default search action
Byung kwan Lee
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Eun Hee Lee, Taejun (David) Lee, Byung-Kwan Lee:
Understanding the role of new media literacy in the diffusion of unverified information during the COVID-19 pandemic. New Media Soc. 26(9): 5195-5218 (2024) - [c23]Byung-Kwan Lee, Beomchan Park, Chae Won Kim, Yong Man Ro:
CoLLaVO: Crayon Large Language and Vision mOdel. ACL (Findings) 2024: 1121-1138 - [c22]Byung-Kwan Lee, Beomchan Park, Chae Won Kim, Yong Man Ro:
MoAI: Mixture of All Intelligence for Large Language and Vision Models. ECCV (49) 2024: 273-302 - [c21]Byung-Kwan Lee, Sangyun Chung, Chae Won Kim, Beomchan Park, Yong Man Ro:
TroL: Traversal of Layers for Large Language and Vision Models. EMNLP 2024: 11314-11342 - [i11]Byung-Kwan Lee, Beomchan Park, Chae Won Kim, Yong Man Ro:
CoLLaVO: Crayon Large Language and Vision mOdel. CoRR abs/2402.11248 (2024) - [i10]Byung-Kwan Lee, Beomchan Park, Chae Won Kim, Yong Man Ro:
MoAI: Mixture of All Intelligence for Large Language and Vision Models. CoRR abs/2403.07508 (2024) - [i9]Byung-Kwan Lee, Chae Won Kim, Beomchan Park, Yong Man Ro:
Meteor: Mamba-based Traversal of Rationale for Large Language and Vision Models. CoRR abs/2405.15574 (2024) - [i8]Byung-Kwan Lee, Sangyun Chung, Chae Won Kim, Beomchan Park, Yong Man Ro:
TroL: Traversal of Layers for Large Language and Vision Models. CoRR abs/2406.12246 (2024) - [i7]Youngjoon Yu, Sangyun Chung, Byung-Kwan Lee, Yong Man Ro:
SPARK: Multi-Vision Sensor Perception and Reasoning Benchmark for Large-scale Vision-Language Models. CoRR abs/2408.12114 (2024) - [i6]Byung-Kwan Lee, Sangyun Chung, Chae Won Kim, Beomchan Park, Yong Man Ro:
Phantom of Latent for Large Language and Vision Models. CoRR abs/2409.14713 (2024) - 2023
- [c20]Junho Kim, Byung-Kwan Lee, Yong Man Ro:
Demystifying Causal Features on Adversarial Examples and Causal Inoculation for Robust Network by Adversarial Instrumental Variable Regression. CVPR 2023: 12032-12042 - [c19]Byung-Kwan Lee, Junho Kim, Yong Man Ro:
Mitigating Adversarial Vulnerability through Causal Parameter Estimation by Adversarial Double Machine Learning. ICCV 2023: 4476-4486 - [c18]Yeonju Kim, Junho Kim, Byung-Kwan Lee, Sebin Shin, Yong Man Ro:
Mitigating Dataset Bias in Image Captioning Through Clip Confounder-Free Captioning Network. ICIP 2023: 1720-1724 - [i5]Junho Kim, Byung-Kwan Lee, Yong Man Ro:
Demystifying Causal Features on Adversarial Examples and Causal Inoculation for Robust Network by Adversarial Instrumental Variable Regression. CoRR abs/2303.01052 (2023) - [i4]Byung-Kwan Lee, Junho Kim, Yong Man Ro:
Mitigating Adversarial Vulnerability through Causal Parameter Estimation by Adversarial Double Machine Learning. CoRR abs/2307.07250 (2023) - [i3]Junho Kim, Byung-Kwan Lee, Yong Man Ro:
Causal Unsupervised Semantic Segmentation. CoRR abs/2310.07379 (2023) - 2022
- [j16]Byung-Kwan Lee, Hwan-Ho Noh, Eun Yeong Doh, Hye Bin Rim:
Rejected or ignored?: the effect of social exclusion on Instagram use motivation and behaviour. Behav. Inf. Technol. 41(15): 3177-3190 (2022) - [j15]YiNa Jeong, SuRak Son, ByungKwan Lee, SuHee Lee:
The Braking-Pressure and Driving-Direction Determination System (BDDS) Using Road Roughness and Passenger Conditions of Surrounding Vehicles. Sensors 22(12): 4414 (2022) - [c17]Byung-Kwan Lee, Junho Kim, Yong Man Ro:
Masking Adversarial Damage: Finding Adversarial Saliency for Robust and Sparse Network. CVPR 2022: 15105-15115 - [i2]Junho Kim, Byung-Kwan Lee, Yong Man Ro:
Distilling Robust and Non-Robust Features in Adversarial Examples by Information Bottleneck. CoRR abs/2204.02735 (2022) - [i1]Byung-Kwan Lee, Junho Kim, Yong Man Ro:
Masking Adversarial Damage: Finding Adversarial Saliency for Robust and Sparse Network. CoRR abs/2204.02738 (2022) - 2021
- [j14]Taejun (David) Lee, Seulki Lee-Geiller, Byung-Kwan Lee:
A validation of the modified democratic e-governance website evaluation model. Gov. Inf. Q. 38(4): 101616 (2021) - [c16]Junho Kim, Byung-Kwan Lee, Yong Man Ro:
Distilling Robust and Non-Robust Features in Adversarial Examples by Information Bottleneck. NeurIPS 2021: 17148-17159 - 2020
- [j13]Taejun (David) Lee, Seulki Lee-Geiller, Byung-Kwan Lee:
Are pictures worth a thousand words? The effect of information presentation type on citizen perceptions of government websites. Gov. Inf. Q. 37(3): 101482 (2020) - [j12]Taejun (David) Lee, Byung-Kwan Lee, Seulki Lee-Geiller:
The effects of information literacy on trust in government websites: Evidence from an online experiment. Int. J. Inf. Manag. 52: 102098 (2020) - [c15]SuRak Son, YiNa Jeong, ByungKwan Lee:
A Driving Decision Strategy(DDS) Based on Machine learning for an autonomous vehicle. ICOIN 2020: 264-266 - [c14]KyungDeuk Kim, SuRak Son, ByungKwan Lee:
Autonomous Vehicles Diagnosis Platform(AVDP) based on deep learning and loopback. ICOIN 2020: 687-689
2010 – 2019
- 2019
- [j11]KyungDeuk Kim, SuRak Son, YiNa Jeong, ByungKwan Lee:
A Deep Learning Part-diagnosis Platform(DLPP) based on an In-vehicle On-board gateway for an Autonomous Vehicle. KSII Trans. Internet Inf. Syst. 13(8): 4123-4141 (2019) - [j10]SuRak Son, YiNa Jeong, ByungKwan Lee:
An Optimal Driving Support Strategy(ODSS) for Autonomous Vehicles based on an Genetic Algorithm. KSII Trans. Internet Inf. Syst. 13(12): 5842-5861 (2019) - [j9]YiNa Jeong, SuRak Son, Byung kwan Lee:
The Lightweight Autonomous Vehicle Self-Diagnosis (LAVS) Using Machine Learning Based on Sensors and Multi-Protocol IoT Gateway. Sensors 19(11): 2534 (2019) - [j8]SuRak Son, YiNa Jeong, Byung kwan Lee:
An Audification and Visualization System (AVS) of an Autonomous Vehicle for Blind and Deaf People Based on Deep Learning. Sensors 19(22): 5035 (2019) - 2017
- [j7]YiNa Jeong, Eun-Hee Jeong, Byung kwan Lee:
An App Visualization design based on IoT Self-diagnosis Micro Control Unit for car accident prevention. KSII Trans. Internet Inf. Syst. 11(2): 1005-1018 (2017) - 2016
- [j6]Byung kwan Lee, Eun-Hee Jeong:
A Black Hole Detection Protocol Design based on a Mutual Authentication Scheme on VANET. KSII Trans. Internet Inf. Syst. 10(3): 1467-1480 (2016) - 2015
- [j5]Nguyen Thuy An, Cong-Thinh Huynh, ByungKwan Lee, Choong Seon Hong, Eui-Nam Huh:
An efficient block classification for media healthcare service in mobile cloud computing. Multim. Tools Appl. 74(14): 5209-5223 (2015) - [c13]ByungKwan Lee, Eun-Hee Jeong, JeongAh Kim:
A Disease Inference Scheme based on Fuzzy Logic for Patient's-customized Healthcare. PACRIM 2015: 413-416 - 2014
- [j4]Eun-Hee Jeong, Byung kwan Lee:
An IP Traceback Protocol using a Compressed Hash Table, a Sinkhole Router and Data Mining based on Network Forensics against Network Attacks. Future Gener. Comput. Syst. 33: 42-52 (2014)
2000 – 2009
- 2006
- [c12]Byung kwan Lee, Seung Hae Yang, Dong-Hyuck Kwon, Dai-Youn Kim:
PGNIDS(Pattern-Graph Based Network Intrusion Detection System) Design. ICCSA (3) 2006: 38-47 - [c11]Kwang-Baek Kim, Byung-Kwan Lee, Soon-Ho Kim:
Enhanced Fuzzy Single Layer Learning Algorithm Using Automatic Tuning of Threshold. ICCSA (3) 2006: 172-177 - [c10]Byung kwan Lee, Chang-Min Kim, Dae-won Shin, Seung Hae Yang:
A HIICA(Highly-Improved Intra CA) Design for M-Commerce. ICCSA (3) 2006: 261-268 - 2005
- [j3]Byung kwan Lee, Seung Hae Yang, Tai-Chi Lee:
A SEEP (Security Enhanced Electronic Payment) Protocol Design Using 3BC, ECC (F), and HECC Algorithm. Int. J. Bus. Data Commun. Netw. 1(4): 66-80 (2005) - [j2]Dongyoung Sohn, Byung-Kwan Lee:
Dimensions of Interactivity: Differential Effects of Social and Psychological Factors. J. Comput. Mediat. Commun. 10(3) (2005) - [c9]Byung kwan Lee, Tai-Chi Lee, Seung Hae Yang:
A MEP (Mobile Electronic Payment) and IntCA Protocol Design. HPCC 2005: 331-339 - [c8]Byung kwan Lee, Am Sok Oh, Eun-Hee Jeong:
HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment. ICCSA (2) 2005: 322-331 - [c7]Byung kwan Lee, Am Sok Oh, Eun-Hee Jeong:
HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment. ICCSA (2) 2005: 585-594 - [c6]Byung kwan Lee, Tai-Chi Lee, Seung Hae Yang:
HESSL (Highly Enhanced Security Socket Layer) Protocol. CEC 2005: 456-460 - 2004
- [j1]Byung kwan Lee, Ji-Young Hong, Wei-Na Lee:
How Attitude Toward the Web Site Influences Consumer Brand Choice and Confidence While Shopping Online. J. Comput. Mediat. Commun. 9(2): 0 (2004) - [c5]Byung kwan Lee, Tai-Chi Lee, Seung Hae Yang:
An ASEP (Advanced Secure Electronic Payment) Protocol Design Using 3BC and ECC (F^2) Algorithm. EEE 2004: 341-346 - [c4]Mi-Gyung Cho, Am Sok Oh, Byung kwan Lee:
A Feature-Based Algorithm for Recognizing Gestures on Portable Computers. ICCSA (1) 2004: 33-40 - [c3]Byung kwan Lee, Tai-Chi Lee, Seung Hae Yang:
A HSEP (Highly Secure Electronic Payment) Protocol Design using HECC Algorithm. iiWAS 2004 - 2003
- [c2]In-Seock Cho, Byung kwan Lee, Tai-Chi Lee:
An ISEP (Improved Secure Electronic Payment) Protocol Design Using 3BC Algorithm. Security and Management 2003: 78-84 - [c1]Byung kwan Lee, Am-suk Oh:
Performance Evaluation of a Relocation Method for Mobile Computing Maintaining Data Consistency. International Conference on Computational Science 2003: 510-517
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint