Sehun Kim

According to our database1, Sehun Kim authored at least 63 papers between 1984 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Sequence-to-Sequence Network Training Methods for Automatic Guitar Transcription With Tokenized Outputs.
Proceedings of the 24th International Society for Music Information Retrieval Conference, 2023

2022
Robust interaction control for environments having uncertainties.
Robotics Auton. Syst., 2022

Note-level Automatic Guitar Transcription Using Attention Mechanism.
Proceedings of the 30th European Signal Processing Conference, 2022

2019
Inverse Kinematics with a Geometrical Approximation for Multi-Segment Flexible Curvilinear Robots.
Robotics, 2019

2018
A New Update Strategy for Blocks with Low Correlation in 3-D Recursive Search.
Proceedings of the IEEE Visual Communications and Image Processing, 2018

2016
A novel fairness-aware parallel download scheme.
Peer-to-Peer Netw. Appl., 2016

Preliminary design and study of a bio-inspired wire-driven serpentine robotic manipulator with direct drive capability.
Proceedings of the IEEE International Conference on Information and Automation, 2016

2015
Preliminary results of force/torque sensorless impedance control for Walkbot.
Proceedings of the 12th International Conference on Ubiquitous Robots and Ambient Intelligence, 2015

Force/torque sensorless impedance control for indirect driven robot-aided gait rehabilitation system.
Proceedings of the IEEE International Conference on Advanced Intelligent Mechatronics, 2015

2014
A novel hybrid intrusion detection method integrating anomaly detection with misuse detection.
Expert Syst. Appl., 2014

2013
A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods.
Int. J. Distributed Sens. Networks, 2013

Advanced probabilistic approach for network intrusion forecasting and detection.
Expert Syst. Appl., 2013

A Novel Anomaly Detection System Based on HFR-MLR Method.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

2012
A Congestion-Aware IDS Node Selection Method for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

An Efficient Filtering Method for Detecting Malicous Web Pages.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

2011
Self-adaptive and dynamic clustering for online anomaly detection.
Expert Syst. Appl., 2011

2010
Fairness-Aware Resource Allocation in a Cooperative OFDMA Uplink System.
IEEE Trans. Veh. Technol., 2010

Feature Construction Scheme for Efficient Intrusion Detection System.
J. Inf. Sci. Eng., 2010

A distributed sinkhole detection method using cluster analysis.
Expert Syst. Appl., 2010

2009
Hierarchical system for objectionable video detection.
IEEE Trans. Consumer Electron., 2009

Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases.
IEICE Trans. Inf. Syst., 2009

An Adjustable Scheduling Algorithm for Multi-User MIMO Systems.
IEICE Trans. Commun., 2009

The Capacity of Downlink Multiuser OFDM with Quality Based CSI Feedback.
IEICE Trans. Commun., 2009

A Goal Programming Approach for Resource Allocation Considering Client Demands in a Multiuser OFDMA Downlink System.
IEICE Trans. Commun., 2009

Monitoring Node Selection Algorithm for Intrusion Detection in Congested Sensor Network.
Proceedings of the SECRYPT 2009, 2009

2008
Hybrid Intrusion Forecasting Framework for Early Warning System.
IEICE Trans. Inf. Syst., 2008

DDoS attack detection method using cluster analysis.
Expert Syst. Appl., 2008

2007
On-Demand Utility-Based Power Control Routing for Energy-Aware Optimization in Mobile Ad Hoc Networks.
Wirel. Pers. Commun., 2007

Efficient Subcarrier and Power Allocation Algorithm in OFDMA Uplink System.
IEICE Trans. Commun., 2007

Curriculum Design and Evaluation for E-Commerce Security Education Using AHP.
IEICE Trans. Inf. Syst., 2007

2006
Maximization of Carried Traffic by Prioritizing New Call Attempts in a CDMA Base Station with Finite Receiver Processors.
IEICE Trans. Commun., 2006

An Effective DDoS Attack Detection and Packet-Filtering Scheme.
IEICE Trans. Commun., 2006

On the Multihop Packet Scheduling in Uplink DS-CDMA Systems.
IEICE Trans. Commun., 2006

Cost-Effective IDS Operating Scheme in MANETs.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Anomaly Detection in Network Security Based on Nonparametric Techniques.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Air-Jet Button Effects in AR.
Proceedings of the Advances in Artificial Reality and Tele-Existence, 2006

2005
Transmission rate scheduling with fairness constraints in downlink of CDMA data networks.
IEEE Trans. Veh. Technol., 2005

A Curriculum Design for E-Commerce Security.
J. Inf. Syst. Educ., 2005

Data traffic scheduling algorithm for multiuser OFDM system with adaptive modulation considering fairness among users.
Comput. Oper. Res., 2005

Decision on Replacing Components of Security Functions in COTS-Based Information Systems.
Proceedings of the COTS-Based Software Systems, 4th International Conference, 2005

2004
On-demand SIR and bandwidth-guaranteed routing with transmit power assignment in ad hoc mobile networks.
IEEE Trans. Veh. Technol., 2004

An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

2003
A fast rerouting scheme using reservation in wireless ATM.
IEEE Trans. Veh. Technol., 2003

Optimal bandwidth allocation for bandwidth adaptation in wireless multimedia networks.
Comput. Oper. Res., 2003

2002
Educational Requirements Analysis for Information Security Professionals in Korea.
J. Inf. Syst. Educ., 2002

An efficient broadcast scheduling algorithm for TDMA ad-hoc networks.
Comput. Oper. Res., 2002

Optimization for adaptive bandwidth reservation in wireless multimedia networks.
Comput. Networks, 2002

Modeling variable user mobility with stochastic correlation concept.
Comput. Networks, 2002

2001
Optimal locations of switches and interconnections for ATM LANs.
Comput. Oper. Res., 2001

Design of optimum parameters for handover initiation in WCDMA.
Proceedings of the 54th IEEE Vehicular Technology Conference, 2001

2000
A channel allocation for cellular mobile radio systems using simulated annealing.
Telecommun. Syst., 2000

Melting behaviors of icosahedral metal clusters studied by Monte Carlo simulations.
J. Comput. Chem., 2000

An adaptive time slot assignment algorithm for variable bandwidth switching systems.
Comput. Oper. Res., 2000

1998
Optimal scheduling in cdma packet radio networks.
Comput. Oper. Res., 1998

1997
Time slot assignment in a heterogeneous environment of a SS/TDMA system.
Int. J. Satell. Commun. Netw., 1997

Channel allocation in cellular radio networks.
Comput. Oper. Res., 1997

1996
Call blocking performance of new dynamic channel assignment scheme in microcellular radio networks.
Proceedings of the 7th IEEE International Symposium on Personal, 1996

1995
A descent method with linear programming subproblems for nondifferentiable convex optimization.
Math. Program., 1995

1993
An improved subgradient method for constrained nondifferentiable optimization.
Oper. Res. Lett., 1993

1991
Variable target value subgradient method.
Math. Program., 1991

Convergence of a generalized subgradient method for nondifferentiable convex optimization.
Math. Program., 1991

1986
Computation of a large-scale competitive equilibrium through optimization.
Comput. Oper. Res., 1986

1984
Economic planning with institutional price constraints for a decentralized economy.
Math. Program., 1984


  Loading...