Author of the publication

Security analysis on commercial online music streaming service and countermeasures.

, , , and . ICUIMC, page 59. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated Eojeol Embedding for Erroneous Sentence Classification in Korean Chatbots., , , , and . CoRR, (2020)Boundary detection of multiple related temporal duration of schedules in email., , and . K-CAP, page 97-104. ACM, (2011)Korean Erroneous Sentence Classification With Integrated Eojeol Embedding., , , , and . IEEE Access, (2021)Selection diversity of subspace interference alignment in uplink systems., , , and . ICTC, page 55-56. IEEE, (2010)Incremental summarization using taxonomy., and . K-CAP, page 175-176. ACM, (2009)Security analysis on commercial online music streaming service and countermeasures., , , and . ICUIMC, page 59. ACM, (2010)OutFlip: Generating Out-of-Domain Samples for Unknown Intent Detection with Natural Language Attack., , , and . CoRR, (2021)OutFlip: Generating Examples for Unknown Intent Detection with Natural Language Attack., , , and . ACL/IJCNLP (Findings), volume ACL/IJCNLP 2021 of Findings of ACL, page 504-512. Association for Computational Linguistics, (2021)RYANSQL: Recursively Applying Sketch-based Slot Fillings for Complex Text-to-SQL in Cross-Domain Databases., , , and . CoRR, (2020)Protection Profile for Connected Interoperable DRM Framework., , , and . WISA, volume 5379 of Lecture Notes in Computer Science, page 320-332. Springer, (2008)