Department of Computer Science and Engineering

Search results

  • Paper

    Generating Information-Seeking Conversations from Unlabeled Documents

    Kim, G., Kim, S., Yoo, K. M. & Kang, J., 2022, p. 2362-2378. 17 p.

    Research output: Contribution to conferencePaperpeer-review

  • Simple Questions Generate Named Entity Recognition Datasets

    Kim, H., Yoo, J., Yoon, S., Lee, J. & Kang, J., 2022, p. 6220-6236. 17 p.

    Research output: Contribution to conferencePaperpeer-review

  • Editorial

    Introduction to the Issue on Signal and Information Processing for Privacy

    Trappe, W., Sankar, L., Poovendran, R., Lee, H. & Capkun, S., 2015 Oct 1, In: IEEE Journal on Selected Topics in Signal Processing. 9, 7, p. 1173-1175 3 p., 7265126.

    Research output: Contribution to journalEditorialpeer-review

  • Message from the General Chairs

    Chong, S., Joo, C. & Lee, K., 2022 Oct 3, In: Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). p. V

    Research output: Contribution to journalEditorialpeer-review

  • Conference contribution

    Activity-based access control model to hospital information

    Hung, L. X., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007. p. 488-493 6 p. 4296888. (Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Activity-based security scheme for ubiquitous environments

    Hung, L. X., Hassan, J., Riaz, A. S., Raazi, S. M. K., Weiwei, Y., Canh, N. T., Truc, P. T. H., Lee, S., Lee, H., Son, Y., Fernandes, M., Kim, M. & Zhung, Y., 2008, 2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008. p. 475-481 7 p. 4745102. (Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Activity-oriented access control for ubiquitous environments

    Hung, L. X., Shaikh, R. A., Jameel, H., Raazi, S. M. K. R., Weiwei, Y., Canh, N. T., Truc, P. T. H., Lee, S., Lee, H., Son, Y. & Fernandes, M., 2009, 2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009. 4784990. (2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A deep neural spoiler detection model using a genre-aware attention mechanism

    Chang, B., Kim, H., Kim, R., Kim, D. & Kang, J., 2018, Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Proceedings. Phung, D., Webb, G. I., Ho, B., Tseng, V. S., Ganji, M. & Rashidi, L. (eds.). Springer Verlag, p. 183-195 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10937 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • A denoised embedding space of genetic perturbation using Deep Metric Learning

    Ju, M., Lee, S. & Kang, J., 2022, Proceedings - 2022 IEEE International Conference on Big Data and Smart Computing, BigComp 2022. Unger, H., Kim, Y-K., Hwang, E., Cho, S-B., Pareigis, S., Kyandoghere, K., Ha, Y-G., Kim, J., Morishima, A., Wagner, C., Kwon, H-Y., Moon, Y-S. & Leung, C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 378-381 4 p. (Proceedings - 2022 IEEE International Conference on Big Data and Smart Computing, BigComp 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Adversarial subword regularization for robust neural machine translation

    Park, J., Sung, M., Lee, J. & Kang, J., 2020, Findings of the Association for Computational Linguistics Findings of ACL: EMNLP 2020. Association for Computational Linguistics (ACL), p. 1945-1953 9 p. (Findings of the Association for Computational Linguistics Findings of ACL: EMNLP 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A flexible trust-based access control mechanism for security and privacy enhancement in ubiquitous systems

    Giang, P. D., Hung, L. X., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 698-703 6 p. 4197354. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • A location-aware key predistribution scheme for distributed wireless sensor networks

    Canh, N. T., Van Phuong, T., Lee, Y. K., Lee, S. & Lee, H., 2007, ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks. p. 188-193 6 p. 4444084. (ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • An Embedding-Dynamic Approach to Self-Supervised Learning

    Moon, S., Buracas, D., Park, S., Kim, J. & Canny, J., 2023, Proceedings - 2023 IEEE Winter Conference on Applications of Computer Vision, WACV 2023. Institute of Electrical and Electronics Engineers Inc., p. 2749-2757 9 p. (Proceedings - 2023 IEEE Winter Conference on Applications of Computer Vision, WACV 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A privacy preserving access control scheme using anonymous identification for ubiquitous environments

    Diep, N. N., Lee, S., Lee, Y. K. & Lee, H. J., 2007, Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007. p. 482-487 6 p. 4296887. (Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • A simple congestion-resilient link adaptation algorithm for IEEE 802.11 WLANs

    Kim, H., Yun, S., Lee, H., Kang, I. & Choi, K. Y., 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151441. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • A trust-based approach to control privacy exposure in Ubiquitous Computing environments

    Giang, P. D., Hung, L. X., Shaikh, R. A., Zhung, Y., Lee, S., Lee, Y. K. & Lee, H., 2007, 2007 IEEE International Conference on Pervasive Services, ICPS. p. 149-152 4 p. 4283905. (2007 IEEE International Conference on Pervasive Services, ICPS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • BARI: A distributed key management approach for wireless body area networks

    Raazi, S. M. K. U. R., Lee, S., Lee, Y. K. & Lee, H., 2009, CIS 2009 - 2009 International Conference on Computational Intelligence and Security. p. 324-329 6 p. 5376103. (CIS 2009 - 2009 International Conference on Computational Intelligence and Security; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Citations (Scopus)
  • BASE: An incrementally deployable mechanism for viable IP spoofing prevention

    Lee, H., Kwon, M., Hasker, G. & Perrig, A., 2007, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07. p. 20-31 12 p. (Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    35 Citations (Scopus)
  • Bayesian memory-based reputation system

    Yuan, W., Guan, D., Lee, S., Lee, Y. K. & Lee, H., 2007 Aug 27, MobiMedia 2007 - Proceedings of the 3rd International Conference on Mobile Multimedia Communications. Association for Computing Machinery, 1385300. (MobiMedia 2007 - Proceedings of the 3rd International Conference on Mobile Multimedia Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • BeaconRider: Opportunistic sharing of beacon air-time in densely deployed WLANs

    Lee, H., Kim, J., Joo, C. & Bahk, S., 2019 Oct, 27th IEEE International Conference on Network Protocols, ICNP 2019. IEEE Computer Society, 8888044. (Proceedings - International Conference on Network Protocols, ICNP; vol. 2019-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Biomedical entity representations with synonym marginalization

    Sung, M., Jeon, H., Lee, J. & Kang, J., 2020, ACL 2020 - 58th Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference. Association for Computational Linguistics (ACL), p. 3641-3650 10 p. (Proceedings of the Annual Meeting of the Association for Computational Linguistics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • BLESS: BLE-aided swift Wi-Fi scanning in multi-protocol IoT networks

    Park, W., Ryoo, D., Joo, C. & Bahk, S., 2021 May 10, INFOCOM 2021 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., 9488795. (Proceedings - IEEE INFOCOM; vol. 2021-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • BOSS: A biomedical object search system

    Choi, J., Kim, D., Kim, S., Lee, S., Lee, K. & Kang, J., 2011, CIKM 2011 Glasgow: DTMBIO'11 - Proceedings of the ACM 5th International Workshop on Data and Text Mining in Biomedical Informatics. p. 19-26 8 p. (International Conference on Information and Knowledge Management, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • BotGAD: Detecting botnets by capturing group activities in network traffic

    Choi, H., Lee, H. & Kim, H., 2009, Proceedings of the 4th International ICST Conference on Communication System Software and Middleware, COMSWARE '09. 1621893. (Proceedings of the 4th International ICST Conference on Communication System Software and Middleware, COMSWARE '09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    93 Citations (Scopus)
  • Bridging the Domain Gap Towards Generalization in Automatic Colorization

    Lee, H., Kim, D., Lee, D., Kim, J. & Lee, J., 2022, Computer Vision – ECCV 2022 - 17th European Conference, Proceedings. Avidan, S., Brostow, G., Cissé, M., Farinella, G. M. & Hassner, T. (eds.). Springer Science and Business Media Deutschland GmbH, p. 527-543 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13677 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • CacheRewinder: Revoking Speculative Cache Updates Exploiting Write-Back Buffer

    Lee, J., Lee, J., Suh, T. & Koo, G., 2022, Proceedings of the 2022 Design, Automation and Test in Europe Conference and Exhibition, DATE 2022. Bolchini, C., Verbauwhede, I. & Vatajelu, I. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 514-519 6 p. (Proceedings of the 2022 Design, Automation and Test in Europe Conference and Exhibition, DATE 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Can Language Models be Biomedical Knowledge Bases?

    Sung, M., Lee, J., Yi, S. S., Jeon, M., Kim, S. & Kang, J., 2021, EMNLP 2021 - 2021 Conference on Empirical Methods in Natural Language Processing, Proceedings. Association for Computational Linguistics (ACL), p. 4723-4734 12 p. (EMNLP 2021 - 2021 Conference on Empirical Methods in Natural Language Processing, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • CENTRIS: A precise and scalable approach for identifying modified open-source software reuse

    Woo, S., Park, S., Kim, S., Lee, H. & Oh, H., 2021 May, Proceedings - 2021 IEEE/ACM 43rd International Conference on Software Engineering, ICSE 2021. IEEE Computer Society, p. 860-872 13 p. (Proceedings - International Conference on Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Code graph for malware detection

    Kyoochang, J. & Heejo, L., 2008, 2008 International Conference on Information Networking, ICOIN. 4472801. (2008 International Conference on Information Networking, ICOIN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Citations (Scopus)
  • Comparison of decentralized and centralized update paradigms for remote tracking of distributed dynamic sources

    Kang, S., Eryilmaz, A. & Joo, C., 2021 May 10, INFOCOM 2021 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., 9488777. (Proceedings - IEEE INFOCOM; vol. 2021-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Consento: A consensus search engine for answering subjective queries

    Choi, J., Kim, D., Kim, S., Lee, J., Lim, S., Lee, S. & Kang, J., 2012, WWW'12 - Proceedings of the 21st Annual Conference on World Wide Web Companion. p. 481-482 2 p. (WWW'12 - Proceedings of the 21st Annual Conference on World Wide Web Companion).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • CONSENTO: A new framework for opinion based entity search and summarization

    Choi, J., Kim, D., Kim, S., Lee, J., Lim, S., Lee, S. & Kang, J., 2012, CIKM 2012 - Proceedings of the 21st ACM International Conference on Information and Knowledge Management. p. 1935-1939 5 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Consistency Training with Virtual Adversarial Discrete Perturbation

    Park, J., Kim, G. & Kang, J., 2022, NAACL 2022 - 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Proceedings of the Conference. Association for Computational Linguistics (ACL), p. 5646-5656 11 p. (NAACL 2022 - 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Proceedings of the Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Constructing and evaluating a novel crowdsourcing-based paraphrased opinion spam dataset

    Kim, S., Lee, S., Park, D. & Kang, J., 2017, 26th International World Wide Web Conference, WWW 2017. International World Wide Web Conferences Steering Committee, p. 827-836 10 p. 3052607. (26th International World Wide Web Conference, WWW 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Contextualized sparse representations for real-time open-domain question answering

    Lee, J., Seo, M., Hajishirzi, H. & Kang, J., 2020, ACL 2020 - 58th Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference. Association for Computational Linguistics (ACL), p. 912-919 8 p. (Proceedings of the Annual Meeting of the Association for Computational Linguistics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Cyber weather forecasting: Forecasting unknown Internet worms using randomness analysis

    Park, H., Jung, S. O. D., Lee, H. & In, H. P., 2012, Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Proceedings. p. 376-387 12 p. (IFIP Advances in Information and Communication Technology; vol. 376 AICT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Data-Centric and Model-Centric Approaches for Biomedical Question Answering

    Yoon, W., Yoo, J., Seo, S., Sung, M., Jeong, M., Kim, G. & Kang, J., 2022, Experimental IR Meets Multilinguality, Multimodality, and Interaction - 13th International Conference of the CLEF Association, CLEF 2022, Proceedings. Barrón-Cedeño, A., Da San Martino, G., Faggioli, G., Ferro, N., Degli Esposti, M., Sebastiani, F., Macdonald, C., Pasi, G., Hanbury, A. & Potthast, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 204-216 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13390 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Deep semantic frame-based deceptive opinion spam analysis

    Kim, S., Chang, H., Lee, S., Yu, M. & Kang, J., 2015 Oct 17, CIKM 2015 - Proceedings of the 24th ACM International Conference on Information and Knowledge Management. Association for Computing Machinery, p. 1131-1140 10 p. (International Conference on Information and Knowledge Management, Proceedings; vol. 19-23-Oct-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    38 Citations (Scopus)
  • Detecting metamorphic malwares using code graphs

    Lee, J., Jeong, K. & Lee, H., 2010, APPLIED COMPUTING 2010 - The 25th Annual ACM Symposium on Applied Computing. p. 1970-1977 8 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    83 Citations (Scopus)
  • Dicos: Discovering Insecure Code Snippets from Stack Overflow Posts by Leveraging User Discussions

    Hong, H., Woo, S. & Lee, H., 2021 Dec 6, Proceedings - 37th Annual Computer Security Applications Conference, ACSAC 2021. Association for Computing Machinery, p. 194-206 13 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Distinguishing between FE and DDoS using randomness check

    Park, H., Li, P., Gao, D., Lee, H. & Deng, R. H., 2008, Information Security - 11th International Conference, ISC 2008, Proceedings. p. 131-145 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5222 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • DroidGraph: Discovering Android malware by analyzing semantic behavior

    Kwon, J., Jeong, J., Lee, J. & Lee, H., 2014 Dec 23, 2014 IEEE Conference on Communications and Network Security, CNS 2014. Institute of Electrical and Electronics Engineers Inc., p. 498-499 2 p. 6997523. (2014 IEEE Conference on Communications and Network Security, CNS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • DyGRAIN: An Incremental Learning Framework for Dynamic Graphs

    Kim, S., Yun, S. & Kang, J., 2022, Proceedings of the 31st International Joint Conference on Artificial Intelligence, IJCAI 2022. De Raedt, L. & De Raedt, L. (eds.). International Joint Conferences on Artificial Intelligence, p. 3157-3163 7 p. (IJCAI International Joint Conference on Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Dynamic surveillance: A case study with Enron email data set

    Do, H., Choi, P. & Lee, H., 2014, Information Security Applications - 14th International Workshop, WISA 2013, Revised Selected Papers. Springer Verlag, p. 81-99 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8267 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Efficient subsequence matching using the longest common subsequence with a dual match index

    Han, T. S., Ko, S. K. & Kang, J., 2007, Machine Learning and Data Mining in Pattern Recognition - 5th International Conference, MLDM 2007, Proceedings. Springer Verlag, p. 585-600 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4571 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • Energy-efficient scheduling of a real-time task on DVFS-enabled multi-cores

    Lee, W. Y., Ko, Y. W., Lee, H. & Kim, H., 2009, ICHIT 2009 - International Conference on Convergence and Hybrid Information Technology 2009. p. 273-277 5 p. (ACM International Conference Proceeding Series; vol. 321).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Enforcing access control using risk assessment

    Diep, N. N., Hung, L. X., Zhung, Y., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - ECUMN 2007: Fourth European Conference on Universal Multiservice Networks. p. 419-424 6 p. 4115226. (Proceedings - ECUMN 2007: Fourth European Conference on Universal Multiservice Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    51 Citations (Scopus)
  • Exploiting inter-gene information for microarray data integration

    Lin, K. M. & Kang, J., 2007, Proceedings of the 2007 ACM Symposium on Applied Computing. Association for Computing Machinery, p. 123-127 5 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • FassKey: A secure and convenient authentication system

    Milburn, J. & Lee, H., 2016 Jun 30, IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services. Institute of Electrical and Electronics Engineers Inc., p. 489-495 7 p. 7502490. (IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • FAVIQ: FAct Verification from Information-seeking Questions

    Park, J., Min, S., Kang, J., Zettlemoyer, L. & Hajishirzi, H., 2022, ACL 2022 - 60th Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference (Long Papers). Muresan, S., Nakov, P. & Villavicencio, A. (eds.). Association for Computational Linguistics (ACL), p. 5154-5166 13 p. (Proceedings of the Annual Meeting of the Association for Computational Linguistics; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution