default search action
Hong Joo Lee
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j33]Vanessa Gonzalez Duque, Alexandra Marquardt, Yordanka Velikova, Lilian Lacourpaille, Antoine Nordez, Marion Crouzier, Hong Joo Lee, Diana Mateus, Nassir Navab:
Ultrasound segmentation analysis via distinct and completed anatomical borders. Int. J. Comput. Assist. Radiol. Surg. 19(7): 1419-1427 (2024) - [j32]Wei Zhang, Mingxuan Cai, Hong Joo Lee, Richard Evans, Chengyan Zhu, Chenghan Ming:
AI in Medical Education: Global situation, effects and challenges. Educ. Inf. Technol. 29(4): 4611-4633 (2024) - [j31]Hong Joo Lee, Yong Man Ro:
Defending Video Recognition Model Against Adversarial Perturbations via Defense Patterns. IEEE Trans. Dependable Secur. Comput. 21(4): 4110-4121 (2024) - [j30]Hong Joo Lee, Youngjoon Yu, Yong Man Ro:
Advancing Adversarial Training by Injecting Booster Signal. IEEE Trans. Neural Networks Learn. Syst. 35(9): 12665-12677 (2024) - 2023
- [j29]Hong Joo Lee, Yong Man Ro:
Robust Proxy: Improving Adversarial Robustness by Robust Proxy Learning. IEEE Trans. Inf. Forensics Secur. 18: 4021-4033 (2023) - 2022
- [j28]Min Seok Lee, Seok Woo Yang, Hong Joo Lee:
Weight attention layer-based document classification incorporating information gain. Expert Syst. J. Knowl. Eng. 39(1) (2022) - [j27]Youngjoon Yu, Hong Joo Lee, Hakmin Lee, Yong Man Ro:
Defending Person Detection Against Adversarial Patch Attack by Using Universal Defensive Frame. IEEE Trans. Image Process. 31: 6976-6990 (2022) - 2021
- [j26]Sungjune Park, Hong Joo Lee, Yong Man Ro:
Adversarially Robust Hyperspectral Image Classification via Random Spectral Sampling and Spectral Shape Encoding. IEEE Access 9: 66791-66804 (2021) - [j25]Hong Joo Lee, Minsik Lee, Habin Lee, Ruth Angelie Cruz:
Mining service quality feedback from social media: A computational analytics method. Gov. Inf. Q. 38(2): 101571 (2021) - [j24]Hong Joo Lee, Joon Yeon Choeh:
Motivations for Obtaining and Redeeming Coupons from a Coupon App: Customer Value Perspective. J. Theor. Appl. Electron. Commer. Res. 16(2): 45-57 (2021) - [j23]Jung Uk Kim, Seong-Tae Kim, Hong Joo Lee, Sangmin Lee, Yong Man Ro:
CUA Loss: Class Uncertainty-Aware Gradient Modulation for Robust Object Detection. IEEE Trans. Circuits Syst. Video Technol. 31(9): 3529-3543 (2021) - 2020
- [j22]Hong Joo Lee:
A Study of Consumer Repurchase Behaviors of Smartphones Using Artificial Neural Network. Inf. 11(9): 400 (2020) - [j21]Hong Joo Lee, Seong Tae Kim, Hakmin Lee, Yong Man Ro:
Lightweight and Effective Facial Landmark Detection using Adversarial Learning with Face Geometric Map Generative Network. IEEE Trans. Circuits Syst. Video Technol. 30(3): 771-780 (2020) - 2015
- [j20]Sung Joo Park, Jong Woo Kim, Hong Joo Lee, Hyunjung Park, Deugcheon Han, Peter A. Gloor:
Exploration of Online Culture Through Network Analysis of Wikipedia. Cyberpsychology Behav. Soc. Netw. 18(11): 674-681 (2015) - [j19]Hong Joo Lee:
A Study on Social Issue Solutions Using the "Internet of Things" (Focusing on a Crime Prevention Camera System). Int. J. Distributed Sens. Networks 11: 747593:1-747593:8 (2015) - [j18]Joon Yeon Choeh, Hong Joo Lee, Sung Joo Park:
A Personalized Approach for Recommending Useful Product Reviews Based on Information Gain. KSII Trans. Internet Inf. Syst. 9(5): 1702-1716 (2015) - 2014
- [j17]Joon Yeon Choeh, Hong Joo Lee, Eugene J. S. Won:
Exploring Time Aware Features in Microblog to Measure TV Ratings. IEICE Trans. Inf. Syst. 97-D(10): 2810-2813 (2014) - 2013
- [j16]Hong Joo Lee, Jaewon Choi, Jong Woo Kim, Sung Joo Park, Peter A. Gloor:
Communication, Opponents, and Clan Performance in Online Games: A Social Network Approach. Cyberpsychology Behav. Soc. Netw. 16(12): 878-883 (2013) - [j15]Hong Joo Lee:
A study on business opportunity for small smart devices in finance. Math. Comput. Model. 58(1-2): 172-177 (2013) - [j14]Hong Joo Lee:
A study on the promotion of the business service for regional retail store using smart technology. Pers. Ubiquitous Comput. 17(7): 1469-1474 (2013) - 2011
- [j13]Jaewon Choi, Hong Joo Lee, Yong Cheol Kim:
The Influence of Social Presence on Customer Intention to Reuse Online Recommender Systems: The Roles of Personalization and Product Type. Int. J. Electron. Commer. 16(1): 129-154 (2011) - [j12]Hong Joo Lee:
Analysis of Business Attributes in Information Technology Environments. J. Inf. Process. Syst. 7(2): 385-396 (2011) - [j11]Hong Joo Lee:
A Study on the Business Strategy of Smart Devices for Multimedia Contents. J. Inf. Process. Syst. 7(3): 543-548 (2011) - 2010
- [j10]Fengkun Liu, Hong Joo Lee:
Use of social network information to enhance collaborative filtering performance. Expert Syst. Appl. 37(7): 4772-4778 (2010) - 2009
- [j9]Hong Joo Lee, Jong Woo Kim, Joon Koh:
A contingent approach on knowledge portal design for R&D teams: Relative importance of knowledge portal functionalities. Expert Syst. Appl. 36(2): 3662-3670 (2009) - [j8]Hong Joo Lee:
A Review of IPTV Threats Based on the Value Chain. KSII Trans. Internet Inf. Syst. 3(2): 163-177 (2009) - 2008
- [j7]Joon Yeon Choeh, Hong Joo Lee:
Mobile push personalization and user experience. AI Commun. 21(2-3): 185-193 (2008) - 2007
- [j6]Sangkyun Kim, Hong Joo Lee:
A study on decision consolidation methods using analytic models for security systems. Comput. Secur. 26(2): 145-153 (2007) - [j5]Hong Joo Lee, Jong Woo Kim, Sung Joo Park:
Understanding collaborative filtering parameters for personalized recommendations in e-commerce. Electron. Commer. Res. 7(3-4): 293-314 (2007) - [j4]Hong Joo Lee, Sung Joo Park:
MONERS: A news recommender for the mobile web. Expert Syst. Appl. 32(1): 143-150 (2007) - [j3]Hong Joo Lee, Sangkyun Kim:
A study on the development methodology of the business model in ubiquitous technology. Int. J. Technol. Manag. 38(4): 424-438 (2007) - 2006
- [j2]Hong Joo Lee, Hyung Jun Ahn, Jong Woo Kim, Sung Joo Park:
Capturing and reusing knowledge in engineering change management: A case of automobile development. Inf. Syst. Frontiers 8(5): 375-394 (2006) - 2005
- [j1]Hyung Jun Ahn, Hong Joo Lee, Kyehyun Cho, Sung Joo Park:
Utilizing knowledge context in virtual collaborative work. Decis. Support Syst. 39(4): 563-582 (2005)
Conference and Workshop Papers
- 2022
- [c30]Taeheon Kim, Hong Joo Lee, Yong Man Ro:
Map: Multispectral Adversarial Patch to Attack Person Detection. ICASSP 2022: 4853-4857 - 2021
- [c29]Youngjoon Yu, Hong Joo Lee, Byeong Cheon Kim, Jung Uk Kim, Yong Man Ro:
Towards Robust Training of Multi-Sensor Data Fusion Network Against Adversarial Examples in Semantic Segmentation. ICASSP 2021: 4710-4714 - [c28]Hong Joo Lee, Yong Man Ro:
Adversarially Robust Multi-Sensor Fusion Model Training Via Random Feature Fusion For Semantic Segmentation. ICIP 2021: 339-343 - 2020
- [c27]Hakmin Lee, Hong Joo Lee, Seong Tae Kim, Yong Man Ro:
Robust Ensemble Model Training via Random Layer Sampling Against Adversarial Attack. BMVC 2020 - [c26]Hong Joo Lee, Jung Uk Kim, Sangmin Lee, Hak Gu Kim, Yong Man Ro:
Structure Boundary Preserving Segmentation for Medical Image With Ambiguous Boundary. CVPR 2020: 4816-4825 - [c25]Dae Hwi Choi, Hong Joo Lee, Sangmin Lee, Jung Uk Kim, Yong Man Ro:
Fake Video Detection With Certainty-Based Attention Network. ICIP 2020: 823-827 - [c24]Minsu Kim, Hong Joo Lee, Sangmin Lee, Yong Man Ro:
Robust Video Facial Authentication With Unsupervised Mode Disentanglement. ICIP 2020: 1321-1325 - [c23]Junho Kim, Minsu Kim, Jung Uk Kim, Hong Joo Lee, Sangmin Lee, Joanna Hong, Yong Man Ro:
Learning Style Correlation for Elaborate Few-Shot Classification. ICIP 2020: 1791-1795 - [c22]Minsu Kim, Joanna Hong, Junho Kim, Hong Joo Lee, Yong Man Ro:
Unsupervised Disentangling of Viewpoint and Residues Variations by Substituting Representations for Robust Face Recognition. ICPR 2020: 8952-8959 - [c21]Joanna Hong, Hong Joo Lee, Yelin Kim, Yong Man Ro:
Face Tells Detailed Expression: Generating Comprehensive Facial Expression Sentence Through Facial Action Units. MMM (2) 2020: 100-111 - 2019
- [c20]Hong Joo Lee, Hak Gu Kim, Hyenok Park, Dongkuk Shin, Yong Man Ro:
Region-guided adversarial learning for anatomical landmark detection in uterus ultrasound image. Medical Imaging: Image Processing 2019: 1094937 - 2018
- [c19]Hong Joo Lee, Minsik Lee, Habin Lee:
Understanding Public Healthcare Service Quality from Social Media. EGOV 2018: 40-47 - [c18]Hong Joo Lee, Wissam J. Baddar, Hak Gu Kim, Seong Tae Kim, Yong Man Ro:
Teacher and Student Joint Learning for Compact Facial Landmark Detection Network. MMM (1) 2018: 493-504 - 2016
- [c17]Ho Lee, Hong Joo Lee, Ruth Angelie Cruz, John Laurence Enriquez:
Electronic word of mouth (eWOM) in the movie industry. ICEC 2016: 7:1-7:7 - [c16]Jaewon Choi, Hong Joo Lee:
The effectiveness of user-centric social interfaces on evaluating mobile recommendations. ICEC 2016: 19:1-19:7 - 2015
- [c15]Hong Joo Lee:
A Study on a Methodology for Solving Social Problems Through Literature Review. ICEC 2015: 38:1-38:6 - 2009
- [c14]Jaewon Choi, Hong Joo Lee, Yong Cheol Kim:
The Influence of Social Presence on Evaluating Personalized Recommender Systems. PACIS 2009: 49 - 2008
- [c13]Hong Joo Lee, Jong Woo Kim, Joon Koh, Yunhee Lee:
Relative Importance of Knowledge Portal Functionalities: A Contingent Approach on Knowledge Portal Design for R&D Teams. HICSS 2008: 331 - 2007
- [c12]Christoph Kiefer, Abraham Bernstein, Hong Joo Lee, Mark Klein, Markus Stocker:
Semantic Process Retrieval with iSPARQL. ESWC 2007: 609-623 - 2006
- [c11]Sangkyun Kim, Hong Joo Lee:
Security Engineering Methodology Based on Problem Solving Theory. ICCSA (4) 2006: 639-648 - [c10]Hong Joo Lee, Choon Seong Leem, Sangkyun Kim:
A Study on the Development of Usability Evaluation Framework (Focusing on Digital TV). ICCSA (4) 2006: 716-725 - [c9]Heejun Park, Sangkyun Kim, Hong Joo Lee:
General Drawing of the Integrated Framework for Security Governance. KES (1) 2006: 1234-1241 - [c8]Hong Joo Lee, Choon Seong Leem, Sangkyun Kim:
A Study on Development of Business Factor in Ubiquitous Technology. KES (1) 2006: 1259-1266 - 2005
- [c7]Hong Joo Lee, Choon Seong Leem:
A Study on Value Chain in a Ubiquitous Computing Environment. ICCSA (4) 2005: 113-121 - [c6]Hong Joo Lee, Hee-Jun Park, Sangkyun Kim:
A Study on Authentication Mechanism Using Robot Vacuum Cleaner. ICCSA (4) 2005: 122-127 - [c5]Sangkyun Kim, Hong Joo Lee:
Cost-Benefit Analysis of Security Investments: Methodology and Case Study. ICCSA (3) 2005: 1239-1248 - [c4]Choon Seong Leem, Sangkyun Kim, Hong Joo Lee:
Assessment Methodology on Maturity Level of ISMS. KES (3) 2005: 609-615 - [c3]Hong Joo Lee, Sangkyun Kim, Choon Seong Leem:
CSFs for HCI in Ubiquitous Computing Environments. KES (3) 2005: 616-620 - [c2]Hong Joo Lee, Joon Yeon Choi, Sung Joo Park:
Context-Aware Recommendations on the Mobile Web. OTM Workshops 2005: 142-151 - 2004
- [c1]Sangkyun Kim, Hong Joo Lee, Choon Seong Leem:
Architecture of Authentication Mechanism for Emerging T-commerce Environments. PCM (1) 2004: 540-547
Informal and Other Publications
- 2024
- [i8]Kyu Ri Park, Hong Joo Lee, Jung Uk Kim:
Learning Trimodal Relation for Audio-Visual Question Answering with Missing Modality. CoRR abs/2407.16171 (2024) - 2023
- [i7]Hong Joo Lee, Youngjoon Yu, Yong Man Ro:
Advancing Adversarial Training by Injecting Booster Signal. CoRR abs/2306.15451 (2023) - [i6]Hong Joo Lee, Yong Man Ro:
Robust Proxy: Improving Adversarial Robustness by Robust Proxy Learning. CoRR abs/2306.15457 (2023) - 2022
- [i5]Youngjoon Yu, Hong Joo Lee, Hakmin Lee, Yong Man Ro:
Defending Against Person Hiding Adversarial Patch Attack with a Universal White Frame. CoRR abs/2204.13004 (2022) - 2020
- [i4]Hong Joo Lee, Seong Tae Kim, Hakmin Lee, Nassir Navab, Yong Man Ro:
Efficient Ensemble Model Generation for Uncertainty Estimation with Bayesian Approximation in Segmentation. CoRR abs/2005.10754 (2020) - [i3]Hakmin Lee, Hong Joo Lee, Seong Tae Kim, Yong Man Ro:
Robust Ensemble Model Training via Random Layer Sampling Against Adversarial Attack. CoRR abs/2005.10757 (2020) - [i2]Youngjoon Yu, Hong Joo Lee, Byeong Cheon Kim, Jung Uk Kim, Yong Man Ro:
Investigating Vulnerability to Adversarial Examples on Multimodal Data Fusion in Deep Learning. CoRR abs/2005.10987 (2020) - 2015
- [i1]Sung Joo Park, Jong Woo Kim, Hong Joo Lee, Hyunjung Park, Peter A. Gloor:
Behavioral Aspects of Social Network Analysis. CoRR abs/1503.00477 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint