Empirical study of drone sound detection in real-life environment with deep neural networks S Jeon, JW Shin, YJ Lee, WH Kim, YH Kwon, HY Yang 2017 25th European Signal Processing Conference (EUSIPCO), 1858-1862, 2017 | 171 | 2017 |
Burst-based anomaly detection on the DNP3 protocol JH Yun, SH Jeon, KH Kim, WN Kim International Journal of Control and Automation 6 (2), 313-324, 2013 | 35 | 2013 |
Finding core topics: Topic extraction with clustering on tweet S Kim, S Jeon, J Kim, YH Park, H Yu 2012 Second International Conference on Cloud and Green Computing, 777-782, 2012 | 26 | 2012 |
Spoiler detection in TV program tweets S Jeon, S Kim, H Yu Information Sciences 329, 220-235, 2016 | 21 | 2016 |
Centering-based Neural Coherence Modeling with Hierarchical Discourse Segments S Jeon, M Strube Proceedings of the 2020 Conference on Empirical Methods in Natural Language …, 2020 | 15 | 2020 |
Don't Be Spoiled by Your Friends: Spoiler Detection in TV Program Tweets S Jeon, S Kim, H Yu Seventh International AAAI Conference on Weblogs and Social Media (ICWSM13), 2013 | 15 | 2013 |
Countering the influence of essay length in neural essay scoring S Jeon, M Strube Proceedings of the Second Workshop on Simple and Efficient Natural Language …, 2021 | 11 | 2021 |
Entity-based neural local coherence modeling S Jeon, M Strube Proceedings of the 60th Annual Meeting of the Association for Computational …, 2022 | 8 | 2022 |
Passive fingerprinting of scada in critical infrastructure network without deep packet inspection S Jeon, JH Yun, S Choi, WN Kim arXiv preprint arXiv:1608.07679, 2016 | 8 | 2016 |
Method for transmitting and receiving fake communication data and terminal performing the same S Jeon, YUN Jeong-Han, W Kim, SEO Jungtaek, EK Park US Patent 9,338,646, 2016 | 7 | 2016 |
Incremental neural lexical coherence modeling S Jeon, M Strube Proceedings of the 28th International Conference on Computational …, 2020 | 6 | 2020 |
Apparatus and method for protecting communication pattern of network traffic S Jeon, YUN Jeong-Han, W Kim, SEO Jungtaek, CS Kim US Patent 9,356,958, 2016 | 5 | 2016 |
Obfuscation of critical infrastructure network traffic using fake communication S Jeon, JH Yun, WN Kim Critical Information Infrastructures Security: 9th International Conference …, 2016 | 3 | 2016 |
Attention or Convolution: Transformer Encoders in Audio Language Models for Inference Efficiency S Jeon, CF Yeh, H Inan, WN Hsu, R Rungta, Y Mehdad, D Bikel arXiv preprint arXiv:2311.02772, 2023 | | 2023 |
Apparatus and method for identifying web page for industrial control system S Jeon, YUN Jeong-Han, W Kim, EK Park, S Park US Patent 10,416,654, 2019 | | 2019 |
POSTER: Obfuscation of Critical Infrastructure Network Traffic using Fake Communication S Jeon, JH Yun, WN Kim 29th Annual Computer Security Applications Conference 2013 (ACSAC13), 2014 | | 2014 |