Login / Signup
Eunjin Lee
Publication Activity (10 Years)
Years Active: 2006-2021
Publications (10 Years): 3
2025
2016
Top Topics
2025
2016
Science Education
2025
2016
Concurrency Control
2025
2016
Progressive Sampling
2025
2016
Normal Tissue
Top Venues
Bioinform.
Int. J. Comput. Vis. Robotics
Concurr. Comput. Pract. Exp.
IWSG
</>
Publications
</>
Dave Braines
,
Jane Stockdill-Mander
,
Eunjin Lee
The Science Library: Curation and visualization of a science gateway repository.
Concurr. Comput. Pract. Exp.
33 (19) (2021)
Eunjin Lee
,
Dave Braines
The Science Library: A Controlled Natural Language driven Science Gateway.
IWSG
(2019)
Eunjin Lee
,
Jung-Min Kwon
Effects of money simulation application on persons with intellectual disabilities with money transaction difficulties.
Int. J. Comput. Vis. Robotics
6 (3) (2016)
Dae-Soon Son
,
DongHyuk Lee
,
Kyusang Lee
,
Sin-Ho Jung
,
TaeJin Ahn
,
Eunjin Lee
,
Insuk Sohn
,
Jongsuk Chung
,
Woong-Yang Park
,
Nam Huh
,
Jae Won Lee
Practical approach to determine sample size for building logistic prediction models using high-throughput data.
J. Biomed. Informatics
53 (2015)
TaeJin Ahn
,
Eunjin Lee
,
Nam Huh
,
Taesung Park
Personalized identification of altered pathways in cancer using accumulated normal tissue data.
Bioinform.
30 (17) (2014)
Ik-Soo Huh
,
Sohee Oh
,
Eunjin Lee
,
Taesung Park
Compairing quantitative trait analysis to qualitative trait analysis for complex traits disease: A genome wide association study for hyperlipidemia.
BIBM Workshops
(2010)
Eunjin Lee
,
Jongsung Kim
,
Deukjo Hong
,
Changhoon Lee
,
Jaechul Sung
,
Seokhie Hong
,
Jongin Lim
Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(2) (2008)
Eunjin Lee
,
Donghoon Chang
,
Jongsung Kim
,
Jaechul Sung
,
Seokhie Hong
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL.
FSE
(2008)
Eunjin Lee
,
Deukjo Hong
,
Donghoon Chang
,
Seokhie Hong
,
Jongin Lim
A Weak Key Class of XTEA for a Related-Key Rectangle Attack.
VIETCRYPT
(2006)