Apparatus and method for driving self-emitting display device ST Kim, MS Kim, HS Kim, EY Lee US Patent 6,265,833, 2001 | 52 | 2001 |
Design and implementation of mobile trusted module for trusted mobile computing M Kim, H Ju, Y Kim, J Park, Y Park IEEE Transactions on Consumer Electronics 56 (1), 134-140, 2010 | 51 | 2010 |
Efficient hardware architecture of SHA-256 algorithm for trusted mobile computing M Kim, J Ryou, S Jun Information Security and Cryptology: 4th International Conference, Inscrypt …, 2009 | 36 | 2009 |
Hardware implementation of the 3GPP KASUMI crypto algorithm HW Kim, YJ Park, MS Kim, HS Ryu Proceedings of the IEEK Conference, 317-320, 2002 | 30 | 2002 |
Security management server and image data managing method thereof HI Ju, YS Jeon, JH Han, KIM Geonwoo, SG Choi, MS Kim, YS Kim, ... US Patent 8,364,956, 2013 | 29 | 2013 |
An energy-efficient method for human activity recognition with segment-level change detection and deep learning CY Jeong, M Kim Sensors 19 (17), 3688, 2019 | 26 | 2019 |
Label-preserving data augmentation for mobile sensor data M Kim, CY Jeong Multidimensional Systems and Signal Processing 32 (1), 115-129, 2021 | 25 | 2021 |
Low power implementation of sha-1 algorithm for rfid system Y Choi, M Kim, T Kim, H Kim 2006 IEEE International Symposium on Consumer Electronics, 1-5, 2006 | 25 | 2006 |
Low power circuit architecture of AES crypto module for wireless sensor network MS Kim, J Kim, Y Choi World Academy of Science, Engineering and Technology 8, 2005 | 23 | 2005 |
Image photographing device and security management device of object tracking system and object tracking method MH Han, SW Park, HAN Jong-Wook, KIM Geonwoo, HI JU, SG Choi, ... US Patent App. 13/297,759, 2012 | 21 | 2012 |
Low-cost cryptographic circuits for authentication in radio frequency identification systems M Kim, J Ryou, Y Choi, S Jun 2006 IEEE International Symposium on Consumer Electronics, 1-5, 2006 | 21 | 2006 |
System architecture for real-time face detection on analog video camera M Kim, D Lee, KY Kim International Journal of Distributed Sensor Networks 11 (5), 251386, 2015 | 19 | 2015 |
Activity recognition using fully convolutional network from smartphone accelerometer M Kim, CY Jeong, HC Shin 2018 International conference on information and communication technology …, 2018 | 17 | 2018 |
An efficient data integrity scheme for preventing falsification of car black box M Kim, CY Jeong 2013 International Conference on ICT Convergence (ICTC), 1020-1021, 2013 | 17 | 2013 |
Apparatus and method for protecting privacy information of surveillance image SG Choi, KIM Geonwoo, HAN Jong-Wook, HS Cho, JH Han, HI JU, ... US Patent App. 12/622,681, 2011 | 17 | 2011 |
RSA cryptographic processing apparatus for IC card MS Kim, HW Kim, YJ Choi, YS Park, KI Chung, HS Ryu US Patent 7,197,141, 2007 | 17 | 2007 |
Low power AES hardware architecture for radio frequency identification M Kim, J Ryou, Y Choi, S Jun Advances in Information and Computer Security: First International Workshop …, 2006 | 16 | 2006 |
Sensor-data augmentation for human activity recognition with time-warping and data masking CY Jeong, HC Shin, M Kim Multimedia Tools and Applications 80 (14), 20991-21009, 2021 | 15 | 2021 |
Security video transmission apparatus, video data reception apparatus, and key generation method thereof YS Kim, YS Jeon, MS Kim, HAN Jong-Wook, KIM Geonwoo, JH Han, ... US Patent App. 13/331,280, 2012 | 15 | 2012 |
Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing M Kim, DG Lee, J Ryou Personal and ubiquitous computing 17, 921-932, 2013 | 14 | 2013 |