Hae Young Lee

According to our database1, Hae Young Lee authored at least 40 papers between 2006 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Buffer overflow detection in DEVS simulation using canaries.
Proceedings of the 2017 Winter Simulation Conference, 2017

Log generation for coding behavior analysis: For focusing on how kids are coding not what they are coding.
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017

2016
Simulation model cost database.
Proceedings of the Winter Simulation Conference, WSC 2016, 2016

COIN-VASE: Code Injection Vulnerability Scanning Environment for HTML5-Based Android Apps.
Proceedings of the 8th EAI International Conference on Mobile Computing, 2016

Poster Abstract: Modeling, Simulation and Verification Environment for Engineering Cyber-Physical Systems Based on Discrete Event System Specification.
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016

2015
Fuzzy-Based Adaptive Countering Method against False Endorsement Insertion Attacks in Wireless Sensor Networks.
IJDSN, 2015

Fuzzy-Based Adaptive Countering Method against False Data Injection Attacks in Wireless Sensor Networks.
IEICE Transactions, 2015

Web-in-the-loop simulation framework for supporting CORS-based development.
Proceedings of the Poster Session and Student Colloquium Symposium, 2015

2014
Defending against wireless network intrusion.
J. Comput. Syst. Sci., 2014

Nondeterministic and elapsed-time-sensitive DEVS.
Proceedings of the 2014 SpringSim Poster Session, Tampa, FL, USA, April 13 - 16, 2014, 2014

2013
An agent-based self-adaptation architecture for implementing smart devices in Smart Space.
Telecommunication Systems, 2013

Towards Model Checking of Simulation Models for Embedded System Development.
Proceedings of the 19th IEEE International Conference on Parallel and Distributed Systems, 2013

Digital Media Art Applying Physical Game Technology Using Gesture Recognition.
Proceedings of the HCI International 2013 - Posters' Extended Abstracts, 2013

2012
WiP Abstract: From Design to Operation of a Large-Scale CPS.
Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, 2012

2011
Path Renewal Method in Filtering Based Wireless Sensor Networks.
Sensors, 2011

Optimized Fuzzy Adaptive Filtering for Ubiquitous Sensor Networks.
IEICE Transactions, 2011

Location Based Hierarchical Secure Multicast Group Building in Wireless Sensor Networks.
Proceedings of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, 2011

DVML: DEVS-Based Visual Modeling Language for Hybrid Systems.
Proceedings of the Control and Automation, and Energy System Engineering, 2011

Formal Verification of DEV&DESS Formalism Using Symbolic Model Checker HyTech.
Proceedings of the Control and Automation, and Energy System Engineering, 2011

2010
Environment-based Selection Method for En-route Filtering Scheme using Fuzzy Logic.
JNW, 2010

Security Requirement Representation Method for Confidence of Systems and Networks.
International Journal of Software Engineering and Knowledge Engineering, 2010

Simulation Modeling of SAM Fuzzy Logic Controllers.
IEICE Transactions, 2010

A Scheme for Adaptively Countering Application Layer Security Attacks in Wireless Sensor Networks.
IEICE Transactions, 2010

Fuzzy-Based Filtering Solution Selection Method For Dynamic Sensor Networks1.
Intelligent Automation & Soft Computing, 2010

Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Implementation of Cloud Computing Environment for Discrete Event System Simulation using Service Oriented Architecture.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
A Path Selection Method for Improving the Detection Power of Statistical Filtering in Sensor Networks.
J. Inf. Sci. Eng., 2009

Fuzzy-Based Path Selection Method for Improving the Detection of False Reports in Sensor Networks.
IEICE Transactions, 2009

Adaptive threshold determination method for the dynamic filtering in wireless sensor networks using fuzzy logic.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

2008
Fuzzy Adaptive Partitioning Method for the Statistical Filtering.
IEICE Transactions, 2008

A* -based layout design for gratings allocation.
Computer-Aided Design, 2008

A General Framework for Adaptive Filtering in Wireless Sensor Networks Based on Fuzzy Logic.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2008

2007
Fuzzy Rule-Based Enhancing Key Dissemination Method for the Dynamic Filtering-Based Sensor Networks.
I. J. Information Acquisition, 2007

Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks.
IEICE Transactions, 2007

Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Fuzzy Adaptive Threshold Determining in the Key Inheritance Based Sensor Networks.
Proceedings of the New Trends in Applied Artificial Intelligence, 2007

Fuzzy Key Dissemination Limiting Method for the Dynamic Filtering-Based Sensor Networks.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

Fuzzy Security Parameter Determining Method for the Commutative Cipher Based Filtering in Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2007

2006
Fuzzy-Based Adaptive Threshold Determining Method for the Interleaved Authentication in Sensor Networks.
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006

Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks.
Proceedings of the Distributed Computing and Internet Technology, 2006


  Loading...