• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Detect ]" (118)
  1. 31. A Comparative Study on the Optimal Model for abnormal Detection event of Heart Rate Time Series Data Based on the Correlation between PPG and ECG
    Jin-soo Kim, Kang-yoon Lee, Vol. 20, No. 6, pp. 137-142, Dec. 2019
    10.7472/jksii.2019.20.6.137
    Keywords: Photoplethysmography(PPG), Electrocardiogram(ECG), Abnormal event detection, SVM, LSTM
  2. 32. CNN-based Shadow Detection Method using Height map in 3D Virtual City Model
    Hee Jin Yoon, Ju Wan Kim, In Sung Jang, Byung-Dai Lee, Nam-Gi Kim, Vol. 20, No. 6, pp. 55-63, Dec. 2019
    10.7472/jksii.2019.20.6.55
    Keywords: shadow detection, deep-learning
  3. 33. An Efficient BotNet Detection Scheme Exploiting Word2Vec and Accelerated Hierarchical Density-based Clustering
    Taeil Lee, Kwanhyun Kim, Jihyun Lee, Suchul Lee, Vol. 20, No. 6, pp. 11-20, Dec. 2019
    10.7472/jksii.2019.20.6.11
    Keywords: Botnet Detection, Word2vec, clustering, Skip-gram
  4. 34. Consortium Blockchain based Forgery Android APK Discrimination DApp using Hyperledger Composer
    Hyung-Woo Lee, Hanseong Lee, Vol. 20, No. 5, pp. 9-18, Oct. 2019
    10.7472/jksii.2019.20.5.9
    Keywords: Android Mobile APK, Detection DApp, Forgery Detection, Blockchain, Hyperledger Composer
  5. 35. A Study on the Pipe Position Estimation in GPR Images Using Deep Learning Based Convolutional Neural Network
    Jihun Chae, Hyoung-yong Ko, Byoung-gil Lee, Namgi Kim, Vol. 20, No. 4, pp. 39-46, Aug. 2019
    10.7472/jksii.2019.20.4.39
    Keywords: sink holes, pipe, GPR, Image recognition, underground detection, CNN, deep-learning
  6. 36. Identification of Counterfeit Android Malware Apps using Hyperledger Fabric Blockchain
    Sumin Hwang, Hyung-Woo Lee, Vol. 20, No. 2, pp. 61-68, Apr. 2019
    10.7472/jksii.2019.20.2.61
    Keywords: Blockchain, Hyperledger Fabric, Android Mobile App, Malicious Counterfeit App Detection.
  7. 37. A Method for 3D Human Pose Estimation based on 2D Keypoint Detection using RGB-D information
    Seohee Park, Myunggeun Ji, Junchul Chun, Vol. 19, No. 6, pp. 41-51, Dec. 2018
    10.7472/jksii.2018.19.6.41
    Keywords: video surveillance, Object Detection, Keypoint Detection, Human Pose Estimation, Deep Learning
  8. 38. Visualization of Malwares for Classification Through Deep Learning
    Hyeonggyeom Kim, Seokmin Han, Suchul Lee, Jun-Rak Lee, Vol. 19, No. 5, pp. 67-75, Oct. 2018
    10.7472/jksii.2018.19.5.67
    Keywords: Malware visualization, mawlare detection and classification, Deep Learning, CNN
  9. 39. Extraction of Network Threat Signatures Using Latent Dirichlet Allocation
    Sungil Lee, Suchul Lee, Jun-Rak Lee, Heung-youl Youm, Vol. 19, No. 1, pp. 1-10, Feb. 2018
    10.7472/jksii.2018.19.1.1
    Keywords: LDA, network threat detection, Intrusion Detection System, signature
  10. 40. Event Detection System Using Twitter Data
    Tae Soo Park, Ok-Ran Jeong, Vol. 17, No. 6, pp. 153-0, Dec. 2016
    10.7472/jksii.2016.17.6.153
    Keywords: Event Detection, Social Network, Social Media Contents