default search action
Ji Won Yoon
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Ji Hyuk Jung, Miyeon Hong, Hyeongjun Choi, Ji Won Yoon:
An Analysis of GPS Spoofing Attack and Efficient Approach to Spoofing Detection in PX4. IEEE Access 12: 46668-46677 (2024) - [j27]Ji Won Yoon, Hyeonseung Lee, Ju Yeon Kang, Nam Soo Kim:
Cons-KD: Dropout-Robust Knowledge Distillation for CTC-Based Automatic Speech Recognition. IEEE Access 12: 131136-131146 (2024) - [c57]Joon Soo Yoo, Miyeon Hong, Ji Won Heo, Kang Hoon Lee, Ji Won Yoon:
Fast Private Location-based Information Retrieval over the Torus. AVSS 2024: 1-7 - [c56]Kang Hoon Lee, Young Bae Jeon, Ji Won Yoon:
Faster Homomorphic DFT and Speech Analysis for Torus Fully Homomorphic Encryption. EuroS&P 2024: 486-505 - [i18]Joon Soo Yoo, Baek Kyung Song, Tae Min Ahn, Ji Won Heo, Ji Won Yoon:
Speed-up of Data Analysis with Kernel Trick in Encrypted Domain. CoRR abs/2406.09716 (2024) - [i17]Joon Soo Yoo, Miyeon Hong, Ji Won Heo, Kang Hoon Lee, Ji Won Yoon:
Fast Private Location-based Information Retrieval Over the Torus. CoRR abs/2407.19871 (2024) - 2023
- [j26]Il-Youp Kwak, Sungsu Kwag, Junhee Lee, Youngbae Jeon, Jeong-Hwan Hwang, Hyoukryeol Choi, Jong-Hoon Yang, Soyul Han, Jun Ho Huh, Choong-Hoon Lee, Ji Won Yoon:
Voice Spoofing Detection Through Residual Network, Max Feature Map, and Depthwise Separable Convolution. IEEE Access 11: 49140-49152 (2023) - [j25]Youngjoon Kim, Insup Lee, Hyuk Kwon, Kyeongsik Lee, Ji Won Yoon:
BAN: Predicting APT Attack Based on Bayesian Network With MITRE ATT&CK Framework. IEEE Access 11: 91949-91968 (2023) - [j24]Hyeongjun Choi, Ji Hyuk Jung, Ji Won Yoon:
CASPER: Covert Channel Using Internal Speakers. Sensors 23(6): 2970 (2023) - [j23]Ji Won Yoon, Hyung Yong Kim, Hyeonseung Lee, Sunghwan Ahn, Nam Soo Kim:
Oracle Teacher: Leveraging Target Information for Better Knowledge Distillation of CTC Models. IEEE ACM Trans. Audio Speech Lang. Process. 31: 2974-2987 (2023) - [j22]Young-Mok Ha, Eunji Pak, Jongkil Park, Taeho Kim, Ji Won Yoon:
Clock Offset Estimation for Systems With Asymmetric Packet Delays. IEEE/ACM Trans. Netw. 31(4): 1838-1853 (2023) - [c55]Dowoo Baik, Ji Won Yoon:
Equilibrium Point Learning. ACML 2023: 74-89 - [c54]Hyunsoo Kim, Youngbae Jeon, Ji Won Yoon:
Invasion of location privacy using online map services and smartphone sensors. AsiaCCS 2023: 41-52 - [c53]Tae Min Ahn, Kang Hoon Lee, Joon Soo Yoo, Ji Won Yoon:
Cheap and Fast Iterative Matrix Inverse in Encrypted Domain. ESORICS (1) 2023: 334-352 - [c52]Ji Won Yoon, Sunghwan Ahn, Hyeonseung Lee, Minchan Kim, Seok Min Kim, Nam Soo Kim:
EM-Network: Oracle Guided Self-distillation for Sequence Learning. ICML 2023: 40111-40128 - [c51]Geon-Woo Jeon, Miyeon Hong, Joon Soo Yoo, Ji Won Yoon, Baek Kyung Song:
Secure Dimensionality Reduction: Applying Linear Discriminant Analysis over the TFHE Homomorphic Encryption Scheme. ICTC 2023: 1462-1467 - [c50]Ji Won Yoon, Seok Min Kim, Nam Soo Kim:
MCR-Data2vec 2.0: Improving Self-supervised Speech Pre-training via Model-level Consistency Regularization. INTERSPEECH 2023: 2833-2837 - [c49]KangHoon Lee, Ji Won Yoon:
Discretization Error Reduction for High Precision Torus Fully Homomorphic Encryption. Public Key Cryptography (2) 2023: 33-62 - [c48]Yongbin Park, Minchul Kim, Ji Won Yoon:
Differential privacy using Gamma distribution. SSP 2023: 631-635 - [c47]Hyun Jung Doh, Joon Soo Yoo, Miyeon Hong, Kang Hoon Lee, Tae Min Ahn, Ji Won Yoon:
Principal Component Analysis over the Boolean Circuit Within TFHE Scheme. WISA 2023: 27-39 - [i16]Seong-Eun Moon, Ji Won Yoon, Shinyoung Joo, Yoohyung Kim, Jae-Hyun Bae, Seokho Yoon, Haanju Yoo, Young Min Cho:
Development of deep biological ages aware of morbidity and mortality based on unsupervised and semi-supervised deep learning approaches. CoRR abs/2302.00319 (2023) - [i15]Ji Won Yoon, Sunghwan Ahn, Hyeonseung Lee, Minchan Kim, Seok Min Kim, Nam Soo Kim:
EM-Network: Oracle Guided Self-distillation for Sequence Learning. CoRR abs/2306.10058 (2023) - [i14]KangHoon Lee, Ji Won Yoon:
Discretization Error Reduction for Torus Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2023: 402 (2023) - 2022
- [j21]Hyung Yong Kim, Ji Won Yoon, Won-Ik Cho, Nam Soo Kim:
Neurally Optimized Decoder for Low Bitrate Speech Codec. IEEE Signal Process. Lett. 29: 244-248 (2022) - [j20]Hyekyung Han, Youngbae Jeon, Baek Kyung Song, Ji Won Yoon:
A Phase-Based Approach for ENF Signal Extraction From Rolling Shutter Videos. IEEE Signal Process. Lett. 29: 1724-1728 (2022) - [c46]Hara Seon, Hyeongjun Choi, Baek Kyung Song, Ji Won Yoon:
Community Privacy using the Sparse Vector Technique for Graph Statistics. ESSE 2022: 89-97 - [c45]Youngbae Jeon, Hyekyung Han, Ji Won Yoon:
Manifold Learning-based Frequency Estimation for extracting ENF signal from digital video. ICPR 2022: 189-195 - [c44]Ji Won Yoon, Beom Jun Woo, Sunghwan Ahn, Hyeonseung Lee, Nam Soo Kim:
Inter-KD: Intermediate Knowledge Distillation for CTC-Based Automatic Speech Recognition. SLT 2022: 280-286 - [i13]Ji Won Yoon, Beom Jun Woo, Nam Soo Kim:
HuBERT-EE: Early Exiting HuBERT for Efficient Speech Recognition. CoRR abs/2204.06328 (2022) - [i12]Ji Won Yoon, Beom Jun Woo, Sunghwan Ahn, Hyeonseung Lee, Nam Soo Kim:
Inter-KD: Intermediate Knowledge Distillation for CTC-Based Automatic Speech Recognition. CoRR abs/2211.15075 (2022) - 2021
- [j19]Youngbae Jeon, Ji Hyuk Jung, Ji Won Yoon:
Efficient Correlation Power Analysis (CPA) Focusing on Byte-Wise Calculation Points. IEEE Access 9: 74275-74285 (2021) - [j18]Sunguk Shin, Youngjoon Kim, Ji Won Yoon:
A new approach to training more interpretable model with additional segmentation. Pattern Recognit. Lett. 152: 188-194 (2021) - [j17]Ji Won Yoon, Hyeonseung Lee, Hyung Yong Kim, Won-Ik Cho, Nam Soo Kim:
TutorNet: Towards Flexible Knowledge Distillation for End-to-End Speech Recognition. IEEE ACM Trans. Audio Speech Lang. Process. 29: 1626-1638 (2021) - [c43]KangHoon Lee, Ji Won Yoon:
Efficient Adaptation of TFHE for High End-to-End Throughput. WISA 2021: 144-156 - [i11]Ji Won Yoon, Hyung Yong Kim, Hyeonseung Lee, Sunghwan Ahn, Nam Soo Kim:
Oracle Teacher: Towards Better Knowledge Distillation. CoRR abs/2111.03664 (2021) - 2020
- [c42]Il-Youp Kwak, Sungsu Kwag, Junhee Lee, Jun Ho Huh, Choong-Hoon Lee, Youngbae Jeon, Jeong-Hwan Hwang, Ji Won Yoon:
ResMax: Detecting Voice Spoofing Attacks with Residual Network and Max Feature Map. ICPR 2020: 4837-4844 - [c41]Hyekyung Han, KangHoon Lee, Youngbae Jeon, Ji Won Yoon:
Comparison of various interpolation techniques to infer localization of audio files using ENF signals. ICSSA 2020: 46-51 - [c40]Seohyun Kim, Ji Won Yoon:
Location tracking technique for Regional ENF Classification Using ARIMA. ICTC 2020: 1321-1324 - [c39]Won-Ik Cho, Donghyun Kwak, Ji Won Yoon, Nam Soo Kim:
Speech to Text Adaptation: Towards an Efficient Cross-Modal Distillation. INTERSPEECH 2020: 896-900 - [c38]Youngbae Jeon, Ji Won Yoon:
Filtering-Based Correlation Power Analysis (CPA) with Signal Envelopes Against Shuffling Methods. WISA 2020: 389-402 - [i10]Won-Ik Cho, Donghyun Kwak, Ji Won Yoon, Nam Soo Kim:
Speech to Text Adaptation: Towards an Efficient Cross-Modal Distillation. CoRR abs/2005.08213 (2020)
2010 – 2019
- 2019
- [j16]Woorim Bang, Ji Won Yoon:
Power Grid Estimation Using Electric Network Frequency Signals. Secur. Commun. Networks 2019: 1982168:1-1982168:11 (2019) - [j15]Baek Kyung Song, Joon Soo Yoo, Miyeon Hong, Ji Won Yoon:
A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms. Secur. Commun. Networks 2019: 3648671:1-3648671:14 (2019) - [c37]Il-Youp Kwak, Jun Ho Huh, Seung Taek Han, Iljoo Kim, Ji Won Yoon:
Voice Presentation Attack Detection through Text-Converted Voice Command Analysis. CHI 2019: 598 - [c36]Taeyoon Hwang, Ji Won Yoon:
Static Malware Analysis in Encrypted Domain. ICTC 2019: 47-52 - [c35]Woorim Bang, Ji Won Yoon:
Forecasting the Electric Network Frequency Signals on Power Grid. ICTC 2019: 1218-1223 - [c34]Joon Soo Yoo, Jeong-Hwan Hwang, Baek Kyung Song, Ji Won Yoon:
A Bitwise Logistic Regression Using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme. ISPEC 2019: 20-40 - [c33]Miyeon Hong, Ji Won Yoon:
Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression. WISA 2019: 155-166 - 2018
- [c32]Ji Won Yoon, Woon Seung Yeo:
A Study on the Audiovisual Art of Nam June Paik in the Context of Multimodality and Synesthesia. ICMC 2018 - [c31]Joon Soo Yoo, Baek Kyung Song, Ji Won Yoon:
Logarithm Design on Encrypted Data with Bitwise Operation. WISA 2018: 105-116 - [c30]Shinwoo Shim, Ji Won Yoon:
A New Bayesian Approach to Exploring Damaged Assets by Monitoring Mission Failures Caused by Undetected Attack. WISA 2018: 185-196 - [c29]Youngbae Jeon, Minchul Kim, Hyunsoo Kim, Hyoungshick Kim, Jun Ho Huh, Ji Won Yoon:
I'm Listening to your Location! Inferring User Location with Acoustic Side Channels. WWW 2018: 339-348 - [i9]Won-Ik Cho, Hyeon Seung Lee, Ji Won Yoon, Seok Min Kim, Nam Soo Kim:
Speech Intention Understanding in a Head-final Language: A Disambiguation Utilizing Intonation-dependency. CoRR abs/1811.04231 (2018) - 2017
- [j14]Seungjoon Lee, Young-Mok Ha, Sungjun Yoon, Hyun-Ju Jo, Soohee Jang, Jiyeon Lee, Youngan Kim, Ji Won Yoon:
The Vulnerability Exploitation Conveying Digital Data Over Mobile Voice Call Channels. Wirel. Pers. Commun. 96(1): 1145-1172 (2017) - [c28]Hyunsoo Kim, Youngbae Jeon, Ji Won Yoon:
Construction of a National Scale ENF Map using Online Multimedia Data. CIKM 2017: 19-28 - [c27]Youngjoon Ki, Ji Won Yoon:
An Efficient Method for Securely Storing and Handling of Genomic Data. ICSSA 2017: 121-125 - [c26]Youngjoon Ki, Ji Won Yoon:
PD-FDS: Purchase Density based Online Credit Card Fraud Detection System. ADF@KDD 2017: 76-84 - [c25]Young-Mok Ha, Soohee Jang, Kwang-Won Kim, Ji Won Yoon:
Side channel attack on digital door lock with vibration signal analysis: Longer password does not guarantee higher security level. MFI 2017: 103-110 - [i8]Ji Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee, Kwangsu Lee:
Visual Honey Encryption: Application to Steganography. IACR Cryptol. ePrint Arch. 2017: 73 (2017) - [i7]Joo-Im Kim, Ji Won Yoon:
Honey Chatting: A novel instant messaging system robust to eavesdropping over communication. IACR Cryptol. ePrint Arch. 2017: 74 (2017) - 2016
- [j13]Ji Won Yoon:
Bayesian interpretation to generalize adaptive mean shift algorithm. J. Intell. Fuzzy Syst. 30(6): 3583-3592 (2016) - [j12]Ji Won Yoon:
A New Bayesian Edge-Linking Algorithm Using Single-Target Tracking Techniques. Symmetry 8(12): 143 (2016) - [c24]SeungJun Kang, Ji Won Yoon:
Classification of home appliance by using Probabilistic KNN with sensor data. APSIPA 2016: 1-5 - [c23]Hyun Soo Park, Young Bae Jeon, Ji Won Yoon:
A New Approach to Building a Disguised Server Using the Honey Port Against General Scanning Attacks. BWCCA 2016: 453-465 - [c22]Joo-Im Kim, Ji Won Yoon:
Honey chatting: A novel instant messaging system robust to eavesdropping over communication. ICASSP 2016: 2184-2188 - [c21]Ji Won Yoon:
An efficient geometric shape coding and representation approach to obtain both skeleton and contours. IMCOM 2016: 4:1-4:8 - [c20]Jisoo Jung, Joo-Im Kim, Ji Won Yoon:
A Practical Approach to Constructing Triple-Blind Review Process with Maximal Anonymity and Fairness. WISA 2016: 198-209 - 2015
- [j11]Chae Chang Lee, Ji Won Yoon:
A Novel Statistical Approach to Detect Card Frauds Using Transaction Patterns. IEICE Trans. Inf. Syst. 98-D(3): 649-660 (2015) - [j10]Hyun-Ju Jo, Ji Won Yoon:
A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis. Int. J. Distributed Sens. Networks 11: 406915:1-406915:7 (2015) - [j9]Ji Won Yoon, Nial Friel:
Efficient model selection for probabilistic K nearest neighbour classification. Neurocomputing 149: 1098-1108 (2015) - [c19]Ji Won Yoon:
A simple sequential outlier detection with several residuals. EUSIPCO 2015: 2351-2355 - [c18]Hyunsoo Kim, Hyoungshick Kim, Ji Won Yoon:
A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers. ICSSA 2015: 7-12 - [c17]Ji Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee, Kwangsu Lee:
Visual Honey Encryption: Application to Steganography. IH&MMSec 2015: 65-74 - [c16]Ji Young Chun, Hyelim Lee, Ji Won Yoon:
Passing Go with DNA Sequencing: Delivering Messages in a Covert Transgenic Channel. IEEE Symposium on Security and Privacy Workshops 2015: 17-26 - [c15]Eunchong Lee, Hyunsoo Kim, Ji Won Yoon:
Various Threat Models to Circumvent Air-Gapped Systems for Preventing Network Attack. WISA 2015: 187-199 - 2014
- [j8]Ji Won Yoon:
Statistical denoising scheme for single molecule fluorescence microscopic images. Biomed. Signal Process. Control. 10: 11-20 (2014) - [j7]Ji Won Yoon:
Bayesian reconstruction of projection reconstruction NMR (PR-NMR). Comput. Biol. Medicine 54: 89-99 (2014) - 2013
- [i6]Ji Won Yoon, Nial Friel:
Efficient Estimation of the number of neighbours in Probabilistic K Nearest Neighbour Classification. CoRR abs/1305.1002 (2013) - [i5]Ji Won Yoon:
Statistical Denoising for single molecule fluorescence microscopic images. CoRR abs/1306.1619 (2013) - [i4]Chae Chang Lee, Ji Won Yoon:
A data mining approach using transaction patterns for card fraud detection. CoRR abs/1306.5547 (2013) - [i3]Ji Won Yoon:
An Efficient Model Selection for Gaussian Mixture Model in a Bayesian Framework. CoRR abs/1307.0995 (2013) - 2012
- [j6]Hyoungshick Kim, Ji Won Yoon, Jon Crowcroft:
Network analysis of temporal trends in scholarly research productivity. J. Informetrics 6(1): 97-110 (2012) - [c14]Ji Won Yoon, Tigran T. Tchrakian:
Bayesian implementation of a Lagrangian macroscopic traffic flow model. ICPR 2012: 214-217 - [c13]Ji Won Yoon, Francesco Fusco, Michael Wurst:
Bayesian separation of wind power generation signals. ICPR 2012: 2660-2663 - [c12]Francesco Fusco, Michael Wurst, Ji Won Yoon:
Mining residential household information from low-resolution smart meter data. ICPR 2012: 3545-3548 - [c11]Mathieu Sinn, Ji Won Yoon, Francesco Calabrese, Eric Bouillet:
Predicting arrival times of buses using real-time GPS measurements. ITSC 2012: 1227-1232 - [c10]Ji Won Yoon, Fabio Pinelli, Francesco Calabrese:
Cityride: A Predictive Bike Sharing Journey Advisor. MDM 2012: 306-311 - 2011
- [j5]Ji Won Yoon, Hyoungshick Kim:
A Perfect Collision-Free Pseudonym System. IEEE Commun. Lett. 15(6): 686-688 (2011) - [j4]Ji Won Yoon, Stephen J. Roberts, Matthew Dyson, John Q. Gan:
Bayesian inference for an adaptive Ordered Probit model: An application to Brain Computer Interfacing. Neural Networks 24(7): 726-734 (2011) - [c9]Ji Won Yoon, Hyoung-joo Lee, Hyoungshick Kim:
Effective measurement selection in truncated kernel density estimator: Voronoi mean shift algorithm for truncated kernels. ICUIMC 2011: 57 - 2010
- [j3]Ji Won Yoon, Hyoungshick Kim, Jun Ho Huh:
Hybrid spam filtering for mobile communication. Comput. Secur. 29(4): 446-459 (2010) - [j2]Ji Won Yoon, Stephen J. Roberts:
Robust Measurement Validation in Target Tracking Using Geometric Structure. IEEE Signal Process. Lett. 17(5): 493-496 (2010) - [c8]Ji Won Yoon, Simon P. Wilson:
Improved Mean Shift Algorithm with Heterogeneous Node Weights. ICPR 2010: 4222-4225 - [c7]Ji Won Yoon, Simon P. Wilson, K. Hun Mok:
A highly efficient blocked Gibbs sampler reconstruction of multidimensional NMR spectra. AISTATS 2010: 940-947
2000 – 2009
- 2009
- [j1]Ji Won Yoon, Stephen J. Roberts, Matthew Dyson, John Q. Gan:
Adaptive classification for Brain Computer Interface systems using Sequential Monte Carlo sampling. Neural Networks 22(9): 1286-1294 (2009) - [c6]Ji Won Yoon, Hyoungshick Kim:
A new collision-free pseudonym scheme in mobile ad hoc networks. WiOpt 2009: 1-5 - [i2]Ji Won Yoon, Hyoungshick Kim, Jun Ho Huh:
Hybrid Spam Filtering for Mobile Communication. CoRR abs/0908.2462 (2009) - [i1]Hyoungshick Kim, Ji Won Yoon:
How to Compare the Scientific Contributions between Research Groups. CoRR abs/0911.0050 (2009) - 2008
- [c5]Ji Won Yoon, Stephen J. Roberts, Matthew Dyson, John Q. Gan:
Adaptive Classification by Hybrid EKF with Truncated Filtering: Brain Computer Interfacing. IDEAL 2008: 370-377 - [c4]Ji Won Yoon, Stephen J. Roberts, Matthew Dyson, John Q. Gan:
Sequential Bayesian estimation for adaptive classification. MFI 2008: 601-605 - 2007
- [c3]Ji Won Yoon, Simon J. Godsill, ChulHun Kang, Tae-Seong Kim:
Bayesian Inference for 2D Gel Electrophoresis Image Analysis. BIRD 2007: 343-356 - [c2]Woon Seung Yeo, Ji Won Yoon, Hee Young Cho:
The Stringball: a ball Interface with Strings for Collaborative Performance. ICMC 2007 - 2006
- [c1]Ji Won Yoon, Simon J. Godsill:
Bayesian inference for multidimensional NMR image reconstruction. EUSIPCO 2006: 1-5
Coauthor Index
aka: Young Bae Jeon
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-14 23:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint