W-net: a CNN-based architecture for white blood cells image classification C Jung, M Abuhamad, J Alikhanov, A Mohaisen, K Han, DH Nyang arXiv preprint arXiv:1910.01091, 2019 | 29 | 2019 |
WBC image classification and generative models based on convolutional neural network C Jung, M Abuhamad, D Mohaisen, K Han, DH Nyang BMC Medical Imaging 22 (1), 1-16, 2022 | 15 | 2022 |
A Study of User Behavior Recognition-Based PIN Entry Using Machine Learning Technique C Jung, Z Dagvatur, RH Jang, DH Nyang, KH Lee KIPS Transactions on Computer and Communication Systems 7 (5), 127-136, 2018 | 7 | 2018 |
A Mobile Customization Technique using Push Service CH Jung, JH Ye, CJ Kim Journal of the Korea Academia-Industrial Cooperation Society 14 (9), 4498-4506, 2013 | 6 | 2013 |
A network-independent tool-based usable authentication system for Internet of Things devices C Jung, J Choi, R Jang, D Mohaisen, DH Nyang Computers & Security 108, 102338, 2021 | 5 | 2021 |
A one-page text entry method optimized for rectangle smartwatches R Jang, C Jung, D Mohaisen, K Lee, D Nyang IEEE Transactions on Mobile Computing 21 (10), 3443-3454, 2021 | 5 | 2021 |
Digitalseal: a transaction authentication tool for online and offline transactions C Jung, J Kang, A Mohaisen, DH Nyang 2018 IEEE International Conference on Acoustics, Speech and Signal …, 2018 | 4 | 2018 |
A Dynamic Location Recognition Technique for Location-based Service C Jung, C Kim Journal of the Korea Academia-Industrial cooperation Society 15 (7), 4562-4572, 2014 | 4 | 2014 |
Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows DN Dao, R Jang, C Jung, D Mohaisen, DH Nyang 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022 | 3 | 2022 |
Count-less: A counting sketch for the data plane of high speed switches SY Kim, C Jung, RH Jang, D Mohaisen, DH Nyang arXiv preprint arXiv:2111.02759, 2021 | 2 | 2021 |
Technique for PIN Entry Using an Accelerometer Sensor and a Vibration Sensor on Smartphone C Jung, RH Jang, DH Nyang, KH Lee KIPS Transactions on Computer and Communication Systems 6 (12), 497-506, 2017 | 2 | 2017 |
A method for generating robust key from face image and user intervention H Kim, JC Choi, C Jung, DH Nyang, KH Lee Journal of the Korea Institute of Information Security & Cryptology 27 (5 …, 2017 | 2 | 2017 |
Enhancing RCC (Recyclable counter with confinement) with cuckoo hashing R Jang, C Jung, K Kim, D Nyang, KH Lee The Journal of Korean Institute of Communications and Information Sciences …, 2016 | 2 | 2016 |
A Scalable and Dynamic ACL System for In-Network Defense C Jung, S Kim, R Jang, D Mohaisen, DH Nyang Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 1 | 2022 |
White Blood Cells (WBC) Images Classification Using CNN-Based Networks C Jung, M Abuhamad, D Mohaisen, K Han, DH Nyang | 1 | 2021 |
SHIELD: Thwarting Code Authorship Attribution M Abuhamad, C Jung, D Mohaisen, DH Nyang arXiv preprint arXiv:2304.13255, 2023 | | 2023 |
Wall Cuckoo. A Method for Reducing Memory Access Using Hash Function Categorization S Moon, D Min, R Jang, C Jung, D NYang, K Lee KIPS Transactions on Computer and Communication Systems 8 (6), 127-138, 2019 | | 2019 |
A Study of Flying Intrusion Detector using the Drone L Juha, C Jung, DH Nyang Proceedings of the Korea Information Processing Society Conference, 326-329, 2017 | | 2017 |
Digital Legal Seal for Message Authentication Code CH Jung, DO Shin, RH Jang, DH Nyang, KH Lee, HY Youm Journal of the Korea Institute of Information Security & Cryptology 26 (2 …, 2016 | | 2016 |
오디오 채널을 이용하는 인증 시스템의 동향 정창훈, 양대헌 정보보호학회지 25 (3), 29-35, 2015 | | 2015 |