message recovery by Lee, Hwayean, Hong, Changho, Kim, Hyunsang, Lim, Jongin, Yang, Hyung Jin

    Published in Physics letters. A (16-02-2004)
    “…Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other…”
    Get full text
    Journal Article
  18. 18

    Selective Ensemble Network for Accurate Crowd Density Estimation by Jeong, Jiyeoup, Jeong, Hawook, Lim, Jongin, Choi, Jongwon, Yun, Sangdoo, Choi, Jin Young

    “…This paper proposes a selective ensemble deep network architecture for crowd density estimation and people counting. In contrast to existing deep network-based…”
    Get full text
    Conference Proceeding
  19. 19

    Password Recovery Using an Evidence Collection Tool and Countermeasures by Seokhee Lee, Savoldi, A., Sangjin Lee, Jongin Lim

    “…In this paper we propose a methodology used to analyse collected pagefiles belonging to public computers using a pagefile collection tool (PCT), which is…”
    Get full text
    Conference Proceeding
  20. 20

    A Tool for the Detection of Hidden Data in Microsoft Compound Document File Format by Hyukdon Kwon, Yeog Kim, Sangjin Lee, Jongin Lim

    “…For digital forensic investigators, files that use Microsoft compound document file format (MCDFF) present a problem: It is easy to hide information in MCDFF…”
    Get full text
    Conference Proceeding