default search action
Hae Young Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j20]Hae Young Lee, Jin Myoung Kim:
Systematic Detection of State Variable Corruptions in Discrete Event System Specification Based Simulation. IEICE Trans. Inf. Syst. 103-D(7): 1769-1772 (2020) - [j19]Jin Myoung Kim, Hae Young Lee:
Node Density Loss Resilient Report Generation Method for the Statistical Filtering Based Sensor Networks. IEICE Trans. Inf. Syst. 103-D(9): 2007-2010 (2020) - [j18]Jin Myoung Kim, Hae Young Lee:
An Adaptive Key Redistribution Method for Filtering-based Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 14(6): 2518-2533 (2020)
2010 – 2019
- 2019
- [c32]Ji Su Ha, Su Hyun Kim, Sang Hee Lim, Taehoon Ko, Sae Won Choi, Hae Young Lee, Kyung Hwan Kim:
Introduction of a Program to Improve the Information Sharing System of Food Allergy Patients. MedInfo 2019: 1674-1675 - [c31]Hye Sook Lee, Da Na Jeong, Su In Lee, Shin Hae Lee, Kyung Hwan Kim, Hae Young Lee, Hyun Jai Cho, Sae Won Choi, Taehoon Ko:
Result and Effectiveness of Malicious E-mail Response Training in a Hospital. MedInfo 2019: 1957 - 2018
- [c30]Hyung-Jong Kim, Hae Young Lee:
A Study on the Privacy Protection Layer for Android IoT Services (Lightning Talk). ICSSA 2018: 53-54 - [c29]Hae Young Lee, Hyun Min Park, Kyu Don Hwang, GyeongTae Min, Young Sun Park:
Building a DNS Security Range in a Closed Network (Lightning Talk). ICSSA 2018: 90 - 2017
- [c28]Min Jin Kwon, Gowoon Kwak, Siyoung Jun, Hyung-Jong Kim, Hae Young Lee:
Enriching Security Education Hands-on Labs with Practical Exercises. ICSSA 2017: 100-103 - [c27]Hyung-Jong Kim, Hae Young Lee:
A Quantification of Effectiveness of Simulation Models by Managing Cost of Development. ICSSA 2017: 110 - [c26]Hae Young Lee, Young Sun Park:
Common Requirements for Web Application Vulnerability Scanners for the Internet of Things. ICSSA 2017: 111 - [c25]Ra-Jeong Moon, Kyu-Min Shim, Hae Young Lee, Hyung-Jong Kim:
Log generation for coding behavior analysis: For focusing on how kids are coding not what they are coding. SANER 2017: 575-576 - [c24]Hae Young Lee:
Buffer overflow detection in DEVS simulation using canaries. WSC 2017: 4554-4555 - 2016
- [c23]Hae Young Lee, So-Jin Lee:
Poster Abstract: Modeling, Simulation and Verification Environment for Engineering Cyber-Physical Systems Based on Discrete Event System Specification. ICCPS 2016: 44:1 - [c22]Su Yeon Choi, Hae Young Lee:
Toward Automated Scanning for Code Injection Vulnerabilities in HTML5-Based Mobile Apps. ICSSA 2016: 24 - [c21]Ji-Hyeon Yoon, Jeong Oh Kye, Yongdae Kim, Hae Young Lee:
Decoder-Free Sino-Korean Shellcode. ICSSA 2016: 75-78 - [c20]Su Yeon Choi, Jee Ah Lee, Wonhee Lee, Hae Young Lee:
COIN-VASE: Code Injection Vulnerability Scanning Environment for HTML5-Based Android Apps. MobiCASE 2016: 144-146 - [c19]Hae Young Lee, So-Jin Lee, SeungHyun Byun, Hyung-Jong Kim:
Simulation model cost database. WSC 2016: 3714-3715 - 2015
- [j17]Hae Young Lee:
Fuzzy-Based Adaptive Countering Method against False Data Injection Attacks in Wireless Sensor Networks. IEICE Trans. Inf. Syst. 98-D(4): 964-967 (2015) - [j16]Hae Young Lee:
Fuzzy-Based Adaptive Countering Method against False Endorsement Insertion Attacks in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 618529:1-618529:11 (2015) - [c18]E. Jin Kim, Hae Young Lee:
Web-in-the-loop simulation framework for supporting CORS-based development. SpringSim (Posters) 2015: 13-14 - 2014
- [j15]Al-Sakib Khan Pathan, Zubair Md. Fadlullah, Mostafa Fouda, Hae Young Lee:
Defending against wireless network intrusion. J. Comput. Syst. Sci. 80(3): 499-501 (2014) - [c17]Ji-Hyeon Yoon, Hae Young Lee:
Nondeterministic and elapsed-time-sensitive DEVS. SpringSim (Posters) 2014: 5 - 2013
- [j14]Ingeol Chun, Jeongmin Park, Hae Young Lee, Wontae Kim, Seung-Min Park, Eunseok Lee:
An agent-based self-adaptation architecture for implementing smart devices in Smart Space. Telecommun. Syst. 52(4): 2335-2346 (2013) - [c16]Hae Young Lee, Han Moi Sim, Won Hyung Lee:
Digital Media Art Applying Physical Game Technology Using Gesture Recognition. HCI (29) 2013: 273-276 - [c15]Hae Young Lee:
Towards Model Checking of Simulation Models for Embedded System Development. ICPADS 2013: 452-453 - 2012
- [c14]Wontae Kim, Ingeol Chun, Soo-Hyung Lee, Hae Young Lee, Jin Myoung Kim:
WiP Abstract: From Design to Operation of a Large-Scale CPS. ICCPS 2012: 215 - 2011
- [j13]Hae Young Lee, Tae Ho Cho:
Optimized Fuzzy Adaptive Filtering for Ubiquitous Sensor Networks. IEICE Trans. Commun. 94-B(6): 1648-1656 (2011) - [j12]Jin Myoung Kim, Youngshin Han, Hae Young Lee, Tae Ho Cho:
Path Renewal Method in Filtering Based Wireless Sensor Networks. Sensors 11(2): 1396-1404 (2011) - [c13]Han Choi, Sung Deok Cha, Jae Yeon Jo, Junbeom Yoo, Hae Young Lee, Wontae Kim:
Formal Verification of DEV&DESS Formalism Using Symbolic Model Checker HyTech. FGIT-CA/CES3 2011: 112-121 - [c12]Hae Young Lee, Ingeol Chun, Won-Tae Kim:
DVML: DEVS-Based Visual Modeling Language for Hybrid Systems. FGIT-CA/CES3 2011: 122-127 - [c11]Jin Myoung Kim, Hae Young Lee, Ingeol Chun, Wontae Kim, Seung-Min Park, Tae Ho Cho:
Location Based Hierarchical Secure Multicast Group Building in Wireless Sensor Networks. MUE 2011: 28-32 - 2010
- [j11]Hee Suk Seo, Hae Young Lee, Seung-Jae Lee, Deok-Gyu Lee:
Fuzzy-Based Filtering Solution Selection Method For Dynamic Sensor Networks1. Intell. Autom. Soft Comput. 16(4): 579-592 (2010) - [j10]Hae Young Lee, Tae Ho Cho:
A Scheme for Adaptively Countering Application Layer Security Attacks in Wireless Sensor Networks. IEICE Trans. Commun. 93-B(7): 1881-1889 (2010) - [j9]Hae Young Lee, Seung-Min Park, Tae Ho Cho:
Simulation Modeling of SAM Fuzzy Logic Controllers. IEICE Trans. Inf. Syst. 93-D(7): 1984-1986 (2010) - [j8]Hyung-Jong Kim, Huy Kang Kim, Hae Young Lee:
Security Requirement Representation Method for Confidence of Systems and Networks. Int. J. Softw. Eng. Knowl. Eng. 20(1): 49-71 (2010) - [j7]Sang Jin Lee, Hae Young Lee, Tae Ho Cho:
Environment-based Selection Method for En-route Filtering Scheme using Fuzzy Logic. J. Networks 5(3): 292-299 (2010) - [c10]Chungman Seo, Youngshin Han, Hae Young Lee, Jason J. Jung, Chilgee Lee:
Implementation of Cloud Computing Environment for Discrete Event System Simulation using Service Oriented Architecture. EUC 2010: 359-362 - [c9]Hae Young Lee, Tae Ho Cho, Hyung-Jong Kim:
Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks. ISA 2010: 128-137
2000 – 2009
- 2009
- [j6]Hae Young Lee, Tae Ho Cho:
Fuzzy-Based Path Selection Method for Improving the Detection of False Reports in Sensor Networks. IEICE Trans. Inf. Syst. 92-D(8): 1574-1576 (2009) - [j5]Chung Il Sun, Hae Young Lee, Tae Ho Cho:
A Path Selection Method for Improving the Detection Power of Statistical Filtering in Sensor Networks. J. Inf. Sci. Eng. 25(4): 1163-1175 (2009) - [c8]Sang Jin Lee, Hae Young Lee, Tae Ho Cho:
Adaptive threshold determination method for the dynamic filtering in wireless sensor networks using fuzzy logic. ICUIMC 2009: 597-601 - 2008
- [j4]Hae Young Lee, Tae Ho Cho:
A* -based layout design for gratings allocation. Comput. Aided Des. 40(4): 455-464 (2008) - [j3]Sang Ryul Kim, Hae Young Lee, Tae Ho Cho:
Fuzzy Adaptive Partitioning Method for the Statistical Filtering. IEICE Trans. Inf. Syst. 91-D(7): 2065-2067 (2008) - [c7]Hae Young Lee, Tae Ho Cho:
A General Framework for Adaptive Filtering in Wireless Sensor Networks Based on Fuzzy Logic. ICIC (1) 2008: 1234-1241 - 2007
- [j2]Hae Young Lee, Tae Ho Cho:
Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks. IEICE Trans. Commun. 90-B(12): 3346-3353 (2007) - [j1]Byung Hee Kim, Hae Young Lee, Tae Ho Cho:
Fuzzy Rule-Based Enhancing Key Dissemination Method for the Dynamic Filtering-Based Sensor Networks. Int. J. Inf. Acquis. 4(3): 273-280 (2007) - [c6]Hae Young Lee, Tae Ho Cho:
Fuzzy Security Parameter Determining Method for the Commutative Cipher Based Filtering in Sensor Networks. ICCSA (2) 2007: 573-583 - [c5]Byung Hee Kim, Hae Young Lee, Tae Ho Cho:
Fuzzy Key Dissemination Limiting Method for the Dynamic Filtering-Based Sensor Networks. ICIC (1) 2007: 263-272 - [c4]Hae Young Lee, Tae Ho Cho:
Fuzzy Adaptive Threshold Determining in the Key Inheritance Based Sensor Networks. IEA/AIE 2007: 64-73 - [c3]Hae Young Lee, Tae Ho Cho:
Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks. UIC 2007: 535-544 - 2006
- [c2]Hae Young Lee, Tae Ho Cho:
Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks. ICDCIT 2006: 116-127 - [c1]Hae Young Lee, Tae Ho Cho:
Fuzzy-Based Adaptive Threshold Determining Method for the Interleaved Authentication in Sensor Networks. MICAI 2006: 112-121
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint