Search Results - "Lim, Jongin"
-
1
Scene conditional background update for moving object detection in a moving camera
Published in Pattern recognition letters (01-03-2017)“…•This paper proposes a moving object detection algorithm adapting to various scene changes in a moving camera.•Our method estimates three scene condition…”
Get full text
Journal Article -
2
Weaknesses in an Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks
Published in IEEE communications letters (01-07-2009)“…Recently, Chang, Lee, and Chiu proposed an enhanced anonymous authentication scheme which permits mobile users to anonymously enjoy roaming service in global…”
Get full text
Journal Article -
3
Improved Delegation-Based Authentication Protocol for Secure Roaming Service with Unlinkability
Published in IEEE communications letters (01-09-2010)“…Recently, Lee et al. proposed a delegation-based authentication protocol which provides secure and private roaming service for portable communication systems…”
Get full text
Journal Article -
4
A Study of K-ISMS Fault Analysis for Constructing Secure Internet of Things Service
Published in International journal of distributed sensor networks (01-01-2015)“…Although Internet of Things (IoT) technologies and services are being developed rapidly worldwide, concerns of potential security threats such as privacy…”
Get full text
Journal Article -
5
Attention-inspired moving object detection in monocular dashcam videos
Published in 2016 23rd International Conference on Pattern Recognition (ICPR) (01-12-2016)“…This paper proposes a moving object detection algorithm for a monocular dashcam mounted on a vehicle. To deal with dynamic changes of the scene from the…”
Get full text
Conference Proceeding -
6
Influence-Balanced Loss for Imbalanced Visual Classification
Published in 2021 IEEE/CVF International Conference on Computer Vision (ICCV) (01-10-2021)“…In this paper, we propose a balancing training method to address problems in imbalanced data learning. To this end, we derive a new loss used in the balancing…”
Get full text
Conference Proceeding -
7
Hypergraph-Induced Semantic Tuplet Loss for Deep Metric Learning
Published in 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (01-06-2022)“…In this paper, we propose Hypergraph-Induced Semantic Tuplet (HIST) loss for deep metric learning that leverages the multilateral semantic relations of…”
Get full text
Conference Proceeding -
8
Situation-aware Framework for Moving Object Detection in Moving Cameras
Published in 8th International Conference of Pattern Recognition Systems (ICPRS 2017) (2017)“…In this paper, we propose a situation-aware background learning scheme to detect moving objects in the dynamic background environments using moving cameras. To…”
Get full text
Conference Proceeding -
9
Known-IV, known-in-advance-IV, and replayed-and-known-IV attacks on multiple modes of operation of block ciphers
Published in Journal of cryptology (01-10-2006)“…Normally, it has been believed that the initial values of cryptographic schemes do not need to be managed secretly unlike the secret keys. However, we show…”
Get full text
Journal Article -
10
Pose transforming network: Learning to disentangle human posture in variational auto-encoded latent space
Published in Pattern recognition letters (01-09-2018)“…•Deep conditional generative model for human pose transforms.•Model formulation to disentangle human posture from image identity in latent space.•Deep…”
Get full text
Journal Article -
11
A new hardware architecture for operations in GF(2/sup n/)
Published in IEEE transactions on computers (01-01-2002)“…The efficient computation of the arithmetic operations in finite fields is closely related to the particular ways in which the field elements are presented…”
Get full text
Journal Article -
12
BiasAdv: Bias-Adversarial Augmentation for Model Debiasing
Published in 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (01-06-2023)“…Neural networks are often prone to bias toward spurious correlations inherent in a dataset, thus failing to generalize unbiased test criteria. A key challenge…”
Get full text
Conference Proceeding -
13
Efficient normal basis multipliers in composite fields
Published in IEEE transactions on computers (01-10-2000)“…It is well-known that a class of finite fields GF(2/sup n/) using an optimal normal basis is most suitable for a hardware implementation of arithmetic in…”
Get full text
Journal Article -
14
Impossible differential cryptanalysis using matrix method
Published in Discrete mathematics (06-03-2010)“…The general strategy of impossible differential cryptanalysis is to first find impossible differentials and then exploit them for retrieving subkey material…”
Get full text
Journal Article -
15
National cyber security enhancement scheme for intelligent surveillance capacity with public IoT environment
Published in The Journal of supercomputing (01-03-2017)“…As the age of Internet of Things (IoT) has come, national-level cyber security measures should be prepared and concrete implementation plans should be…”
Get full text
Journal Article -
16
Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home
Published in 21st International Conference on Advanced Information Networking and Applications (AINA '07) (01-05-2007)“…In this paper, we propose UsMSS (User-centric secure Multimedia Service System) which provides interoperability of multimedia contents among incompatible…”
Get full text
Conference Proceeding -
17
Arbitrated quantum signature scheme with message recovery
Published in Physics letters. A (16-02-2004)“…Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other…”
Get full text
Journal Article -
18
Selective Ensemble Network for Accurate Crowd Density Estimation
Published in 2018 24th International Conference on Pattern Recognition (ICPR) (01-08-2018)“…This paper proposes a selective ensemble deep network architecture for crowd density estimation and people counting. In contrast to existing deep network-based…”
Get full text
Conference Proceeding -
19
Password Recovery Using an Evidence Collection Tool and Countermeasures
Published in Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) (01-11-2007)“…In this paper we propose a methodology used to analyse collected pagefiles belonging to public computers using a pagefile collection tool (PCT), which is…”
Get full text
Conference Proceeding -
20
A Tool for the Detection of Hidden Data in Microsoft Compound Document File Format
Published in 2008 International Conference on Information Science and Security (ICISS 2008) (01-01-2008)“…For digital forensic investigators, files that use Microsoft compound document file format (MCDFF) present a problem: It is easy to hide information in MCDFF…”
Get full text
Conference Proceeding