Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Mi-Yeon Hong"'
Publikováno v:
IEEE Access, Vol 12, Pp 46668-46677 (2024)
Unmanned Aerial Vehicles (UAVs) are aerial vehicles that can go to a particular position without human control or with remote human control. It is because unmanned control mainly relies on position estimation that a lot of research has been studied o
Externí odkaz:
https://doaj.org/article/3ba38236b8594ca9a212e55aebe56784
Autor:
Mi Yeon Hong, Ji Won Yoon
Publikováno v:
PLoS ONE, Vol 17, Iss 2 (2022)
The purpose of our study is to figure out the transitions of the cryptocurrency market due to the outbreak of COVID-19 through network analysis, and we studied the complexity of the market from different perspectives. To construct a cryptocurrency ne
Externí odkaz:
https://doaj.org/article/8bea7b7b43ff4ee8bed4477c97ce9af4
Autor:
Bo-Woon Kim, Young-Kyung Jo, Gyeong-Nam Kim, Jung-Yun Hwang, Mi-Yeon Hong, Won-Dug Seo, Suk-Nam Hwang
Publikováno v:
Journal of Bacteriology and Virology. 52:103-114
Publikováno v:
Applied Sciences, Vol 10, Iss 18, p 6174 (2020)
Secure computation, a methodology of computing on encrypted data, has become a key factor in machine learning. Homomorphic encryption (HE) enables computation on encrypted data without leaking any information to untrusted servers. In machine learning
Externí odkaz:
https://doaj.org/article/f141054b10cf4f44b70f2f18b0ae3383
Autor:
Mi Yeon Hong, Ji Won Yoon
Publikováno v:
PloS one. 17(2)
The purpose of our study is to figure out the transitions of the cryptocurrency market due to the outbreak of COVID-19 through network analysis, and we studied the complexity of the market from different perspectives. To construct a cryptocurrency ne
Publikováno v:
Applied Sciences, Vol 10, Iss 6174, p 6174 (2020)
Applied Sciences
Volume 10
Issue 18
Applied Sciences
Volume 10
Issue 18
Secure computation, a methodology of computing on encrypted data, has become a key factor in machine learning. Homomorphic encryption (HE) enables computation on encrypted data without leaking any information to untrusted servers. In machine learning
Autor:
Mi Yeon Hong, Ji Won Yoon
Publikováno v:
Information Security Applications ISBN: 9783030393021
WISA
WISA
In the big data era, data scientists explore machine learning methods for observed data to predict or classify. For machine learining to be effective, it requires access to raw data which is often privacy sensitive. In addition, whatever data and fit
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f4a1eb72fba6873cf13942f1d133bb82
https://doi.org/10.1007/978-3-030-39303-8_12
https://doi.org/10.1007/978-3-030-39303-8_12
Autor:
Seong-Bong Lee, Seo-Hyeon Song, Mi-Yeon Hong, Mi-Hye Yoon, So-Hyun Lee, Ho-Jeong Bae, Beom-Ho Kim, Gwang-Hee Park, Hong-Rae Jung
Publikováno v:
Journal of Food Hygiene and Safety. 33:83-88
Autor:
Mi Yeon Hong
Publikováno v:
Mental Health & Social Work. 45:33-59
Autor:
Clare Loane, Jafar Bakhshaie, Elnour E. Dafeeah, Young Seok Shin, Pier Luigi Canonico, Michele Fornaro, Anja Söchtig, Claudio Vampini, Jeonghun Ku, Fabio Parazzini, Sholeh Mirkia, Jae Jin Kim, Christopher J. Patrick, Sören Kliem, Jung Suk Lee, Seyyed Mehdi Mirsharifa, Druck Reinhardt Druck Basel, Lida Faghih-Nasiri, Christoph Kröger, Zahra Sadeghianmehr, Claudio Mencacci, Jules Angst, Mi-Yeon Hong, Mohammad Effatpanah, Giulio Perugi, Zeinab Hatmi, Paolo Carbonatto, Abdulbari Bener, Arina Dumitriu, Luca Pani, Nancy Samson, Jin-Kook Heo, William G. Iacono, Satz Mengensatzproduktion, Sun I. Kim, Icro Maremmani, Anita Riecher-Rössler, Riccardo Torta, Vandad Sharifi, Giovanni Muscettola, Kiwan Han, Shadan Darbooy, A. Tarik Yilmaz, Carlos Rejón Altable, Marios Politis, Seung-Ok Seo, Uma Vaidyanathan
Publikováno v:
Psychopathology. 45:I-IV