default search action
Sun-Young Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c16]Insu Oh, Junyoung Park, Sun-Young Lee, Juhyun Jang, Kangbin Yim:
Securing FSK-Based Paging System Using Format Preserving Encryption (FPE). BWCCA 2024: 104-113 - 2023
- [j18]Kyungroul Lee, Jaehyuk Lee, Sun-Young Lee, Kangbin Yim:
Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services. Sensors 23(6): 3023 (2023) - [j17]Jaehyuk Lee, Sun-Young Lee, Kangbin Yim, Kyungroul Lee:
Neutralization Method of Ransomware Detection Technology Using Format Preserving Encryption. Sensors 23(10): 4728 (2023) - [c15]Si-On Kim, Da-Wit Jeong, Sun-Young Lee:
Method of Facial De-identification Using Machine Learning in Real-Time Video. IMIS 2023: 201-208 - 2020
- [j16]Kyungroul Lee, Kangbin Yim, Sun-Young Lee:
Vulnerability analysis on the image-based authentication: Through the WM_INPUT message. Concurr. Comput. Pract. Exp. 32(18) (2020) - [j15]Kyungroul Lee, Sun-Young Lee:
Improved Practical Vulnerability Analysis of Mouse Data According to Offensive Security based on Machine Learning in Image-Based User Authentication. Entropy 22(3): 355 (2020) - [j14]Wonyoung Jang, Sun-Young Lee:
Partial image encryption using format-preserving encryption in image processing systems for Internet of things environment. Int. J. Distributed Sens. Networks 16(3) (2020) - [j13]Kyungroul Lee, Sun-Young Lee, Kangbin Yim:
Classification and Analysis of Security Techniques for the User Terminal Area in the Internet Banking Service. Secur. Commun. Networks 2020: 7672941:1-7672941:16 (2020) - [c14]Dohyeon Bak, Mintae Kim, Jonghoon Lim, Raeseung Jang, Wonyoung Jang, Sun-Young Lee:
Logical Network Separation and Update Inducing Techniques of Non-updated Vaccine Host by Creating Flow Rule in SDN. IMIS 2020: 436-446 - [c13]Wonyoung Jang, Sun-Young Lee:
A format-preserving encryption FF1, FF3-1 using lightweight block ciphers LEA and, SPECK. SAC 2020: 369-375
2010 – 2019
- 2019
- [j12]Kyungroul Lee, Sun-Young Lee, Kangbin Yim:
Machine Learning Based File Entropy Analysis for Ransomware Detection in Backup Systems. IEEE Access 7: 110205-110215 (2019) - [j11]Kyungroul Lee, Christian Esposito, Sun-Young Lee:
Vulnerability Analysis Challenges of the Mouse Data Based on Machine Learning for Image-Based User Authentication. IEEE Access 7: 177241-177253 (2019) - [j10]Insu Oh, Taeeun Kim, Kangbin Yim, Sun-Young Lee:
A Novel Message-Preserving Scheme with Format-Preserving Encryption for Connected Cars in Multi-Access Edge Computing. Sensors 19(18): 3869 (2019) - [c12]Jeongwha Cho, Sun-Young Lee, Mijung Sung, Ki-Chun Nam, Hyeon-Ae Jeon, Youngjoo Kim:
L2 learners' phonemic sensitivity: MMN & L2 proficiency. CogSci 2019: 3432 - [c11]Sun-Young Lee, Jinhee Jeong, Eun Kyoung Lee, Ha-A.-Yan Jang, Sook Whan Cho:
Brain responses to verbal mismatches and case marking mismatches: adolescents vs. adults. CogSci 2019: 3508 - [c10]Changhyun Lee, Yeonju Choi, Hyeongmin Park, Kangbin Yim, Sun-Young Lee:
Novel Encryption Method of GPS Information in Image File Using Format-Preserving Encryption. IMIS 2019: 815-823 - [c9]Hyeongmin Park, Taeeun Kim, Gaeul Kim, Wonyoung Jang, Kyungroul Lee, Sun-Young Lee:
Improvement of QR Code Access Control System Based on Lamport Hash Chain. IMIS 2019: 824-833 - [c8]Kyungroul Lee, Sun-Young Lee, Kangbin Yim:
Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services. I-SPAN 2019: 133-139 - 2018
- [j9]Kyungroul Lee, Sun-Young Lee, Changho Seo, Kangbin Yim:
TRNG (True Random Number Generator) Method Using Visible Spectrum for Secure Communication on 5G Network. IEEE Access 6: 12838-12847 (2018) - [c7]Insu Oh, Kyungroul Lee, Sun-Young Lee, Kyunghwa Do, Hyobeom Ahn, Kangbin Yim:
Vulnerability Analysis on the Image-Based Authentication Through the PS/2 Interface. IMIS 2018: 212-219 - [c6]Kyungroul Lee, Sun-Young Lee, Kyunghwa Do, Kangbin Yim:
Detecting and Extracting Hidden Information from Stego-Images Based on JPG File on StegoMagic. IMIS 2018: 546-553 - [c5]Kyungroul Lee, Byeonggeun Son, Sun-Young Lee, Kangbin Yim:
Vulnerability analysis of secure USB: based on the fingerprint authentication of product B. RACS 2018: 167-169 - 2017
- [j8]Vishal Sharma, Kyungroul Lee, Soonhyun Kwon, Jiyoon Kim, Hyungjoon Park, Kangbin Yim, Sun-Young Lee:
A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT. Secur. Commun. Networks 2017: 4749085:1-4749085:24 (2017) - 2016
- [j7]Hongyang Yan, Jin Li, Xuan Li, Gansen Zhao, Sun-Young Lee, Jian Shen:
Secure Access Control of E-Health System with Attribute-Based Encryption. Intell. Autom. Soft Comput. 22(3): 345-352 (2016) - 2014
- [j6]Jong-Chul Yoon, Sun-Young Lee, In-Kwon Lee, Henry Kang:
Optimized image resizing using flow-guided seam carving and an interactive genetic algorithm. Multim. Tools Appl. 71(3): 1013-1031 (2014) - 2013
- [j5]Seung-Yong Ok, Sun-Young Lee, Wonsuk Park:
Robust multi-objective maintenance planning of deteriorating bridges against uncertainty in performance model. Adv. Eng. Softw. 65: 32-42 (2013) - 2012
- [j4]Sun-Young Lee, Jong-Chul Yoon, Ji-yong Kwon, In-Kwon Lee:
CartoonModes: Cartoon stylization of video objects through modal analysis. Graph. Model. 74(2): 51-60 (2012) - 2011
- [c4]Sun-Young Lee, Yong-Ho Lee, Jin-Wook Beak, Young-Suk Kim, Hye-Rin Kim, In-Kwon Lee:
Video word balloon authoring system. SIGGRAPH Asia Posters 2011: 41:1-41:2 - 2010
- [j3]Sun-Young Lee:
Network Connection and Perfectly Secure Message Transmission on Wireless Mobile Networks. Adv. Inf. Sci. Serv. Sci. 2(2): 77-83 (2010) - [j2]Sun-Young Lee, Jong-Chul Yoon, In-Kwon Lee:
Temporally coherent video matting. Graph. Model. 72(3): 25-33 (2010) - [j1]Sung Hwan Won, Iickho Song, Sun-Young Lee, Cheol Hoon Park:
Identification of finite state automata with a class of recurrent neural networks. IEEE Trans. Neural Networks 21(9): 1408-1421 (2010) - [c3]Sun-Young Lee, Jong-Chul Yoon, In-Kwon Lee:
Temporally coherent video matting. SIGGRAPH Posters 2010: 77:1
2000 – 2009
- 2009
- [c2]Sun-Young Lee, In-Kwon Lee:
Improved coordinate-based image and video cloning algorithm. SIGGRAPH ASIA Posters 2009: 48:1 - 2007
- [c1]Yeejin Lee, Jong-Seok Lee, Sun-Young Lee, Cheol Hoon Park:
Improving generalization capability of neural networks based on simulated annealing. IEEE Congress on Evolutionary Computation 2007: 3447-3453
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint