KyungHee Lee

According to our database1, KyungHee Lee authored at least 16 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The Development and Future of Computer Science Education in South Korea.
Inroads, March, 2024

2022
A One-Page Text Entry Method Optimized for Rectangle Smartwatches.
IEEE Trans. Mob. Comput., 2022

2020
An Implementation of NNEF-Darknet Neural Network Model Converter.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

2019
Structure of Deep Learning Inference Engines for Embedded Systems.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

2018
Neural Network Syntax Analyzer for Embedded Standardized Deep Learning.
Proceedings of the 2nd International Workshop on Embedded and Mobile Deep Learning, 2018

2015
UOIT Keyboard: A Constructive Keyboard for Small Touchscreen Devices.
IEEE Trans. Hum. Mach. Syst., 2015

2014
Two-factor face authentication using matrix permutation transformation and a user password.
Inf. Sci., 2014

2011
A Software-Based Group Attestation for Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2011

2009
Grid-Based Key Pre-Distribution in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2009

Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks.
Int. J. Netw. Secur., 2009

2008
Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

2007
Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

Fuzzy Face Vault: How to Implement Fuzzy Vault with Weighted Features.
Proceedings of the Universal Access in Human Computer Interaction. Coping with Diversity, 2007

2006
Distributed Certificate Authority Under the GRID-Location Aided Routing Protocol.
Proceedings of the Computational Science and Its Applications, 2006

Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
Two Factor Face Authentication Scheme with Cancelable Feature.
Proceedings of the Advances in Biometric Person Authentication, 2005


  Loading...