


default search action
Taeeun Kim
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Jiwon Kim, Jiwon Kang, Migyeong Yang, Chaehee Park, Taeeun Kim, Hayeon Song, Jinyoung Han:
Developing an AI-based Explainable Expert Support System for Art Therapy. ACM Trans. Interact. Intell. Syst. 14(4): 30:1-30:23 (2024) - [c14]Jiwon Kang, Jiwon Kim, Migyeong Yang, Chaehee Park, Taeeun Kim, Hayeon Song, Jinyoung Han:
SceneDAPR: A Scene-Level Free-Hand Drawing Dataset for Web-based Psychological Drawing Assessment. WWW 2024: 4630-4641 - 2023
- [c13]Jiwon Kim, Jiwon Kang, Taeeun Kim, Hayeon Song, Jinyoung Han:
AlphaDAPR: An AI-based Explainable Expert Support System for Art Therapy. IUI 2023: 19-31 - 2022
- [j6]Migyeong Yang, Kyungha Lee, Eunji Kim, Yeosol Song, Sewang Lee, Jiwon Kang, Jinyoung Han, Hayeon Song, Taeeun Kim:
Magic Brush: An AI-based Service for Dementia Prevention focused on Intrinsic Motivation. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-21 (2022) - 2021
- [j5]Taeeun Kim, Hwankuk Kim
:
A Design of Automated Vulnerability Information Management System for Secure Use of Internet-Connected Devices Based on Internet-Wide Scanning Methods. IEICE Trans. Inf. Syst. 104-D(11): 1805-1813 (2021) - 2020
- [c12]Dae-il Jang, Taeeun Kim, Dowon Kim:
Dynamic Analysis Tool for IoT Device. ICTC 2020: 1864-1867
2010 – 2019
- 2019
- [j4]Insu Oh
, Taeeun Kim, Kangbin Yim, Sun-Young Lee:
A Novel Message-Preserving Scheme with Format-Preserving Encryption for Connected Cars in Multi-Access Edge Computing. Sensors 19(18): 3869 (2019) - [c11]Hyeongmin Park, Taeeun Kim, Gaeul Kim, Wonyoung Jang, Kyungroul Lee, Sun-Young Lee:
Improvement of QR Code Access Control System Based on Lamport Hash Chain. IMIS 2019: 824-833 - 2018
- [j3]Eunhye Ko, Taeeun Kim, Hwankuk Kim
:
Management platform of threats information in IoT environment. J. Ambient Intell. Humaniz. Comput. 9(4): 1167-1176 (2018) - [j2]Sarang Na, Taeeun Kim, Hwankuk Kim
:
Service Identification of Internet-Connected Devices Based on Common Platform Enumeration. J. Inf. Process. Syst. 14(3): 740-750 (2018) - [j1]Hwankuk Kim
, Taeeun Kim, Dae-il Jang:
An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices. Symmetry 10(5): 151 (2018) - [c10]JeeSoo Jurn, Taeeun Kim, Hwankuk Kim
:
A Survey of Automated Root Cause Analysis of Software Vulnerability. IMIS 2018: 756-761 - 2017
- [c9]Sarang Na, Taeeun Kim, Hwankuk Kim
:
A Study on the Service Identification of Internet-Connected Devices Using Common Platform Enumeration. MUE/FutureTech 2017: 237-241 - [c8]Dae-il Jang, Taeeun Kim, Hwankuk Kim
:
A Design of IoT Protocol Fuzzer. MUE/FutureTech 2017: 242-246 - [c7]Eunhye Ko, Taeeun Kim, Hwankuk Kim
:
A Study on the Management Structure of Vulnerability Information in IoT Environment. MUE/FutureTech 2017: 247-251 - [c6]Kok-Kiong Yap, Murtaza Motiwala, Jeremy Rahe, Steve Padgett, Matthew J. Holliman, Gary Baldus, Marcus Hines, Taeeun Kim, Ashok Narayanan, Ankur Jain, Victor Lin, Colin Rice, Brian Rogan, Arjun Singh, Bert Tanaka, Manish Verma, Puneet Sood, Muhammad Mukarram Bin Tariq, Matt Tierney, Dzevad Trumic, Vytautas Valancius, Calvin Ying, Mahesh Kallahalla, Bikash Koley, Amin Vahdat:
Taking the Edge off with Espresso: Scale, Reliability and Programmability for Global Internet Peering. SIGCOMM 2017: 432-445 - 2016
- [c5]Sarang Na, Taeeun Kim, Hwankuk Kim
:
A Study on the Classification of Common Vulnerabilities and Exposures using Naïve Bayes. BWCCA 2016: 657-662 - [c4]Seungjae Lee
, Jin-Yub Lee, Il-Han Park, Jong-Yeol Park, Sung-Won Yun, Minsu Kim, Jong-Hoon Lee, Min-Seok Kim, Kangbin Lee, Taeeun Kim, Byungkyu Cho, Dooho Cho, Sangbum Yun, Jung-No Im, Hyejin Yim, Kyung-Hwa Kang, Suchang Jeon, Sungkyu Jo, Yang-Lo Ahn, Sung-Min Joe, Suyong Kim, Deok-kyun Woo, Jiyoon Park, Hyun Wook Park, Youngmin Kim, Jonghoon Park, Yongsu Choi, Makoto Hirano, Jeong-Don Ihm, Byunghoon Jeong, Seon-Kyoo Lee
, Moosung Kim, Hokil Lee, Sungwhan Seo, Hongsoo Jeon, Chan-ho Kim, Hyunggon Kim, Jintae Kim, Yongsik Yim, Hoosung Kim, Dae-Seok Byeon, Hyang-Ja Yang, Ki-Tae Park, Kyehyun Kyung, Jeong-Hyuk Choi:
7.5 A 128Gb 2b/cell NAND flash memory in 14nm technology with tPROG=640µs and 800MB/s I/O rate. ISSCC 2016: 138-139 - 2015
- [c3]Taeeun Kim, Hwankuk Kim
:
A system for detection of abnormal behavior in BYOD based on web usage patterns. ICTC 2015: 1288-1293 - [c2]Taeeun Kim:
A Study on the Detection of Abnormal Behavior and Vulnerability Analysis in BYOD. IoT 360 (2) 2015: 162-167 - 2014
- [c1]Taeeun Kim, Myoungsun Noh, Kyungho Chung, Chaetae Im:
A Study on Context Information Collection for Personal Mobile Device Identification in BYOD and Smart Work Environment. IoT360 (2) 2014: 104-109
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint