default search action
Seong Soo Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j3]Sejun Kim
, Sungjae Kang
, Hyomin Choi, Seong Soo Kim, Kisung Seo
:
Keypoint Aware Robust Representation for Transformer-Based Re-Identification of Occluded Person. IEEE Signal Process. Lett. 30: 65-69 (2023)
2000 – 2009
- 2008
- [j2]Seong Soo Kim, A. L. Narasimha Reddy:
Statistical techniques for detecting traffic anomalies through packet header data. IEEE/ACM Trans. Netw. 16(3): 562-575 (2008) - [c12]Harkirat Singh, Xiangping Qin, Huai-Rong Shao, Chiu Ngo, Chang Yeul Kwon, Seong Soo Kim:
Support of Uncompressed Video Streaming Over 60GHz Wireless Networks. CCNC 2008: 243-248 - [c11]Harkirat Singh, Chang Yeul Kwon, Seong Soo Kim, Chiu Ngo:
IPTV over WirelessLAN: Promises and Challenges. CCNC 2008: 626-631 - [c10]Xiangping Qin, Pengfei Xia, Chiu Ngo, Harkirat Singh, Huai-Rong Shao, Huaning Niu, Chang Yeul Kwon, Guoping Fan, Seong Soo Kim:
Autonomous Coordinator Selection in Beamformed 60GHz Wireless Networks. WCNC 2008: 1815-1820 - [c9]Harkirat Singh, Huaning Niu, Xiangping Qin, Huai-Rong Shao, Chang Yeul Kwon, Guoping Fan, Seong Soo Kim, Chiu Ngo:
Supporting Uncompressed HD Video Streaming without Retransmissions over 60GHz Wireless Networks. WCNC 2008: 1939-1944 - 2007
- [c8]Huai-Rong Shao, Chiu Ngo, Harkirat Singh, Sandra Qin, Chang Yeul Kwon, Guoping Fan, Seong Soo Kim:
Adaptive Multi-beam Transmission of Uncompressed Video over 60GHz Wireless Systems. FGCN (1) 2007: 430-435 - 2006
- [j1]Seong Soo Kim, A. L. Narasimha Reddy:
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness. IEEE J. Sel. Areas Commun. 24(10): 1942-1954 (2006) - [c7]Seong Soo Kim, A. L. Narasimha Reddy:
An Evaluation of the Effectiveness of Measurement-based Anomaly Detection Techniques. ICDCS Workshops 2006: 6 - 2005
- [b1]Seong Soo Kim:
Real-time analysis of aggregate network traffic for anomaly detection. Texas A&M University, College Station, USA, 2005 - [c6]Seong Soo Kim, A. L. Narasimha Reddy:
Modeling network traffic as images. ICC 2005: 168-172 - [c5]Seong Soo Kim, A. L. Narasimha Reddy:
Real-time detection and containment of network attacks using QoS regulation. ICC 2005: 311-315 - [c4]Seong Soo Kim, A. L. Narasimha Reddy:
A study of analyzing network traffic as images in real-time. INFOCOM 2005: 2056-2067 - [c3]Seong Soo Kim, A. L. Narasimha Reddy:
NetViewer: A Network Traffic Visualization and Analysis Tool. LISA 2005: 185-196 - 2004
- [c2]Seong Soo Kim, A. L. Narasimha Reddy, Marina Vannucci:
Detecting Traffic Anomalies Using Discrete Wavelet Transform. ICOIN 2004: 951-961 - [c1]Seong Soo Kim, A. L. Narasimha Reddy, Marina Vannucci:
Detecting Traffic Anomalies through Aggregate Analysis of Packet Header Data. NETWORKING 2004: 1047-1059
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint