본문 바로가기
  • Home

2025, Vol.21, No.4

An LLM-based Log Embedding Representation Learning Approach for Detecting Early-stage Malware Anomalies
Dong-Wan Kim , Hyun-Soo Kim , Kyung-Yeob Park and 2 other persons | 2025, 21(4) | pp.1~17 | number of Cited : 0
A Copyright Infringement Risk Prediction Method for KOGL Open Government Works Using Multimodal AI
Seyoung Jang , In-Jae Yoo , Byeong-Chan Park and 3 other persons | 2025, 21(4) | pp.19~28 | number of Cited : 0
Evaluation of a Script-Based License for Game Streaming Control
YongJoon Joe , Dupyo Hong , Sung-Il Jang and 1 other persons | 2025, 21(4) | pp.29~43 | number of Cited : 0
A Study on Optimizing Authentication Processing Time for Solid Applications in Decentralized Environments
Sung-Il Jang , Dupyo Hong , YongJoon Joe and 1 other persons | 2025, 21(4) | pp.45~52 | number of Cited : 0
Performance and Stability Analysis of a Fine-Tuned BERT-BiLSTM-CRF NER Model for Automated Information Extraction in Openly Licensed Works
Region-Specific Noise Generation for Untransferable Examples Against Neural Style Transfer
Park Sunghwan , KimJongSeong , Byunghoon Oh and 3 other persons | 2025, 21(4) | pp.63~77 | number of Cited : 0
AI Ethical Alignment and AGI Ethical Alignment: Comparison and Research Directions
Hojung Lim , Yoo, Seong joon , Jae Yoo Lee | 2025, 21(4) | pp.79~88 | number of Cited : 0
A Literature-Based Feasibility Verification of a Robust Autonomous Security Architecture
Hojung Lim , Shin DongMyung | 2025, 21(4) | pp.89~98 | number of Cited : 0
LLM Embedding-based Attribute Recommendation and SSS Combined Condition Hiding Proxy Re-encryption Technique
Kyung-Yeob Park , Hyun-Soo Kim , Chang-Jun Choi and 1 other persons | 2025, 21(4) | pp.99~114 | number of Cited : 0
Performance Comparison of Ethereum and IOTA for Large-Scale On-Chain Data Processing
Hojung Lim , Shin DongMyung | 2025, 21(4) | pp.115~124 | number of Cited : 0
A study on the Application of Switching-mode power supply to High-power Audio Amplifiers
Lee HyunChang | 2025, 21(4) | pp.125~132 | number of Cited : 0
A Metavers Virtual Spaces Congestion Estimation Method for Based on Object-level Pixel Cluster Analysis
Park Byeongchan , Seyoung Jang , Seok-Yoon Kim and 1 other persons | 2025, 21(4) | pp.133~140 | number of Cited : 0
A Comparative Study on Character Animation Acting Expression between Generative AI and Keyframe Methods - Focusing on Non-verbal Acting Elements
Hunjin Park | 2025, 21(4) | pp.141~148 | number of Cited : 0
Synthesis and device applications of novel BTD-based hole transporting materials
PAEK SANGHYUN | 2025, 21(4) | pp.149~157 | number of Cited : 0
Perovskite Solar Cells Enabled by a Composite Hole Transport Layer Strategy
Gyuri Yu , Wonjun Go , Hyunwook Lee and 1 other persons | 2025, 21(4) | pp.159~168 | number of Cited : 0
Molecular Design and Synthesis of New Hole Transporting Materials Based on Thieno[3,2-b]thiophene Derivatives
PAEK SANGHYUN | 2025, 21(4) | pp.169~176 | number of Cited : 0
A study on Energy-Aware Trust-Based Proxy Re-Encryption Path Selection and Security in Distributed LEO Satellite Networks
Won-Bin Kim , Yongjun Chung , PAEK SANGHYUN and 1 other persons | 2025, 21(4) | pp.177~188 | number of Cited : 0
Design of a Service Standard for Operational Resilience, Security, and Energy Management in Data Centers
Jae Myeong Choi | 2025, 21(4) | pp.189~196 | number of Cited : 0
Designing a Voice-Video Based UI Pipeline to Improve Digital Signage Usability for Digitally Vulnerable Groups
Jeong-Hyun Kim , Jong-Seob Park , Chol Yong Soo | 2025, 21(4) | pp.197~209 | number of Cited : 0
Enhancing Voice Recognition Accuracy through Sequential Application of Visual Speech Detection and Noise Reduction
Hyeon-Ji Ko , Won-Hu Seo , Chol Yong Soo | 2025, 21(4) | pp.211~222 | number of Cited : 0