default search action
Hae Yong Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Guilherme Apolinario Silva Novaes, Hae Yong Kim:
Super-Resolution of Color Halftone Images Using Convolutional Neural Networks. IEEE Access 12: 9082-9096 (2024) - [j14]Vinícius Yu Okubo, Kotaro Shimizu, B. S. Shivaram, Hae Yong Kim:
Characterization of Magnetic Labyrinthine Structures Through Junctions and Terminals Detection Using Template Matching and CNN. IEEE Access 12: 92419-92430 (2024) - [i4]Vinícius Yu Okubo, Kotaro Shimizu, B. S. Shivaram, Hae Yong Kim:
Characterization of Magnetic Labyrinthine Structures through Junctions and Terminals Detection using Template Matching and CNN. CoRR abs/2401.16688 (2024) - 2022
- [j13]Daniel G. P. Petrini, Carlos Shimizu, Rosimeire A. Roela, Gabriel Vansuita Valente, Maria Aparecida Azevedo Koike Folgueira, Hae Yong Kim:
Breast Cancer Diagnosis in Two-View Mammography Using End-to-End Trained EfficientNet-Based Convolutional Network. IEEE Access 10: 77723-77731 (2022) - [j12]Jhonata E. Ramos, Hae Yong Kim, Felipe Brunetto Tancredi:
Using Convolutional Neural Network to Automate ACR MRI Low-Contrast Detectability Test. IEEE Access 10: 112529-112538 (2022) - [c27]Guilherme Apolinario Silva Novaes, Hae Yong Kim:
Spatial Resolution Enhancement for Halftone Images Using Convolutional Neural Networks. CSCI 2022: 1375-1380 - 2021
- [i3]Daniel G. P. Petrini, Carlos Shimizu, Rosimeire A. Roela, Gabriel Vansuita Valente, Maria Aparecida Azevedo Koike Folgueira, Hae Yong Kim:
Breast Cancer Diagnosis in Two-View Mammography Using End-to-End Trained EfficientNet-Based Convolutional Network. CoRR abs/2110.01606 (2021)
2010 – 2019
- 2019
- [j11]Gerson de Souza Faria, Hae Yong Kim:
Differential audio analysis: a new side-channel attack on PIN pads. Int. J. Inf. Sec. 18(1): 73-84 (2019) - 2018
- [c26]Jhonata E. Ramos, Hae Yong Kim, Felipe Brunetto Tancredi:
Automation of the ACR MRI Low-Contrast Resolution Test Using Machine Learning. CISP-BMEI 2018: 1-6 - 2016
- [j10]Gerson de Souza Faria, Hae Yong Kim:
Identification of pressed keys by time difference of arrivals of mechanical vibrations. Comput. Secur. 57: 93-105 (2016) - 2015
- [j9]Sidnei Alves de Araújo, Jorge Henrique Pessota, Hae Yong Kim:
Beans quality inspection using correlation-based granulometry. Eng. Appl. Artif. Intell. 40: 84-94 (2015) - [c25]Gerson de Souza Faria, Hae Yong Kim:
Identification of Pressed Keys by Acoustic Transfer Function. SMC 2015: 240-245 - 2013
- [j8]Gerson de Souza Faria, Hae Yong Kim:
Identification of Pressed Keys From Mechanical Vibrations. IEEE Trans. Inf. Forensics Secur. 8(7): 1221-1229 (2013) - 2011
- [j7]Sidnei Alves de Araújo, Hae Yong Kim:
Ciratefi: An RST-invariant template matching with extension to color images. Integr. Comput. Aided Eng. 18(1): 75-90 (2011) - 2010
- [j6]Hae Yong Kim:
Rotation-discriminating template matching based on Fourier coefficients of radial projections with robustness to scaling and partial occlusion. Pattern Recognit. 43(3): 859-872 (2010)
2000 – 2009
- 2007
- [c24]Sidnei Alves de Araújo, Hae Yong Kim:
Rotation, scale and translation-invariant segmentation-free grayscale shape recognition using mathematical morphology. ISMM (2) 2007: 61-62 - [c23]Diego Massola Shimizu, Hae Yong Kim:
Perceptual hashing for hardcopy document authentication using morphological segmentation. ISMM (2) 2007: 77-78 - [c22]Hae Yong Kim, Sidnei Alves de Araújo:
Grayscale Template-Matching Invariant to Rotation, Scale, Translation, Brightness and Contrast. PSIVT 2007: 100-113 - [c21]Hae Yong Kim, Joceli Mayer:
Data Hiding for Binary Documents Robust to Print-Scan, Photocopy and Geometric Distortions. SIBGRAPI 2007: 105-112 - 2005
- [j5]Hae Yong Kim, Javier Giacomantone, Zang Hee Cho:
Robust anisotropic diffusion to produce enhanced statistical parametric map from noisy fMRI. Comput. Vis. Image Underst. 99(3): 435-452 (2005) - [c20]Hae Yong Kim, Javier Giacomantone:
A new technique to obtain clear statistical parametric map by applying anisotropic diffusion to fMRI. ICIP (3) 2005: 724-727 - [c19]Hae Yong Kim:
A new public-key authentication watermarking for binary document images resistant to parity attacks. ICIP (2) 2005: 1074-1077 - [c18]Sergio Vicente Denser Pamboukian, Hae Yong Kim, Ricardo L. de Queiroz:
Watermarking JBIG2 text region for image authentication. ICIP (2) 2005: 1078-1081 - [c17]Sergio Vicente Denser Pamboukian, Hae Yong Kim:
New Public-Key Authentication Watermarking for JBIG2 Resistant to Parity Attacks. IWDW 2005: 286-298 - [c16]Harold Ivan Angulo Bustos, Hae Yong Kim:
Reconstruction-Diffusion: An Improved Maximum Entropy Reconstruction Algorithm Based on the Robust Anisotropic Diffusion. SIBGRAPI 2005: 215-219 - 2004
- [j4]Hae Yong Kim, Amir Afif:
A secure authentication watermarking for halftone and binary images. Int. J. Imaging Syst. Technol. 14(4): 147-152 (2004) - [j3]Hae Yong Kim:
Binary halftone image resolution increasing by decision tree learning. IEEE Trans. Image Process. 13(8): 1136-1146 (2004) - [c15]Carlos Ramon Pantaleon Dionisio, Hae Yong Kim:
New features for affine-invariant shape classification. ICIP 2004: 2135-2138 - [c14]Hae Yong Kim, Ricardo L. de Queiroz:
A public-key authentication watermarking for binary images. ICIP 2004: 3459-3462 - [c13]Hae Yong Kim, Ricardo L. de Queiroz:
Alteration-Locating Authentication Watermarking for Binary Images. IWDW 2004: 125-136 - 2003
- [j2]Hae Yong Kim:
Marcas d'Água Frágeis de Autenticação para Imagens em Tonalidade Contínua e Esteganografia para Imagens Binárias e Meio-Tom. RITA 10(1): 97-125 (2003) - [c12]Hae Yong Kim, Ricardo L. de Queiroz:
Inverse halftoning by decision tree learning. ICIP (2) 2003: 913-916 - [c11]Hae Yong Kim, Amir Afif:
Secure Authentication Watermarking for Binary Images. SIBGRAPI 2003: 199-206 - 2002
- [c10]Paulo S. L. M. Barreto, Hae Yong Kim, Ben Lynn, Michael Scott:
Efficient Algorithms for Pairing-Based Cryptosystems. CRYPTO 2002: 354-368 - [c9]Harold Ivan Angulo Bustos, Hae Yong Kim, Ricardo T. Lopes:
Image reconstruction using divergent beams distributed over limited angle. ICIP (2) 2002: 445-448 - [c8]Hae Yong Kim, Zang Hee Cho:
Robust Anisotropic Diffusion to Produce Clear Statistical Parametric Map from Noisy fMRI. SIBGRAPI 2002: 11-17 - [i2]Paulo S. L. M. Barreto, Hae Yong Kim, Ben Lynn, Michael Scott:
Efficient Algorithms for Pairing-Based Cryptosystems. IACR Cryptol. ePrint Arch. 2002: 8 (2002) - 2001
- [c7]Paulo S. L. M. Barreto, Vincent Rijmen, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle, Hae Yong Kim:
Improved SQUARE Attacks against Reduced-Round HIEROCRYPT. FSE 2001: 165-173 - [c6]Paulo S. L. M. Barreto, Hae Yong Kim, Vincent Rijmen:
Toward a secure public-key blockwise fragile authentication watermarking. ICIP (2) 2001: 494-497 - [c5]Hae Yong Kim:
Fast and accurate binary halftone image resolution increasing by decision-tree learning. ICIP (2) 2001: 1093-1096 - [i1]Paulo S. L. M. Barreto, Hae Yong Kim:
Fast hashing onto elliptic curves over fields of characteristic 3. IACR Cryptol. ePrint Arch. 2001: 98 (2001) - 2000
- [j1]Hae Yong Kim:
Binary operator design by k-nearest neighbor learning with application to image resolution increasing. Int. J. Imaging Syst. Technol. 11(5): 331-339 (2000) - [c4]Hae Yong Kim, Paulo S. L. M. Barreto:
Fast Binary Image Resolution Increasing by K-Nearest Neighbor Learning. ICIP 2000: 327-330
1990 – 1999
- 1999
- [c3]Hae Yong Kim:
Segmentation-Free Printed Character Recognition by Relaxed Nearest Neighbor Learning of Windowed Operator. SIBGRAPI 1999: 195- - [c2]Paulo S. L. M. Barreto, Hae Yong Kim:
Pitfalls in Public Key Watermarking. SIBGRAPI 1999: 241- - 1998
- [c1]Hae Yong Kim, Flávio A. M. Cipparrone:
Automatic Design of Nonlinear Filters by Nearest Neighbor Learning. ICIP (2) 1998: 737-741
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint