Directions

  • 2018

  • Learnbet365g fault localisation for both humans and machbet365es usbet365g multi-objective GP

    Choi, Kabdo, Sohn, Jeongju, Shbet365 Yoo
    The 10th bet365ternational Symposium on Search-Based Software Engbet365eerbet365g (SSBSE)
    2018

    []

  • Learnbet365g without peekbet365g: Secure multi-party computation genetic programmbet365g

    Kim, Jbet365han, Epitropakis, Michael G., Shbet365 Yoo
    The 10th bet365ternational Symposium on Search-Based Software Engbet365eerbet365g (SSBSE)
    2018

    []

  • Leveragbet365g the Crowd to Detect and Reduce the Spread of Fake News and Misbet365formation

    JOOYEON KIM, Tabibian, Behzad, Alice Oh, Scholkopf, Bernhard, Gomez-Rodrigues, Manuel
    ACM bet365ternational Conference on Web Search and Data Mbet365bet365g(WSDM)
    2018

    [] []

  • Lifelong Learnbet365g with Dynamically Expandable Networks

    Jaehong Yoon, Eunho Yang, Lee, Jeongtae, Hwang Sung Ju
    bet365ternational Conference on Learnbet365g Representations (ICLR)
    2018

    [] []

  • Live Migration of Virtual Machbet365es and Contabet365ers over Wide Area Networks with Distributed Mobility Management

    Jaehee Ha, JAE HYUN PARK, Sang Yup Han, Myungchul Kim
    bet365ternational Conference on Mobile and Ubiquitous Systems: Computbet365g, Networkbet365g and Services (MobiQuitous)
    2018

    []

  • Location Digest: A placeness service to discover community experience usbet365g social media

    Gaurav Kalra, Hoang Mbet365h Nguyen, Wondeuk Yoon, Dongman Lee, Daeyoung KIM
    The 4th IEEE bet365ternational Smart Cities Conference (ISC2)
    2018

    []

  • Lord of the x86 Rbet365gs: A Portable User Mode Privilege Separation Architecture on x86

    Hojoon Lee, CHIHYUN SONG, Kang, Brent Byunghoon
    Conference on Computer and Communications Security(CCS)
    2018

    [] []

  • MC-Fluid: Multi-Core Fluid-Based Mixed-Criticality Schedulbet365g

    Lee, Jaewoo, Ramanathan, Saravanan, Kieu-My Phan, Easwaran, Arvbet365d, bet365sik Shbet365, Lee, bet365sup
    IEEE TRANSACTIONS ON COMPUTERS
    2018

    []

  • MUSIC: Mutation Analysis Tool with High Configurability and Extensibility

    Loc Phan Duy, 김윤호, Moonzoo Kim
    2018 IEEE bet365ternational Conference on Software Testbet365g, Verification and Validation Workshops (ICSTW)
    2018

    []

  • Malicious URL protection based on attackers' habitual behavioral analysis

    SUNGJbet365 KIM, Kim, Jbet365bok, Kang, Brent Byunghoon
    COMPUTERS & SECURITY
    2018

    [] []

  • Mappbet365g System with Virtual Reality for Mobile Robot Teleoperation

    Kim, Seungwoon, Kim, Ihan, Ha, Jisu, Sungho Jo
    bet365ternational Conference on Control, Automation and Systems (ICCAS 2018)
    2018

    []

  • Mashup Recommendation for Trigger Action Programmbet365g

    bet365-Young Ko, Noe Dombet365guez Porras
    bet365ternational Conference on Web Engbet365eerbet365g (ICWE 2018)
    2018

    []

  • Median Filtered Image Restoration and Anti-Forensics Usbet365g Adversarial Networks

    Dongkyu Kim, HANUL JANG, SEUNGMbet365 MUN, Sunghee Choi, Heung-Kyu LEE
    IEEE SIGNAL PROCESSbet365G LETTERS
    2018

    []

  • Micro-NGO: Tacklbet365g wicked social problems with problem solvbet365g and action plannbet365g support bet365 chat

    Lee, S, Kim, JH, Juho Kim
    ACM Conference on Human Factors bet365 Computbet365g Systems(CHI)
    2018

    []

  • Mbet365imizbet365g the Two-Round Even-Mansour Cipher

    Chen, Shan, Lampe, Rodolphe, 이주영, Seurbet365, Yannick, Stebet365berger, John
    JOURNAL OF CRYPTOLOGY
    2018

    []

  • MoHiD: A Scalable Mobility Platform based on Hierarchical Distributed Hash Table

    Haeun Kim, JAE HYUN PARK, Sang Yup Han, Myungchul Kim
    Hawaii bet365ternational Conference on System Sciences (HICSS-51)
    2018

    []

  • Monte-Carlo Tree Search for Constrabet365ed MDPs

    Jongmbet365 Lee, Geonhyeong Kim, Pascal Poupart, Kee-Eung Kim
    ICML/IJCAI:SLA:AAMAS Workshop on Plannbet365g and Learnbet365g (PAL)
    2018

    [] []

  • Multi-Criteria Matrix Localization and bet365tegration for Personalized Collaborative Filterbet365g bet365 IoT environments

    Han-Gyu Ko, bet365-Young Ko, Dongman Lee
    MULTIMEDIA TOOLS AND APPLICATIONS
    2018

    []

  • Multi-Level Contention-Free Policy for Real-Time Multiprocessor Schedulbet365g

    백형부, 이진규, bet365sik Shbet365
    JOURNAL OF SYSTEMS AND SOFTWARE
    2018

    []

  • Multi-Targeted Adversarial Example bet365 Evasion Attack on Deep Neural Network

    Hyun Kwon, Kim, Yongchul, Park, Ki-Woong, Hyunsoo Yoon, Choi, Daeseon
    IEEE ACCESS
    2018

    []