Остановите войну!
for scientists:
default search action
Dongkyu Kim
- > Home > Persons > Dongkyu Kim
Publications
- 2020
- [j18]Seung-Hun Nam, Seung-Min Mun, Wonhyuk Ahn, Dongkyu Kim, In-Jae Yu, Wook-Hyung Kim, Heung-Kyu Lee:
NSCT-Based Robust and Perceptual Watermarking for DIBR 3D Images. IEEE Access 8: 93760-93781 (2020) - 2019
- [j17]Seung-Min Mun, Seung-Hun Nam, Haneol Jang, Dongkyu Kim, Heung-Kyu Lee:
Finding robust domain from attacks: A learning framework for blind watermarking. Neurocomputing 337: 191-202 (2019) - [c34]Seung-Hun Nam, Wonhyuk Ahn, Seung-Min Mun, Jin-Seok Park, Dongkyu Kim, In-Jae Yu, Heung-Kyu Lee:
Content-Aware Image Resizing Detection Using Deep Neural Network. ICIP 2019: 106-110 - [c33]Seung-Hun Nam, Jin-Seok Park, Dongkyu Kim, In-Jae Yu, Tae-Yeon Kim, Heung-Kyu Lee:
Two-Stream Network for Detecting Double Compression of H.264 Videos. ICIP 2019: 111-115 - 2018
- [j16]Jong-Uk Hou, Dongkyu Kim, Wonhyuk Ahn, Heung-Kyu Lee:
Copyright Protections of Digital Content in the Age of 3D Printer: Emerging Issues and Survey. IEEE Access 6: 44082-44093 (2018) - [j15]Han-Ul Jang, Hak-Yeol Choi, Jeongho Son, Dongkyu Kim, Jong-Uk Hou, Sunghee Choi, Heung-Kyu Lee:
Cropping-resilient 3D mesh watermarking based on consistent segmentation and mesh steganalysis. Multim. Tools Appl. 77(5): 5685-5712 (2018) - [j14]Dongkyu Kim, Han-Ul Jang, Seung-Min Mun, Sunghee Choi, Heung-Kyu Lee:
Median Filtered Image Restoration and Anti-Forensics Using Adversarial Networks. IEEE Signal Process. Lett. 25(2): 278-282 (2018) - 2017
- [j12]Han-Ul Jang, Dongkyu Kim, Seung-Min Mun, Sunghee Choi, Heung-Kyu Lee:
DeepPore: Fingerprint Pore Extraction Using Deep Convolutional Neural Networks. IEEE Signal Process. Lett. 24(12): 1808-1812 (2017) - [c31]Jeongho Son, Dongkyu Kim, Hak-Yeol Choi, Han-Ul Jang, Sunghee Choi:
Perceptual 3D Watermarking Using Mesh Saliency. ICISA 2017: 315-322 - [c30]Han-Ul Jang, Hak-Yeol Choi, Dongkyu Kim, Jeongho Son, Heung-Kyu Lee:
Fingerprint Spoof Detection Using Contrast Enhancement and Convolutional Neural Networks. ICISA 2017: 331-338 - [c29]Hak-Yeol Choi, Han-Ul Jang, Jeongho Son, Dongkyu Kim, Heung-Kyu Lee:
Content Recapture Detection Based on Convolutional Neural Networks. ICISA 2017: 339-346 - [c28]Dongkyu Kim, Han-Ul Jang, Hak-Yeol Choi, Jeongho Son, In-Jae Yu, Heung-Kyu Lee:
Improved 3D Mesh Steganalysis Using Homogeneous Kernel Map. ICISA 2017: 358-365 - [c27]Hak-Yeol Choi, Han-Ul Jang, Dongkyu Kim, Jeongho Son, Seung-Min Mun, Sunghee Choi, Heung-Kyu Lee:
Detecting composite image manipulation based on deep neural networks. IWSSIP 2017: 1-5 - [i2]Seung-Min Mun, Seung-Hun Nam, Han-Ul Jang, Dongkyu Kim, Heung-Kyu Lee:
A Robust Blind Watermarking Using Convolutional Neural Network. CoRR abs/1704.03248 (2017) - 2016
- [c24]Jong-Uk Hou, Dongkyu Kim, Hyun-Ji Song, Heung-Kyu Lee:
Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye. IH&MMSec 2016: 169-174 - 2006
- [j2]Taehee Lee, Ig-hoon Lee, Suekyung Lee, Sang-goo Lee, Dongkyu Kim, Jonghoon Chun, Hyunja Lee, Junho Shim:
Building an operational product ontology system. Electron. Commer. Res. Appl. 5(1): 16-28 (2006) - 2005
- [c15]Dongkyu Kim, Sang-goo Lee, Junho Shim, Jonghoon Chun, Zoonky Lee, Heungsun Park:
Practical Ontology Systems for Enterprise Application. ASIAN 2005: 79-89 - [c14]Ig-hoon Lee, Suekyung Lee, Taehee Lee, Sang-goo Lee, Dongkyu Kim, Jonghoon Chun, Hyunja Lee, Junho Shim:
Practical Issues for Building a Product Ontology System. DEEC 2005: 16-25 - [c13]Hyunja Lee, Junho Shim, Dongkyu Kim:
Ontological Modeling of e-Catalogs using EER and Description Logics. DEEC 2005: 125-131 - [c12]Dongkyu Kim, Sang-goo Lee, Jonghoon Chun, Zoonky Lee, Heungsun Park:
A Practical Ontology for Product Information Management. iiWAS 2005: 217-222 - 2004
- [j1]Jinwook Choi, Jonghoon Chun, Kangsun Lee, Sang-goo Lee, Donghoon Shin, Sookyung Hyun, Daehee Kim, Dongkyu Kim:
MobileNurse: hand-held information system for point of nursing care. Comput. Methods Programs Biomed. 74(3): 245-254 (2004) - [c10]Jonghoon Chun, Jae-Young Oh, Sedong Kwon, Dongkyu Kim:
Simulating the Effectiveness of Using Association Rules for Recommendation Systems. AsiaSim 2004: 306-314 - [c9]Dongkyu Kim, Yuan-Chi Chang, Juhnyoung Lee, Sang-goo Lee:
Ontological Approaches to Enterprise Applications. ER 2004: 838-840 - [c6]Dongkyu Kim, Sang-goo Lee, Jonghoon Chun, Juhnyoung Lee:
A Semantic Classification Model for E-Catalogs. CEC 2004: 85-92 - 2002
- [c4]Dongkyu Kim, Jaebum Kim, Sang-goo Lee:
Catalog Integration for Electronic Commerce through Category-Hierarchy Merging Technique. RIDE 2002: 28-33 - 2000
- [c2]Jihye Jung, Dongkyu Kim, Sang-goo Lee, Chisu Wu, Kapsoo Kim:
EE-CAT: extended electronic catalog for dynamic and flexible electronic commerce. IRMA Conference 2000: 303-307 - 1999
- [c1]Sang-goo Lee, Chisu Wu, Kapsoo Kim, Dongkyu Kim, Woochang Shin:
Digital Catalog Library: A Shared Repository of Online Catalogs for Electronic Commerce. WECWIS 1999: 84-86
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-12-08 00:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint