


Остановите войну!
for scientists:
Taeho Lee
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Other persons with the same name
- Taeho Lee 0001
(aka: Tae-Ho Lee 0001) — Korea Advanced Institute of Science and Technology (KAIST), Department of Electronic Engineering, Daejeon, Korea
- Taeho Lee 0002
— University of North Carolina at Chapel Hill, Department of Psychology and Neuroscience, NC, USA (and 2 more)
- Taeho Lee 0003 — Google Inc., Zürich, Switzerland (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j5]Jaeseung Han
, Taeho Lee, Jihoon Kwon, Joohee Lee
, Il-Ju Kim, Jihoon Cho, Dong-Guk Han
, Bo-Yeon Sim:
Single-Trace Attack on NIST Round 3 Candidate Dilithium Using Machine Learning-Based Profiling. IEEE Access 9: 166283-166292 (2021) - [c12]Seonghyuck Lim, Jaeseung Han, Taeho Lee, Dong-Guk Han:
Differential Fault Attack on Lightweight Block Cipher PIPO. ICISC 2021: 296-307 - [i3]Seonghyuck Lim, Jaeseung Han, Taeho Lee, Dong-Guk Han:
Differential Fault Attack on Lightweight Block Cipher PIPO. IACR Cryptol. ePrint Arch. 2021: 1190 (2021) - 2020
- [j4]Bo-Yeon Sim, Jihoon Kwon, Joohee Lee, Il-Ju Kim, Taeho Lee, Jaeseung Han
, Hyo Jin Yoon, Jihoon Cho, Dong-Guk Han
:
Single-Trace Attacks on Message Encoding in Lattice-Based KEMs. IEEE Access 8: 183175-183191 (2020) - [j3]Donghyun Kim, Taeho Lee, Sejun Kim, Byung Jun Lee, Hee Yong Youn:
Adaptive packet scheduling in IoT environment based on Q-learning. J. Ambient Intell. Humaniz. Comput. 11(6): 2225-2235 (2020) - [c11]HanSeop Lim, Taeho Lee, Seonghyeck Lim, Jaeseong Han, Bo-Yeon Sim, Dong-Guk Han:
Fault Injection Method for Hardware-implemented AES without Artificial Triggering. ICEA 2020: 40:1-40:6 - [i2]Bo-Yeon Sim, Jihoon Kwon, Joohee Lee, Il-Ju Kim, Taeho Lee, Jaeseung Han, Hyo Jin Yoon, Jihoon Cho, Dong-Guk Han:
Single-Trace Attacks on the Message Encoding of Lattice-Based KEMs. IACR Cryptol. ePrint Arch. 2020: 992 (2020) - [i1]Il-Ju Kim, Taeho Lee, Jaeseung Han, Bo-Yeon Sim, Dong-Guk Han:
Novel Single-Trace ML Profiling Attacks on NIST 3 Round candidate Dilithium. IACR Cryptol. ePrint Arch. 2020: 1383 (2020)
2010 – 2019
- 2019
- [j2]Hoon Jang
, Kyosang Hwang
, Taeho Lee, Taesik Lee
:
Designing robust rollout plan for better rural perinatal care system in Korea. Eur. J. Oper. Res. 274(2): 730-742 (2019) - [c10]Ockhyun Paek, Taeho Lee, Jin-Seok Yang:
SPLide: An Integrated Development Environment Supporting Software Product Lines. ICCSA (5) 2019: 338-348 - 2018
- [c9]Seung-chul Shin, Sangyeop Lee, Taeho Lee, Kyoungwoo Lee, Yong Seung Lee, Hong-Goo Kang:
Two electrode based healthcare device for continuously monitoring ECG and BIA signals. BHI 2018: 141-144 - [c8]Donghyun Kim, Taeho Lee, Sejun Kim, Byung Jun Lee, Hee Yong Youn:
Adaptive Packet Scheduling in IoT Environment Based on Q-learning. EUSPN/ICTH 2018: 247-254 - 2017
- [c7]Junhyung Moon, Sangyeop Lee, Taeho Lee, Saewon Kye, Yong Seung Lee
, Seung-chul Shin, Kyoungwoo Lee:
A prospective study of examining physiological signals for estimating occurrence of nocturnal enuresis. EMBC 2017: 2357-2360 - [c6]Taehyoun Kim, Samjoon Park, Taeho Lee:
Applying software reliability engineering process to software development in Korea defense industry. ISSRE Workshops 2017: 81 - [c5]Samjoon Park, Taehyoun Kim, Taeho Lee, Sungkyu Noh:
SIRIUS: Systematic Investigation for Reliability Improvement Upon Software. ISSRE Workshops 2017: 86-87 - [c4]Saewon Kye, Junhyung Moon, Taeho Lee, Sangyeop Lee, Kyoungwoo Lee, Seung-chul Shin, Yong Seung Lee:
Detecting periodic limb movements in sleep using motion sensor embedded wearable band. SMC 2017: 1087-1092 - [c3]Sangyeop Lee, Junhyung Moon, Taeho Lee, Saewon Kye, Kyoungwoo Lee, Yong Seung Lee, Seung-chul Shin:
Sleep stage classification for managing nocturnal enuresis through effective configuration. SMC 2017: 2832-2837 - 2014
- [j1]Taeho Lee, Taewan Gu, Jongmoon Baik:
MND-SCEMP: an empirical study of a software cost estimation modeling process in the defense domain. Empir. Softw. Eng. 19(1): 213-240 (2014) - [c2]Dohyung Kim, Ockhyun Paek, Taeho Lee, Samjoon Park, Hyunshik Bae:
A DDS-based distributed simulation approach for engineering-level models. WSC 2014: 2919-2930 - [c1]Hyun-Shik Oh, Samjoon Park, HyungJun Kim, Taeho Lee, Sangjin Lee, Dohyung Kim, Ockhyun Paek, Ju-Hye Park:
AddSIM: a new Korean engagement simulation environment using high resolution models. WSC 2014: 2942-2953
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-07-28 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint