Login / Signup
In-Jung Kim
ORCID
Publication Activity (10 Years)
Years Active: 1997-2016
Publications (10 Years): 3
Top Topics
Discrimination Ability
Hybrid Learning
Numeral Strings
Convolutional Neural Networks
Top Venues
Int. J. Document Anal. Recognit.
ITHET
</>
Publications
</>
Inho Jung
,
Jaewoong Choi
,
In-Jung Kim
,
Changbeom Choi
Interactive learning environment for practical programming language based on web service.
ITHET
(2016)
In-Jung Kim
,
Changbeom Choi
,
Sang-Heon Lee
Improving discrimination ability of convolutional neural networks by hybrid learning.
Int. J. Document Anal. Recognit.
19 (1) (2016)
In-Jung Kim
,
Xiaohui Xie
Handwritten Hangul recognition using deep convolutional neural networks.
Int. J. Document Anal. Recognit.
18 (1) (2015)
Sangjin Ryu
,
In-Jung Kim
Discrimination of similar characters using nonlinear normalization based on regional importance measure.
Int. J. Document Anal. Recognit.
17 (1) (2014)
Gyu-Ro Park
,
In-Jung Kim
,
Cheng-Lin Liu
An evaluation of statistical methods in handwritten hangul recognition.
Int. J. Document Anal. Recognit.
16 (3) (2013)
In-Jung Kim
,
Cheol Won Lee
,
Eul-Gyu Im
Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures.
ICCSA (2)
(2007)
Yoon Jung Chung
,
In-Jung Kim
,
Chulsoo Lee
,
Eul-Gyu Im
,
Dongho Won
Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model.
ICCSA (4)
(2006)
In-Jung Kim
,
Yoon Jung Chung
,
YoungGyo Lee
,
Eul-Gyu Im
,
Dongho Won
Information System Modeling for Analysis of Propagation Effects and Levels of Damage.
ICCSA (3)
(2006)
In-Jung Kim
,
Yoon Jung Chung
,
YoungGyo Lee
,
Dongho Won
A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems.
ICCSA (2)
(2005)
Young-Gab Kim
,
Taek Lee
,
Hoh Peter In
,
Yoon Jung Chung
,
In-Jung Kim
,
Doo-Kwon Baik
A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks.
ICISC
(2005)
In-Jung Kim
,
YoungGyo Lee
,
Dongho Won
The Plan and Tools for Vulnerability Testing in Information Software-Based System.
J. Inf. Process. Syst.
1 (1) (2005)
Yoon Jung Chung
,
In-Jung Kim
,
Namhoon Lee
,
Taek Lee
,
Hoh Peter In
Security Risk Vector for Quantitative Asset Assessment.
ICCSA (2)
(2005)
YoungGyo Lee
,
In-Jung Kim
,
Seungjoo Kim
,
Dongho Won
A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS.
EuroPKI
(2005)
In-Jung Kim
Multi-window binarization of camera image for document recognition.
IWFHR
(2004)
Hoh Peter In
,
Young-Gab Kim
,
Taek Lee
,
Chang-Joo Moon
,
Yoon-Jung Jung
,
In-Jung Kim
A Security Risk Analysis Model for Information Systems.
AsiaSim
(2004)
Young-Hwan Bang
,
Yoon-Jung Jung
,
In-Jung Kim
,
Namhoon Lee
,
Gang-Soo Lee
The Design and Development for Risk Analysis Automatic Tool.
ICCSA (1)
(2004)
In-Jung Kim
,
Yoon-Jung Jung
,
JoongGil Park
,
Dongho Won
A Study on Security Risk Modeling over Information and Communication Infrastructure.
Security and Management
(2004)
Yoon-Jung Jung
,
In-Jung Kim
,
Namhoon Lee
,
JoongGil Park
The Development of Risk Analysis Methodology for Information Asset on Network.
Security and Management
(2004)
Yoon-Jung Jung
,
In-Jung Kim
The Development for the Risk Assessment Methodology of Spiral Model.
Security and Management
(2003)
In-Jung Kim
,
Jin Hyung Kim
Statistical Character Structure Modeling and Its Application to Handwritten Chinese Character Recognition.
IEEE Trans. Pattern Anal. Mach. Intell.
25 (11) (2003)
In-Jung Kim
,
Jin Hyung Kim
Pair-wise discrimination based on a stroke importance measure.
Pattern Recognit.
35 (10) (2002)
Cheng-Lin Liu
,
In-Jung Kim
,
Jin Hyung Kim
Model-based stroke extraction and matching for handwritten Chinese character recognition.
Pattern Recognit.
34 (12) (2001)
In-Jung Kim
,
Jin Hyung Kim
,
Cheng-Lin Liu
Stroke-guided Pixel Matching for Handwritten Chinese Character Recognition.
ICDAR
(1999)
Cheng-Lin Liu
,
In-Jung Kim
,
Jin Hyung Kim
High Accuracy Handwritten Chinese Character Recognition by Improved Feature Matching Method.
ICDAR
(1997)