Gunhee Lee

Orcid: 0000-0001-9131-1450

According to our database1, Gunhee Lee authored at least 29 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Aberration Estimation for Synthetic Aperture Digital Holographic Microscope Using Deep Neural Network.
Sensors, November, 2023

2022
StyLandGAN: A StyleGAN based Landscape Image Synthesis using Depth-map.
CoRR, 2022

2021
Vital signal sensing and manipulation of a microscale organ with a multifunctional soft gripper.
Sci. Robotics, 2021

2020
Deep color transfer using histogram analogy.
Vis. Comput., 2020

Converting the Point of View of Message Spoken to Virtual Assistants.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020

2019
Naturalness-Preserving Image Tone Enhancement Using Generative Adversarial Networks.
Comput. Graph. Forum, 2019

Acceleration of DNN Backward Propagation by Selective Computation of Gradients.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

2018
Training Neural Networks with Low Precision Dynamic Fixed-Point.
Proceedings of the 36th IEEE International Conference on Computer Design, 2018

2017
Centralized Contention Based MAC for OFDMA WLAN.
IEICE Trans. Inf. Syst., 2017

Threat From Being Social: Vulnerability Analysis of Social Network Coupled Smart Grid.
IEEE Access, 2017

2016
Hidden chain: a full-duplex MAC protocol using hidden terminal relationships in wlans.
Proceedings of the 12th Annual Conference on Wireless On-demand Network Systems and Services, 2016

Adaptive delay monitoring for wide voltage-range operation.
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016

An Adaptive DoS Attack Mitigation Measure for Field Networks in Smart Grids.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Lightweight IEC 61850 Secure Communication Module for Microgrids.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networks.
Peer-to-Peer Netw. Appl., 2015

In-frame querying to utilize full duplex communication in IEEE 802.11ax.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2015

2013
IO-MAC: An Enhancement of IEEE 802.11 DCF Using Implicit Ordering.
Wirel. Pers. Commun., 2013

Towards optimal adaptive routing in 3D NoC with limited vertical bandwidth.
Proceedings of the Network on Chip Architectures, 2013

2012
Sensing and transmission parameter determination for cognitive radio networks.
Proceedings of the 2012 International Conference on Information Networking, 2012

2008
RSRP: A Robust Secure Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

2006
A Privacy-Aware Service Protocol for Ubiquitous Computing Environments.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

2005
An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction.
Proceedings of the Information Networking, 2005

Y-AOI: Y-Means Based Attribute Oriented Induction Identifying Root Cause for IDSs.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

An Effective Method for Location Privacy in Ubiquitous Computing.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

2004
Effective Web-Related Resource Security Using Distributed Role Hierarchy.
Proceedings of the Advances in Web-Age Information Management: 5th International Conference, 2004

RPS: An Extension of Reference Monitor to Prevent Race-Attacks.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004

A Novel Method to Support User's Consent in Usage Control for Stable Trust in E-business.
Proceedings of the Computational Science and Its Applications, 2004

2003
Web Security Using Distributed Role Hierarchy.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

1999
Dynamics of Modeling in Data Mining: Interpretive Approach to Bankruptcy Prediction.
J. Manag. Inf. Syst., 1999


  Loading...