Sungju Lee

According to our database1, Sungju Lee authored at least 33 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Practical Monitoring of Undergrown Pigs for IoT-Based Large-Scale Smart Farm.
IEEE Access, 2019

Resource-Efficient Pet Dog Sound Events Classification Using LSTM-FCN Based on Time-Series Data.
Sensors, 2018

A Kinect-Based Segmentation of Touching-Pigs for Real-Time Monitoring.
Sensors, 2018

CPU-GPU heterogeneous implementations of depth-based foreground detection.
IEICE Electron. Express, 2018

Shapelets-Based Intrusion Detection for Protection Traffic Flooding Attacks.
Proceedings of the Database Systems for Advanced Applications, 2018

Forecasting Purpose Data Analysis and Methodology Comparison of Neural Model Perspective.
Symmetry, 2017

Energy-Efficient Biometrics-Based Remote User Authentication for Mobile Multimedia IoT Application.
KSII Trans. Internet Inf. Syst., 2017

Real-time processing for intelligent-surveillance applications.
IEICE Electron. Express, 2017

Cloud-Based Parameter-Driven Statistical Services and Resource Allocation in a Heterogeneous Platform on Enterprise Environment.
Symmetry, 2016

Fast Video Encryption Using the H.264 Error Propagation Property for Smart Mobile Devices.
Sensors, 2015

CPU-GPU hybrid computing for feature extraction from video stream.
IEICE Electron. Express, 2014

Parallelizing H.264 and AES Collectively.
KSII Trans. Internet Inf. Syst., 2013

Energy Harvesting Technique by Using Novel Voltage Multiplier Circuits and Passive Devices.
IEICE Trans. Electron., 2013

Power-Time Tradeoff of Parallel Execution on Multi-core Platforms.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

Quality-Workload Tradeoff in Pig Activity Monitoring Application.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

Energy Efficient Image/Video Data Transmission on Commercial Multi-Core Processors.
Sensors, 2012

Overcoming Amdahl's Law by Distributing Workload Asymmetrically.
Proceedings of the Convergence and Hybrid Information Technology, 2012

A Practical Implementation of Fuzzy Fingerprint Vault.
KSII Trans. Internet Inf. Syst., 2011

Slice-level selective encryption for protecting video data.
Proceedings of the 2011 International Conference on Information Networking, 2011

A Novel Sensing Method and Sensing Algorithm Development for a Ubiquitous Network.
Sensors, 2010

Ensuring Confidentiality and Integrity of Multimedia Data on Multi-core Platforms.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2010

Inserting Chaff Minutiae for the Geometric Hashing-based Fuzzy Fingerprint Vault.
J. Inf. Sci. Eng., 2009

Configurable fuzzy fingerprint vault for Match-on-Card system.
IEICE Electron. Express, 2009

Secure fuzzy fingerprint vault against correlation attack.
IEICE Electron. Express, 2009

A fingerprint-based user authentication protocol considering both the mobility and security in the telematics environment.
Comput. Stand. Interfaces, 2009

A fast algorithm for polynomial reconstruction of fuzzy fingerprint vault.
IEICE Electron. Express, 2008

Self-organized Cluster Based Multi-hop Routing for Wireless Sensor Networks.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

Feature Distribution of the Fingerprint Template Generated by the Geometric Hashing-Based Fuzzy Vault.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Energy-Efficient Transmissions of Fingerprint Images Using Both Encryption and Fingerprinting Techniques.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2007

Fingerprint Template Protection Using Fuzzy Vault.
Proceedings of the Computational Science and Its Applications, 2007

Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table.
Proceedings of the Adaptive and Natural Computing Algorithms, 8th International Conference, 2007

Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005