


default search action
Sung Y. Shin
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c65]Youngsun Jang
, Hyung Do Choi
, Kwanghee Won
, Sung Y. Shin
:
FulltextAttention: Full-text Classification of Scientific Papers Using Combined Model of BiGRU and Bahdanau Attention. RACS 2023: 26:1-26:6 - [c64]Jaeseop Kim
, Juw Won Park
, Sung Y. Shin
, Austin Hanson
, Jae-Hoon An
, Younghwan Kim
, Jiman Hong
:
An Efficient Profiling Tool for Baseboard Management Controllers. SAC 2023: 1318-1324 - 2022
- [j11]Erican Santiago, Shailu Shree Poudyal, Sung Y. Shin, Hyeun Joong Yoon:
Graphene Oxide Functionalized Biosensor for Detection of Stress-Related Biomarkers. Sensors 22(2): 558 (2022) - [c63]Seungyeon Lee, Jaeseop Kim, Bongjae Kim, Sung Y. Shin, Juw Won Park, Jiman Hong:
Adjusting inference time for power efficiency in neuromorphic architectures. SAC 2022: 1102-1108 - 2021
- [c62]Vially Kazadi Mutombo
, Sung Y. Shin, Jiman Hong:
EBR-RL: energy balancing routing protocol based on reinforcement learning for WSN. SAC 2021: 1915-1920 - 2020
- [c61]Bada Kim, Doohyuk Chang, Junyoung Heo, Sung Y. Shin:
Time series analysis for enhancing the recognition of license plate number in video stream of IOT camera. SAC 2020: 1901-1905
2010 – 2019
- 2019
- [c60]Sangwon Shin
, Soohyeon Choi, Kwanghee Won, Sung Y. Shin:
Preprocessed symmetric RSA authentication for wireless body area networks in space. RACS 2019: 230-235 - [c59]Hansol Lee, Younghwan Kim, Juw Won Park, Sung Y. Shin, Jiman Hong:
An efficient deep learning platform for detecting objects. SAC 2019: 1353-1354 - 2018
- [j10]Jun Huang, Cong-Cong Xing
, Sung Y. Shin, Fen Hou, Ching-Hsien Hsu
:
Optimizing M2M Communications and Quality of Services in the IoT for Sustainable Smart Cities. IEEE Trans. Sustain. Comput. 3(1): 4-15 (2018) - [c58]Sae-Han Suh, Ji-Eun Jhang, Kwanghee Won, Sung Y. Shin, Chang Oan Sung:
Development of vegetation mapping with deep convolutional neural network. RACS 2018: 53-58 - [c57]Jeongwoo Choi, Yongmin Kim, Sung Y. Shin, Jiman Hong:
Smart IoT monitoring framework based on oneM2M for fog computing. SAC 2018: 1848-1852 - 2017
- [j9]Samaneh Aminikhanghahi
, Sung Y. Shin, Wei Wang, Soon-Ik Jeon, Seong-Ho Son
:
A new fuzzy Gaussian mixture model (FGMM) based algorithm for mammography tumor image classification. Multim. Tools Appl. 76(7): 10191-10205 (2017) - [c56]Mohammad Taheri, Dheeman Saha, Gary Hatfield, Emmanuel Byamukama, Sung Y. Shin:
Applied Statistical Model and Remote Sensing for Decision Management System for Soybean. RACS 2017: 11-14 - [c55]Sae-Han Suh, Dongyoun Kim, Ji-Eun Jhang, Emmanuel Byamukama, Gary Hatfield, Sung Y. Shin:
Identification of the White-Mold affected Soybean fields by using Multispectral Imageries, Spatial Autocorrelation and Support Vector Machine. RACS 2017: 104-109 - [c54]Ji Young Lee, Jin Yeong Mun, Mohammad Taheri, Seong-Ho Son
, Sung Y. Shin:
Vessel Segmentation Model using Automated Threshold Algorithm from Lower Leg MRI. RACS 2017: 120-125 - [c53]Myungjoon Shon, Kisu Kim, Hansol Lee, Sung Y. Shin, Jiman Hong:
DACS: dynamic allocation credit scheduler for virtual machines. SAC 2017: 1563-1565 - 2016
- [c52]Mohammad Taheri, George Hamer, Seong-Ho Son
, Sung Y. Shin:
Enhanced Breast Cancer Classification with Automatic Thresholding Using SVM and Harris Corner Detection. RACS 2016: 56-60 - [c51]Mohammad Taheri, George Hamer, Seong-Ho Son
, Sung Y. Shin:
Automated Single and Multi-Breast Tumor Segmentation Using Improved Watershed Technique in 2D MRI Images. RACS 2016: 61-66 - [c50]Dheeman Saha, Austin Hanson, Sung Y. Shin:
Development of Enhanced Weed Detection System with Adaptive Thresholding and Support Vector Machine. RACS 2016: 85-88 - [c49]Chulwoo Pack, Sung Y. Shin, Hyung Do Choi, Soon-Ik Jeon, John Kim:
Optimized multilayer perceptron using dynamic learning rate based microwave tomography breast cancer screening. SAC 2016: 2171-2175 - [c48]Ravi Kasaudhan, Sung Y. Shin, Soon-Ik Jeon, Seong-Ho Son
:
Similarity measurement with combination of mesh distance fourier transform and global features in 2D binary image. SAC 2016: 2176-2181 - 2015
- [j8]Gensheng Zhang, Wei Wang, Sung Y. Shin, Carrie B. Hruska, Seong-Ho Son
:
Fourier irregularity index: A new approach to measure tumor mass irregularity in breast mammogram images. Multim. Tools Appl. 74(11): 3783-3798 (2015) - [c47]Austin Hanson, George Hamer, Sung Y. Shin:
Hybrid model for object orientation classification. RACS 2015: 164-171 - [c46]Chulwoo Pack, Sung Y. Shin, Seong-Ho Son
, Soon-Ik Jeon:
Computer aided breast cancer diagnosis system with fuzzy multiple-parameter support vector machine. RACS 2015: 172-176 - [c45]G. C. Sailesh, Chulwoo Pack
, Sung Y. Shin, Hyung Do Choi:
Breast cancer classification of mammographic masses using improved shape features. RACS 2015: 188-194 - [c44]Samaneh Aminikhanghahi
, Sung Y. Shin, Wei Wang, Soon-Ik Jeon, Seong-Ho Son
, Chulwoo Pack
:
Study of wireless mammography image transmission impacts on robust cyber-aided diagnosis systems. SAC 2015: 2252-2256 - 2014
- [j7]Runan Yao, Wei Wang
, Sung Y. Shin, Seong-Ho Son
, Soon-Ik Jeon:
Competition-Based Device-to-Device Transmission Scheduling to Support Wireless Cloud Multimedia Communications. Int. J. Distributed Sens. Networks 10 (2014) - [c43]Samaneh Aminikhanghahi
, Sung Y. Shin, Wei Wang, Seong-Ho Son
, Soon-Ik Jeon:
An optimized support vector machine classifier to extract abnormal features from breast microwave tomography data. RACS 2014: 111-115 - [c42]Byung K. Jung, Sung Y. Shin, Seong-Ho Son
, Jeong-Ki Pack:
Shape based medical image retrieval method using irregularity chain code similarity. RACS 2014: 121-125 - [c41]Chunqiu Wang, Wei Wang, Sung Y. Shin, Soon-Ik Jeon:
Comparative study of microwave tomography segmentation techniques based on GMM and KNN in breast cancer detection. RACS 2014: 303-308 - [c40]Byung K. Jung, Sung Y. Shin, Wei Wang, Hyung Do Choi, Jeong-Ki Pack:
Similar MRI object retrieval based on modified contour to centroid triangulation with arc difference rate. SAC 2014: 31-32 - [c39]Samaneh Aminikhanghahi
, Wei Wang, Sung Y. Shin, Seong-Ho Son
, Soon-Ik Jeon:
Effective tumor feature extraction for smart phone based microwave tomography breast cancer screening. SAC 2014: 674-679 - [e7]Yookun Cho, Sung Y. Shin, Sang-Wook Kim, Chih-Cheng Hung, Jiman Hong:
Symposium on Applied Computing, SAC 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014. ACM 2014, ISBN 978-1-4503-2469-4 [contents] - 2013
- [c38]Zhe Li, Wei Wang, Sung Y. Shin, Hyung Do Choi:
Enhanced roughness index for breast cancer benign/malignant measurement using Gaussian mixture model. RACS 2013: 177-181 - [c37]Hyun I. Kim, Sung Y. Shin, Wei Wang, Soon-Ik Jeon:
SVM-based Harris corner detection for breast mammogram image normal/abnormal classification. RACS 2013: 187-191 - [c36]Wei Wang, Sung Y. Shin:
A distributed source rate control optimization approach in energy harvesting wireless sensor networks. WOCC 2013: 410-414 - [e6]Sung Y. Shin, José Carlos Maldonado:
Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC '13, Coimbra, Portugal, March 18-22, 2013. ACM 2013, ISBN 978-1-4503-1656-9 [contents] - 2012
- [j6]Joonhyouk Jang, Jinman Jung, Yookun Cho, Sanghoon Choi, Sung Y. Shin:
Design of a Lightweight TCP/IP Protocol Stack with an Event-Driven Scheduler. J. Inf. Sci. Eng. 28(6): 1059-1071 (2012) - [c35]Zhe Li, Sung Y. Shin, Soon-Ik Jeon, Seong-Ho Son
, Jeong-Ki Pack:
A new histogram-based breast cancer image classifier using Gaussian mixture model. RACS 2012: 143-147 - [c34]Gensheng Zhang, Sung Y. Shin, Wei Wang, Carrie B. Hruska, Hyung Do Choi:
A new Fourier-based approach to measure irregularity of breast masses in mammograms. RACS 2012: 153-157 - [c33]Eungyu Lee, Joonwoo Lee, Hyeongseok Kang, Kanghee Kim, Sung-Ryul Kim, Sung Y. Shin:
An implementation study of a ghost drive: hidden file store in a filesystem. SAC 2012: 1796-1798 - 2011
- [c32]Jucheol Moon, Sung Y. Shin, Donghoon Kang, Soon-Ik Jeon, Hyung Do Choi, Jung-Yeop Kim:
Agglomerated feature extractionin medical images for breast cancer and its characteristic pattern generation. RACS 2011: 220-225 - [c31]Donghoon Kang, Sung Y. Shin, Chang Oan Sung, Jung-Yeop Kim, Jeong-Ki Pack, Hyung Do Choi:
An improved method of breast MRI segmentation with simplified K-means clustered images. RACS 2011: 226-231 - [c30]Heejune Ahn, Sang Chul Ahn, Junyoung Heo
, Sung Y. Shin:
Fault tolerant framework and techniques for component-based autonomous robot systems. SAC 2011: 566-572 - 2010
- [j5]Manki Min, Austin F. O'Brien, Sung Y. Shin:
Improved PSOR algorithm for minimum power multicast tree problem in wireless ad hoc networks. Int. J. Sens. Networks 8(3/4): 193-201 (2010) - [j4]Jaeheung Lee, Sangho Yi, Junyoung Heo, Hyungbae Park, Sung Y. Shin, Yookun Cho:
An Efficient Secure Deletion Scheme for Flash File Systems. J. Inf. Sci. Eng. 26(1): 27-38 (2010) - [c29]Junghoon Lee, Gyung-Leen Park, Sang-Wook Kim, Hye-Jin Kim, Sung Y. Shin:
A hybrid prefetch policy for the retrieval of link-associated information on vehicular networks. SAC 2010: 189-193 - [e5]Sung Y. Shin, Sascha Ossowski, Michael Schumacher, Mathew J. Palakal, Chih-Cheng Hung:
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010. ACM 2010, ISBN 978-1-60558-639-7 [contents]
2000 – 2009
- 2009
- [c28]Manki Min, Austin F. O'Brien, Sung Y. Shin:
Partitioning-Based SOR for Minimum Energy Multicast Tree Problem in Wireless Ad Hoc Networks. ICCCN 2009: 1-6 - [c27]Haklin Kimm, Sung Y. Shin, Ho-sang Ham, Chang Oan Sung:
Failure management development for integrated automotive safety-critical software systems. SAC 2009: 517-521 - [e4]Sung Y. Shin, Sascha Ossowski:
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009. ACM 2009, ISBN 978-1-60558-166-8 [contents] - 2008
- [c26]Manki Min, Austin F. O'Brien, Sung Y. Shin:
SOR Revisited: Partitioning and Recovering after Shrinking. ICCCN 2008: 783-788 - [c25]W. Eric Wong, Chang Oan Sung, Sung Y. Shin:
Message from the software engineering track chairs: editorial. SAC 2008: 660 - [c24]Jaeheung Lee, Junyoung Heo
, Yookun Cho, Jiman Hong, Sung Y. Shin:
Secure deletion for NAND flash file system. SAC 2008: 1710-1714 - 2007
- [j3]Junghoon Lee, Mikyung Kang, Gyung-Leen Park, Sung Y. Shin:
Design of a Reliable Real-Time Scheduling Policy for Dual-Channel Networks. J. Inf. Sci. Eng. 23(5): 1407-1419 (2007) - [c23]Haklin Kimm, Sung Y. Shin, Chang Oan Sung:
Evaluation of interval-based dynamic voltage scaling algorithms on mobile Linux system. SAC 2007: 1141-1145 - [e3]Yookun Cho, Roger L. Wainwright, Hisham Haddad, Sung Y. Shin, Yong Wan Koo:
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007. ACM 2007, ISBN 1-59593-480-4 [contents] - 2006
- [c22]Jongmoo Choi, Seungjae Baek, Sung Y. Shin:
Design and implementation of a kernel resource protector for robustness of Linux module programming. SAC 2006: 1477-1481 - 2005
- [c21]Charlie Y. Shim, Jung-Yeop Kim, Sung Y. Shin, Jiman Hong:
Using Feedback Cycle for Developing an Adjustable Security Design Metric. FSKD (2) 2005: 1158-1161 - [c20]Yoojin Chung, Sang-Young Cho, Sung Y. Shin:
Parallel Prediction of Protein-Protein Interactions Using Proximal SVM. RSFDGrC (2) 2005: 430-437 - [c19]Dongseob Jang, Sung Y. Shin, Charlie Y. Shim, C. C. Hung:
A comparison on information fusion methods for air target identification. SAC 2005: 45-46 - [c18]Junyoung Heo
, Sangho Yi, Yookun Cho, Jiman Hong, Sung Y. Shin:
Space-efficient page-level incremental checkpointing. SAC 2005: 1558-1562 - 2004
- [c17]Sung Y. Shin, ChanGon Yoo, Chih-Cheng Hung:
Reliable High-Speed Communication Module for Linux Cluster File System Using M-VIA. CATA 2004: 205-208 - 2003
- [c16]Sung Y. Shin, Charlie Y. Shim, Xiaohng Chen, Chang Oan Sung:
A Web-Based Approach for Myofascial Pain Syndrome Monitoring System in the Home. CAINE 2003: 246-249 - [c15]Sung Y. Shin, Chan G. Yoo, Kwan-Jong Yoo:
Design and Performance Analysis of Communication Module for Linux Clustering VOD Server. CAINE 2003: 254-257 - [c14]Moonju Park, Jiman Hong, Sung Y. Shin:
A Priority Assignment Method for Earliest Deadline Scheduling. CATA 2003: 316-320 - [c13]Sangsu Kim, Jiman Hong, Yookun Cho, Sung Y. Shin:
Memory Profiling Checkpoint. CATA 2003: 325-328 - 2002
- [c12]Sung Y. Shin, Charlie Yong-Sang Shim, Su Jung Byun:
Bird Species Identification System Using Kernel based PCA. CAINE 2002: 142-145 - [c11]Charlie Y. Shim, Alireza Salehnia, Sung Y. Shin:
An Approach from Software Reliability Modeling to Security Modeling. CATA 2002: 63-66 - [c10]Sung Y. Shin, Su Jeong Byun, Won Don Lee:
User Verification System on Telebanking Using Kernel based PCA. CATA 2002: 102-105 - [e2]Rex E. Gantenbein, Sung Y. Shin:
Proceedings of the ISCA 17th International Conference Computers and Their Applications, April 4-6, 2002, Canterbury Hotel, San Francisco, California, USA. ISCA 2002, ISBN 1-880843-42-0 [contents] - 2001
- [j2]Ming Zhang, Rex E. Gantenbein, Sung Y. Shin, Chih-Cheng Hung:
The application of artificial neural networks in knowledge-based information systems. ACIS Int. J. Comput. Inf. Sci. 2(2): 49-58 (2001) - [c9]Sung Y. Shin, Jung-Yeop Kim, Rex E. Gantenbein, Charles M. Lundquist:
Design A Working Model of Secure Data Transfer Using a Data Mart. CAINE 2001: 66-69 - [c8]Su Jeong Byun, Won Don Lee, Sung Y. Shin, Chih-Cheng Hung:
The performance comparison between backpropagation and extended incremental network model on speaker verification. CATA 2001: 256-259 - 2000
- [j1]Jin-Ki Hong, Rex E. Gantenbein, Sung Y. Shin:
Computer-aided design validation of safety-critical software systems. ACIS Int. J. Comput. Inf. Sci. 1(1): 20-35 (2000) - [c7]Rex E. Gantenbein, Thomas L. James, Garrace DeGroot, Harshi L. Allen, Sung Y. Shin:
Analyzing security in distributed collaborative systems. CATA 2000: 72-75 - [c6]Dong Chun Lee, Sung Y. Shin:
Radiance simulation of multispectral remote sensor data for water resource applications. CATA 2000: 400-403 - [c5]Dong Chun Lee, Jay H. Kwon, Keehwan Hong, Sung Y. Shin:
A conceptual framework for GIS-based vehicle monitoring system. CATA 2000: 404-407 - [e1]Sung Y. Shin:
Proceedings of the ISCA 15th International Conference Computers and Their Applications, March 29-31, 2000, New Orleans, Louisiana, USA. ISCA 2000, ISBN 1-880843-32-3 [contents]
1990 – 1999
- 1999
- [c4]Sung Y. Shin, Chang Oan Sung:
Heuristic rules for data warehouse developments. CATA 1999: 10-13 - [c3]Sung Y. Shin, Ming Y. Wang:
Design and implementation of window NT real time email "talk". CATA 1999: 214-217 - 1998
- [c2]Chae-Gon Yoo, Sung Y. Shin, Chi-Jung Hwang:
Coarse matching method on aerial city image using distance weighted intensity transformation. CATA 1998: 295-298 - [c1]Sung Y. Shin, Charlie Yong-Sang Shim, Rex E. Gantenbein:
The optimal data interval for message passing to update checkpointed states in a fault-tolerant distributed systems. CATA 1998: 376-379
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint