Empirical study of drone sound detection in real-life environment with deep neural networks S Jeon, JW Shin, YJ Lee, WH Kim, YH Kwon, HY Yang 2017 25th European Signal Processing Conference (EUSIPCO), 1858-1862, 2017 | 132 | 2017 |
Burst-based anomaly detection on the DNP3 protocol JH Yun, SH Jeon, KH Kim, WN Kim International Journal of Control and Automation 6 (2), 313-324, 2013 | 32 | 2013 |
Spoiler detection in TV program tweets S Jeon, S Kim, H Yu Information Sciences 329, 220-235, 2016 | 19 | 2016 |
Don't Be Spoiled by Your Friends: Spoiler Detection in TV Program Tweets S Jeon, S Kim, H Yu Seventh International AAAI Conference on Weblogs and Social Media (ICWSM13), 2013 | 13 | 2013 |
Method for transmitting and receiving fake communication data and terminal performing the same S Jeon, YUN Jeong-Han, W Kim, SEO Jungtaek, EK Park US Patent 9,338,646, 2016 | 7 | 2016 |
Centering-based Neural Coherence Modeling with Hierarchical Discourse Segments S Jeon, M Strube Proceedings of the 2020 Conference on Empirical Methods in Natural Language …, 2020 | 6 | 2020 |
Passive fingerprinting of scada in critical infrastructure network without deep packet inspection S Jeon, JH Yun, S Choi, WN Kim arXiv preprint arXiv:1608.07679, 2016 | 5 | 2016 |
Apparatus and method for protecting communication pattern of network traffic S Jeon, YUN Jeong-Han, W Kim, SEO Jungtaek, CS Kim US Patent 9,356,958, 2016 | 5 | 2016 |
Countering the influence of essay length in neural essay scoring S Jeon, M Strube Proceedings of the Second Workshop on Simple and Efficient Natural Language …, 2021 | 3 | 2021 |
Incremental neural lexical coherence modeling S Jeon, M Strube Proceedings of the 28th International Conference on Computational …, 2020 | 3 | 2020 |
Obfuscation of critical infrastructure network traffic using fake communication S Jeon, JH Yun, WN Kim Critical Information Infrastructures Security: 9th International Conference …, 2016 | 3 | 2016 |
Entity-based Neural Local Coherence Modeling S Jeon, M Strube Proceedings of the 60th Annual Meeting of the Association for Computational …, 2022 | | 2022 |
Apparatus and method for identifying web page for industrial control system S Jeon, YUN Jeong-Han, W Kim, EK Park, S Park US Patent 10,416,654, 2019 | | 2019 |
POSTER: Obfuscation of Critical Infrastructure Network Traffic using Fake Communication S Jeon, JH Yun, WN Kim 29th Annual Computer Security Applications Conference 2013 (ACSAC13), 2014 | | 2014 |