In-Jung Kim

According to our database1, In-Jung Kim authored at least 24 papers between 1997 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Improving discrimination ability of convolutional neural networks by hybrid learning.
Int. J. Document Anal. Recognit., 2016

Interactive learning environment for practical programming language based on web service.
Proceedings of the 15th International Conference on Information Technology Based Higher Education and Training, 2016

2015
Handwritten Hangul recognition using deep convolutional neural networks.
Int. J. Document Anal. Recognit., 2015

2014
Discrimination of similar characters using nonlinear normalization based on regional importance measure.
Int. J. Document Anal. Recognit., 2014

2013
An evaluation of statistical methods in handwritten hangul recognition.
Int. J. Document Anal. Recognit., 2013

2007
Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures.
Proceedings of the Computational Science and Its Applications, 2007

2006
Information System Modeling for Analysis of Propagation Effects and Levels of Damage.
Proceedings of the Computational Science and Its Applications, 2006

Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model.
Proceedings of the Computational Science and Its Applications, 2006

2005
The Plan and Tools for Vulnerability Testing in Information Software-Based System.
J. Inf. Process. Syst., 2005

A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks.
Proceedings of the Information Security and Cryptology, 2005

A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems.
Proceedings of the Computational Science and Its Applications, 2005

Security Risk Vector for Quantitative Asset Assessment.
Proceedings of the Computational Science and Its Applications, 2005

A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS.
Proceedings of the Public Key Infrastructure, 2005

2004
Multi-window binarization of camera image for document recognition.
Proceedings of the Ninth International Workshop on Frontiers in Handwriting Recognition, 2004

The Design and Development for Risk Analysis Automatic Tool.
Proceedings of the Computational Science and Its Applications, 2004

A Study on Security Risk Modeling over Information and Communication Infrastructure.
Proceedings of the International Conference on Security and Management, 2004

The Development of Risk Analysis Methodology for Information Asset on Network.
Proceedings of the International Conference on Security and Management, 2004

A Security Risk Analysis Model for Information Systems.
Proceedings of the Systems Modeling and Simulation: Theory and Applications, 2004

2003
Statistical Character Structure Modeling and Its Application to Handwritten Chinese Character Recognition.
IEEE Trans. Pattern Anal. Mach. Intell., 2003

The Development for the Risk Assessment Methodology of Spiral Model.
Proceedings of the International Conference on Security and Management, 2003

2002
Pair-wise discrimination based on a stroke importance measure.
Pattern Recognit., 2002

2001
Model-based stroke extraction and matching for handwritten Chinese character recognition.
Pattern Recognit., 2001

1999
Stroke-guided Pixel Matching for Handwritten Chinese Character Recognition.
Proceedings of the Fifth International Conference on Document Analysis and Recognition, 1999

1997
High Accuracy Handwritten Chinese Character Recognition by Improved Feature Matching Method.
Proceedings of the 4th International Conference Document Analysis and Recognition (ICDAR '97), 1997


  Loading...