Bi-LSTM model to increase accuracy in text classification: Combining Word2vec CNN and attention mechanism B Jang, M Kim, G Harerimana, S Kang, JW Kim Applied Sciences 10 (17), 5841, 2020 | 437 | 2020 |
Apparatus for generating and restoring RTP packet and method thereof S Kang, A Lobo US Patent 7,366,204, 2008 | 49 | 2008 |
Analysis of influencing factors on the IPTV subscription: Focused on the moderation role of user perceived video quality S Park, S Kang, H Zo Information Technology & People 29 (2), 419-443, 2016 | 36 | 2016 |
Circuit for controlling execution of loop in digital signal processing chip S Kang US Patent 6,223,282, 2001 | 24 | 2001 |
Video data transceiving device, and transceiving method thereof S Kang, K Yoo US Patent 6,553,145, 2003 | 23 | 2003 |
Effective privacy-preserving collection of health data from a user’s wearable device JW Kim, SM Moon, S Kang, B Jang Applied Sciences 10 (18), 6396, 2020 | 19 | 2020 |
Reversible watermark using an accurate predictor and sorter based on payload balancing S Kang, HJ Hwang, HJ Kim ETRI Journal 34 (3), 410-420, 2012 | 18 | 2012 |
Genuine reversible data hiding technology using compensation for H. 264 bitstreams H Kim, S Kang Multimedia Tools and Applications 77, 8043-8060, 2018 | 17 | 2018 |
Factors influencing new media subscription based on multigroup analysis of IPTV and DCTV S Kang, S Park, S Lee Etri journal 36 (6), 1041-1050, 2014 | 12 | 2014 |
Camera model identification using a deep network and a reduced edge dataset C Kang, S Kang Neural Computing and Applications 32 (17), 13139-13146, 2020 | 9 | 2020 |
Genuine reversible data hiding technique for H. 264 bitstream using multi-dimensional histogram shifting technology on QDCT coefficients J Kang, H Kim, S Kang Applied Sciences 10 (18), 6410, 2020 | 5 | 2020 |
Visual quality optimization for privacy protection bar-based secure image display technique S Park, S Kang KSII Transactions on Internet and Information Systems (TIIS) 11 (7), 3664-3677, 2017 | 4 | 2017 |
Compressing JPEG compressed image using reversible data hiding technique S Kang, X Qu, HJ Kim 2013 Asia-Pacific Signal and Information Processing Association Annual …, 2013 | 4 | 2013 |
Self-supervised denoising image filter based on recursive deep neural network structure C Kang, S Kang Sensors 21 (23), 7827, 2021 | 2 | 2021 |
Policy Proposal for Assuring the Safety of Intelligent Software TH Park, S Kang Journal of Digital Contents Society 21 (5), 969-978, 2020 | 1 | 2020 |
Robust Reversible Data Hiding Technique toward Modification and Recompression in JPEG Images using Average Prediction Difference Expansion H Kim, SI Yu, S Kang International Journal of Applied Engineering Research 12 (1), 110-118, 2017 | 1 | 2017 |
Two Symbol Expansion Methods and Their Application to Reversible Data Hiding HJ Kim, C Kang, S Kang IEEE Access, 2024 | | 2024 |
Deep Transfer Learning Method Using Self-Pixel and Global Channel Attentive Regularization C Kang, S Kang Sensors 24 (11), 3522, 2024 | | 2024 |
Object-wise Secure Image Display Method for Screen Capture Protection J Kang, S Kang IEIE Transactions on Smart Processing & Computing 10 (6), 447-454, 2021 | | 2021 |
Self-Verifiable Video Integrity Technology for Car Dashboard Cameras using Reversible Data Hiding Method S Kang 디지털콘텐츠학회논문지 (J. DCS) 20 (2), 405-411, 2019 | | 2019 |