Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Kwantae Cho"'
Publikováno v:
2022 13th International Conference on Information and Communication Technology Convergence (ICTC).
Publikováno v:
ICTC
Speaker verification based on deep speaker embeddings (DSE) network outperformed traditional i- vectors systems. Afterward, to improve the performance, various researches have been conducting and data augmentation methods are one of them. In this pap
Publikováno v:
The Journal of Supercomputing. 75:3288-3301
Various studies have been conducted on a secret key exchange using the inter-pulse interval (IPI) extracted from a pulse wave. The IPI-based key exchange method uses a point where the body can measure an IPI of similar value anywhere. The IPI measure
Publikováno v:
ICTC
With the emergence of deep learning technology, face verification performance on the LFW benchmark outperformed human-level accuracy. In recent, face verification technique is applied to mobile devices to authenticate owner of them. Face verification
Publikováno v:
ICTC
The traditional speech recognition model consisting of an acoustic model and a language model is mainly used. Recently, an end-to-end speech recognition model consisting of a single integrated neural network model is being studied. This model has the
Publikováno v:
ICTC
Generally, the deep neural network learns by way of a loss function, which is an approach to evaluate how well given dataset is predicted on a particular network architecture (or network model). If the prediction deviates too far from real data, a lo
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789811313271
MUE/FutureTech
MUE/FutureTech
Recently, various studies have been conducted on secret key generation and authentication using biosignals. PPG signals in biosignals are easy to measure, and signals generated from the inside of the body are difficult to leak. However, since the UWB
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0b02b83de1e7e9a38dd0f05bdda22e8d
https://doi.org/10.1007/978-981-13-1328-8_46
https://doi.org/10.1007/978-981-13-1328-8_46
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789811313271
MUE/FutureTech
MUE/FutureTech
Various studies have been conducted on secret key exchange using IPI (Inter Pulse Interval) extracted from a pulse wave. The IPI-based key exchange method uses a point where the body can measure IPI of similar value anywhere. The key is generated by
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b59c126fcc509cb24e7906fa63af2ac2
https://doi.org/10.1007/978-981-13-1328-8_45
https://doi.org/10.1007/978-981-13-1328-8_45
Autor:
Kwantae Cho, Ju Young Kim
Publikováno v:
ICSPS
The heartbeat interval is known to be random and unique to each individual. For secure communication between biometric sensors (e.g., attachable/implantable medical devices) within a body area network, various IPI-based key agreement schemes have bee
Autor:
Kwantae Cho, Byungho Chung
Publikováno v:
MATEC Web of Conferences, Vol 125, p 03006 (2017)
Recently many researchers have employed physiological signals like heartbeats as a source of the key seed used in key establishment protocols. The physiological signals make it easy to establish a secret key between implantable (or attachable) medica