Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A White-List Based Security Architecture (WLSA) for the Safe Mobile Office in the BYOD Era., , and . GPC, volume 7861 of Lecture Notes in Computer Science, page 860-865. Springer, (2013)Predicting Short-Term Traffic Speed Using a Deep Neural Network to Accommodate Citywide Spatio-Temporal Correlations., , and . IEEE Trans. Intell. Transp. Syst., 22 (3): 1435-1448 (2021)Fusion for Multimodal Biometric Identification., , , , , , and . AVBPA, volume 3546 of Lecture Notes in Computer Science, page 1071-1079. Springer, (2005)Local and Global Feature Extraction for Face Recognition., , and . AVBPA, volume 3546 of Lecture Notes in Computer Science, page 219-228. Springer, (2005)Local Feature Analysis with Class Information., , , , , and . KES (4), volume 3684 of Lecture Notes in Computer Science, page 532-541. Springer, (2005)Team SNU's Control Strategies for Enhancing a Robot's Capability: Lessons from the 2015 DARPA Robotics Challenge Finals., , , , , , , , , and 13 other author(s). J. Field Robotics, 34 (2): 359-380 (2017)Confidence Guided Depth Completion Network., , , and . CoRR, (2022)A Pixel-Weighting Method for Discriminating Objects of Different Sizes in an Image Captured from a Single Camera., , , , , and . CRV, page 36. IEEE Computer Society, (2006)Automatic Extraction of Skeletal Maturity from Whole Body Pediatric Scoliosis X-rays Using Regional Proposal and Compound Scaling Convolutional Neural Networks., , , , , , , , , and 3 other author(s). BIBM, page 996-1000. IEEE, (2020)Maximum within-cluster association., and . Pattern Recognit. Lett., 26 (10): 1412-1422 (2005)