default search action
Gunhee Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c22]Jeongsu Park, Kyeongsu Shi, Gunhee Lee, Hyojun An, Seunghwan Kim, Chanyoung Ko, Taeyeon Kim, Hyeongjun Kim, Kyoungchul Kong:
Design of a Front-enveloping Powered Exoskeleton Considering Optimal Distribution of Actuating Torques and Center of Mass. ICRA 2024: 3234-3240 - [c21]Won-Tae Koo, Jae-Gil Lee, Gunhee Lee, Woocheol Lee, Jungwook Woo, Dong Ik Suh, Joongsik Kim, Hyung Dong Lee, Seho Lee, Jaeyun Yi, Seonyong Cha:
Modeling and Demonstration for Multi-level Weight Conductance in Computational FeFET Memory Cell. IMW 2024: 1-4 - [c20]Youngjae Kwon, Won-Tae Koo, Sangsu Park, Dong Ik Suh, Gunhee Lee, Hyung Dong Lee, Youngbae Ahn, Dohee Kim, Seungwook Ryu, Hoseok Em, Seokjoon Kang, Chang Won Jeong, Junho Cheon, Hyejung Choi, Soo Gil Kim, Seho Lee, Jaeyun Yi, Seonyong Cha:
Improvement of MAC Accuracy using Oxygen Diffusion Barriers in Resistive Synaptic Cell Arrays. IMW 2024: 1-4 - 2023
- [j9]Hosung Jeon, Minwoo Jung, Gunhee Lee, Joonku Hahn:
Aberration Estimation for Synthetic Aperture Digital Holographic Microscope Using Deep Neural Network. Sensors 23(22): 9278 (2023) - 2022
- [i2]Gunhee Lee, Jonghwa Yim, Chanran Kim, Minjae Kim:
StyLandGAN: A StyleGAN based Landscape Image Synthesis using Depth-map. CoRR abs/2205.06611 (2022) - 2021
- [j8]Yeonwook Roh, Minho Kim, Sang Min Won, Daseul Lim, Insic Hong, Seunggon Lee, Taewi Kim, Changhwan Kim, Doohoe Lee, Sunghoon Im, Gunhee Lee, Dongjin Kim, Dongwook Shin, Dohyeon Gong, Baekgyeom Kim, Seongyeon Kim, Sungyeong Kim, Hyun Kuk Kim, Bon-Kwon Koo, Sungchul Seo, Je-Sung Koh, Daeshik Kang, Seungyong Han:
Vital signal sensing and manipulation of a microscale organ with a multifunctional soft gripper. Sci. Robotics 6(59) (2021) - 2020
- [j7]Junyong Lee, Hyeongseok Son, Gunhee Lee, Jonghyeop Lee, Sunghyun Cho, Seungyong Lee:
Deep color transfer using histogram analogy. Vis. Comput. 36(10): 2129-2143 (2020) - [c19]Gunhee Lee, Vera Zu, Sai Srujana Buddi, Dennis Liang, Purva Kulkarni, Jack G. M. Fitzgerald:
Converting the Point of View of Message Spoken to Virtual Assistants. EMNLP (Findings) 2020: 154-163 - [i1]Tianyi Pan, Subhankar Mishra, Lan N. Nguyen, Gunhee Lee, Jungmin Kang, Jungtaek Seo, My T. Thai:
Threat from being Social: Vulnerability Analysis of Social Network Coupled Smart Grid. CoRR abs/2005.08705 (2020)
2010 – 2019
- 2019
- [j6]Hyeongseok Son, Gunhee Lee, Sunghyun Cho, Seungyong Lee:
Naturalness-Preserving Image Tone Enhancement Using Generative Adversarial Networks. Comput. Graph. Forum 38(7): 277-285 (2019) - [c18]Gunhee Lee, Hanmin Park, Namhyung Kim, Joonsang Yu, Sujeong Jo, Kiyoung Choi:
Acceleration of DNN Backward Propagation by Selective Computation of Gradients. DAC 2019: 85 - 2018
- [c17]Sujeong Jo, Hanmin Park, Gunhee Lee, Kiyoung Choi:
Training Neural Networks with Low Precision Dynamic Fixed-Point. ICCD 2018: 405-408 - 2017
- [j5]Tianyi Pan, Subhankar Mishra, Lan N. Nguyen, Gunhee Lee, Jungmin Kang, Jungtaek Seo, My T. Thai:
Threat From Being Social: Vulnerability Analysis of Social Network Coupled Smart Grid. IEEE Access 5: 16774-16783 (2017) - [j4]Gunhee Lee, Cheeha Kim:
Centralized Contention Based MAC for OFDMA WLAN. IEICE Trans. Inf. Syst. 100-D(9): 2219-2223 (2017) - 2016
- [c16]Gunhee Lee, Yun-Sam Kim, Jungmin Kang:
An Adaptive DoS Attack Mitigation Measure for Field Networks in Smart Grids. BWCCA 2016: 419-428 - [c15]Yun-Sam Kim, Gunhee Lee, Jungmin Kang:
Lightweight IEC 61850 Secure Communication Module for Microgrids. BWCCA 2016: 443-451 - [c14]Jongho Kim, Gunhee Lee, Kiyoung Choi, Yonghwan Kim, Wook Kim, Kyung Tae Do, Jung Yun Choi:
Adaptive delay monitoring for wide voltage-range operation. DATE 2016: 511-516 - [c13]Hyeongtae Ahn, Gunhee Lee, Cheeha Kim:
Hidden chain: a full-duplex MAC protocol using hidden terminal relationships in wlans. WONS 2016: 96-99 - 2015
- [j3]Gunhee Lee, Wonil Kim, Kangseok Kim, Sangyoon Oh, Dong-Kyoo Kim:
An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networks. Peer-to-Peer Netw. Appl. 8(4): 684-693 (2015) - [c12]Gunhee Lee, Hyeongtae Ahn, Cheeha Kim:
In-frame querying to utilize full duplex communication in IEEE 802.11ax. CSCN 2015: 252-256 - 2013
- [j2]Hyeonmok Ko, Gunhee Lee, Cheeha Kim:
IO-MAC: An Enhancement of IEEE 802.11 DCF Using Implicit Ordering. Wirel. Pers. Commun. 72(2): 1467-1473 (2013) - [c11]Gunhee Lee, Jinho Lee, Kiyoung Choi:
Towards optimal adaptive routing in 3D NoC with limited vertical bandwidth. NoCArc@MICRO 2013: 23-26 - 2012
- [c10]Gunhee Lee, Jae Hoon Ko, Seoungyoul Oh, Cheeha Kim:
Sensing and transmission parameter determination for cognitive radio networks. ICOIN 2012: 364-367
2000 – 2009
- 2008
- [c9]Syed Rehan Afzal, Subir K. Biswas, Jong-bin Koh, Taqi Raza, Gunhee Lee, Dong-Kyoo Kim:
RSRP: A Robust Secure Routing Protocol for Mobile Ad Hoc Networks. WCNC 2008: 2313-2318 - 2006
- [c8]Gunhee Lee, Song-hwa Chae, Inwhan Hwang, Manpyo Hong:
A Privacy-Aware Service Protocol for Ubiquitous Computing Environments. EUC Workshops 2006: 619-628 - 2005
- [c7]Gunhee Lee, Wonil Kim, Dong-Kyoo Kim:
An Effective Method for Location Privacy in Ubiquitous Computing. EUC Workshops 2005: 1006-1015 - [c6]Jungtae Kim, Gunhee Lee, Jung-Taek Seo, Eung Ki Park, Choonsik Park, Dong-Kyoo Kim:
Y-AOI: Y-Means Based Attribute Oriented Induction Identifying Root Cause for IDSs. FSKD (2) 2005: 205-214 - [c5]Jungtae Kim, Gunhee Lee, Jung-Taek Seo, Eung Ki Park, Choonsik Park, Dong-Kyoo Kim:
An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction. ICOIN 2005: 72-79 - 2004
- [c4]Gunhee Lee, Wonil Kim, Dong-Kyoo Kim:
A Novel Method to Support User's Consent in Usage Control for Stable Trust in E-business. ICCSA (3) 2004: 906-914 - [c3]Jongwoon Park, Gunhee Lee, Sangha Lee, Dong-Kyoo Kim:
RPS: An Extension of Reference Monitor to Prevent Race-Attacks. PCM (1) 2004: 556-563 - [c2]Gunhee Lee, Wonil Kim, Dong-Kyoo Kim, Hongjin Yeh:
Effective Web-Related Resource Security Using Distributed Role Hierarchy. WAIM 2004: 87-96 - 2003
- [c1]Gunhee Lee, Hongjin Yeh, Wonil Kim, Dong-Kyoo Kim:
Web Security Using Distributed Role Hierarchy. GCC (1) 2003: 1087-1090
1990 – 1999
- 1999
- [j1]Tae Kyung Sung, Namsik Chang, Gunhee Lee:
Dynamics of Modeling in Data Mining: Interpretive Approach to Bankruptcy Prediction. J. Manag. Inf. Syst. 16(1): 63-86 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-20 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint