Digital Library
Search: "[ keyword: ANN ]" (87)
A study on the convergence of Wegmann`s method applying a low frequency pass filter
Song Eun Ji The KIPS Transactions:PartA,
Vol. 11, No. 2, pp. 203-206,
Apr.
2004
10.3745/KIPSTA.2004.11.2.203
10.3745/KIPSTA.2004.11.2.203
Design and Implementation of an InfiniBand System Interconnect for High-Performance Cluster Systems
Mo Sang Man , Park Gyeong , Kim Seong Nam , Kim Myeong Jun , Im Gi Ug The KIPS Transactions:PartA,
Vol. 10, No. 4, pp. 389-396,
Oct.
2003
10.3745/KIPSTA.2003.10.4.389
10.3745/KIPSTA.2003.10.4.389
A Study on the Design and Implementation of Multi-Disaster Drone System Using Deep Learning-Based Object Recognition and Optimal Path Planning
Jin-Hyeok Kim, Tae-Hui Lee, Yamin Han, Heejung Byun KIPS Transactions on Computer and Communication Systems,
Vol. 10, No. 4, pp. 117-122,
Apr.
2021
https://doi.org/10.3745/KTCCS.2021.10.4.117
Keywords: ACO, Swarm, Drone, Deep Learning, Path Planning
https://doi.org/10.3745/KTCCS.2021.10.4.117
Keywords: ACO, Swarm, Drone, Deep Learning, Path Planning
Suggestion of CPA Attack and Countermeasure for Super-Light Block Cryptographic CHAM
Hyun-Jun Kim, Kyung-Ho Kim, Hyeok-Dong Kwon, Hwa-Jeong Seo KIPS Transactions on Computer and Communication Systems,
Vol. 9, No. 5, pp. 107-112,
May.
2020
https://doi.org/10.3745/KTCCS.2020.9.5.107
Keywords: Side Channel Attack, CHAM, CPA Attack, Masking, AVR
https://doi.org/10.3745/KTCCS.2020.9.5.107
Keywords: Side Channel Attack, CHAM, CPA Attack, Masking, AVR
JMP+RAND: Mitigating Memory Sharing-Based Side-ChannelAttack by Embedding Random Values in Binaries
Taehun Kim, Youngjoo Shin KIPS Transactions on Computer and Communication Systems,
Vol. 9, No. 5, pp. 101-106,
May.
2020
https://doi.org/10.3745/KTCCS.2020.9.5.101
Keywords: Memory Sharing-based Side-channel Attack, Binary Rewriting, Memory Sharing, Cloud computing, Countermeasure
https://doi.org/10.3745/KTCCS.2020.9.5.101
Keywords: Memory Sharing-based Side-channel Attack, Binary Rewriting, Memory Sharing, Cloud computing, Countermeasure
Fully Automatic Heart Segmentation Model Analysis Using Residual Multi-Dilated Recurrent Convolutional U-Net
Sang Heon Lim, Myung Suk Lee KIPS Transactions on Computer and Communication Systems,
Vol. 9, No. 2, pp. 37-44,
Feb.
2020
10.3745/KTCCS.2020.9.2.37
Keywords: Deep Learning, Artificial intelligence, Heart Segmentation, algorithm, ANN, CNN
10.3745/KTCCS.2020.9.2.37
Keywords: Deep Learning, Artificial intelligence, Heart Segmentation, algorithm, ANN, CNN
Implementation of Optimized 1st-Order Masking AES Algorithm Against Side-Channel-Analysis
Kim Kyung Ho, Seo Hwa Jeong KIPS Transactions on Computer and Communication Systems,
Vol. 8, No. 9, pp. 225-230,
Sep.
2019
https://doi.org/10.3745/KTCCS.2019.8.9.225
Keywords: AES, Side-Channel-Attack, Masking, Optimization
https://doi.org/10.3745/KTCCS.2019.8.9.225
Keywords: AES, Side-Channel-Attack, Masking, Optimization
Real-Time Detection on FLUSH+RELOAD Attack Using Performance Counter Monitor
Jonghyeon Cho, Taehyun Kim, Youngjoo Shin KIPS Transactions on Computer and Communication Systems,
Vol. 8, No. 6, pp. 151-158,
Jun.
2019
https://doi.org/10.3745/KTCCS.2019.8.6.151
Keywords: Cache-Side Channel Attack, FLUSH+RELOAD Attack, Performance Counter Monitor, Attack Detection
https://doi.org/10.3745/KTCCS.2019.8.6.151
Keywords: Cache-Side Channel Attack, FLUSH+RELOAD Attack, Performance Counter Monitor, Attack Detection
A Study on Improvement of Wegmann`s method by Low Frequency pass Filter
Eun Jee Song The KIPS Transactions:PartA,
Vol. 8, No. 4, pp. 503-508,
Dec.
2001
10.3745/KIPSTA.2001.8.4.503
10.3745/KIPSTA.2001.8.4.503
Fault - Tolerant Multicasting in MIN - based Multicomputers using Cube Encoding Scheme
Jin Soo Kim, Jae Hyung Park, Myung Kyun Kim The KIPS Transactions:PartA,
Vol. 8, No. 2, pp. 99-106,
Jun.
2001
10.3745/KIPSTA.2001.8.2.99
10.3745/KIPSTA.2001.8.2.99