최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기韓國情報技術學會論文誌 = Journal of Korean institute of information technology, v.17 no.12, 2019년, pp.125 - 134
김인경 (제주대학교 창의교육거점센터, 사이버보안 인재교육원) , 박남제 (제주대학교 초등컴퓨터교육전공, 융합정보보안학과)
As the limitations of the passive recognition domain, which is not guaranteed transparency of the operation process, AI technology has a vulnerability that depends on the data. Human error is inherent because raw data for artificial intelligence learning must be processed and inspected manually to s...
Yongsik Moon, "The Malicious Use of Artificial Intelligence Forecasting, Prevention, and Mitigation", National Information Society Agency(NIA), NIA Special Report, 2018-12, Aug. 2018
Youngrang Kim, Junghoon Woo, Jaehwan Lee, and Ji Sun Shin, "High-quality data collection for machine learning using block chain", Journal of the Korea Institute of Information and Communication Engineering, Vol. 23, No. 1, pp. 13-19, Jan. 2019.
Sungmin Aum, "Artificial Intelligence Learning Data Productivity Improvement System based on Label Type Data Management Using Block Chain, and Method thereof", KR Patent 1020180153330, filed Nov 3, 2018, issued May 10, 2019.
Sungmin Aum, "Automatic inspection system for label type data based on Artificial Intelligence Learning to improve data productivity, and method thereof", KR Patent 1020180153327, filed Nov 3, 2018, issued Apr 5, 2019.
Yeongchun Woo, Seongteob Lee, Wan Choi, Chanwon Ahn, and Okki Baek, "Trend of Utilization of Machine Learning Technology for Digital Healthcare Data Analysis", Electronics and Telecommunications Trends, Vol. 34, No. 1, pp. 98-110, Feb. 2019.
Park, Namje, Kim, Byung-Gyu, Kim, Jinsu. A Mechanism of Masking Identification Information regarding Moving Objects Recorded on Visual Surveillance Systems by Differentially Implementing Access Permission. Electronics, vol.8, no.7, 735-.
Kim, Jinsu, Park, Namje, Kim, Geonwoo, Jin, Seunghun. CCTV Video Processing Metadata Security Scheme Using Character Order Preserving-Transformation in the Emerging Multimedia. Electronics, vol.8, no.4, 412-.
Lee, Donghyeok, Park, Namje, Kim, Geonwoo, Jin, Seunghun. De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment. Peer-to-peer networking and applications, vol.11, no.6, 1299-1308.
Park, Namje, Lee, Donghyeok. Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment. Personal and ubiquitous computing, vol.22, no.1, 3-10.
Lee, Donghyeok, Park, Namje. Geocasting-based synchronization of Almanac on the maritime cloud for distributed smart surveillance. The Journal of supercomputing, vol.73, no.3, 1103-1118.
Park, Namje, Bang, Hyo‐Chan. Mobile middleware platform for secure vessel traffic system in IoT service environment. Security and communication networks, vol.9, no.6, 500-512.
Park, Namje, Kang, Namhi. Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle. Sensors, vol.16, no.1, 20-.
Park, N., Kwak, J., Kim, S., Won, D., Kim, H.. WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. Lecture notes in computer science, vol.3842, 741-748.
Park, Namje, Hu, Hongxin, Jin, Qun. Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT). International journal of distributed sensor networks, vol.12, no.1, 2965438-.
Jaehyun Se, "Business Value of Blockchain and Applications of Artificial Intelligence", Journal of AJMAHS, Vol. 8, No. 7, pp. 779-789, Jul. 2018.
Jin-Hee Ku, "A Study on Adaptive Learning Model for Performance Improvement of Stream Analytics", Journal of Convergence for Information Technology, Vol. 8, No. 1, pp. 201-206, 2018.
JungYul Choi, "A study on the standardization strategy for building of learning data set for machine learning applications", Journal of Digital Convergence, Vol. 16, No. 10, pp. 205-212, Oct. 2018.
Ouaddah, Aafaf, Abou Elkalam, Anas, Ait Ouahman, Abdellah. FairAccess: a new Blockchain‐based access control framework for the Internet of Things. Security and communication networks, vol.9, no.18, 5943-5964.
Jiseop Lee, Sooyoung Kang, and Seungjoo Kim, "Study on the AI Speaker Security Evaluations and Countermeasure", Journal of the Korea Institute of Information Security and Cryptology, Vol. 28, No. 6, pp. 1523-1537, Dec. 2018.
김진수, 김상춘, 박남제. 프라이버시 침해 방지를 위한 얼굴 정보 변환 메커니즘. 韓國情報技術學會論文誌 = Journal of Korean institute of information technology, vol.17, no.6, 115-122.
김진수, 박남제. 개방형 클라우드 환경의 지능형 영상감시 인큐베이팅 보안 메커니즘 구조. 韓國情報技術學會論文誌 = Journal of Korean institute of information technology, vol.17, no.5, 105-116.
Park, Namje, Kim, Marie. Implementation of load management application system using smart grid privacy policy in energy management service environment. Cluster computing : the journal of networks, software tools and applications, vol.17, no.3, 653-664.
Lee, Donghyeok, Park, Namje. A Secure Almanac Synchronization Method for Open IoT Maritime Cloud Environment. 韓國情報技術學會論文誌 = Journal of Korean institute of information technology, vol.15, no.2, 79-90.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.