default search action
Taesung Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c23]Wontaeck Jung, Hyunggon Kim, Do-Bin Kim, Tae-Hyun Kim, Nam-Hee Lee, Dongjin Shin, Minyoung Kim, Youngsik Rho, Hun-Jong Lee, Yujin Hyun, Jaeyoung Park, Taekyung Kim, Hwiwon Kim, Gyeongwon Lee, Jisang Lee, Joonsuc Jang, Jungmin Park, Sion Kim, Su Chang Jeon, Suyong Kim, Jung-Ho Song, Min-Seok Kim, Taesung Lee, Byung-Kwan Chun, Tongsung Kim, Young Gyu Lee, Hokil Lee, Soowoong Lee, Hwaseok Lee, Dooho Cho, Sangwan Nam, Yeomyung Kim, Kunyong Yoon, Yoonjae Lee, Sunghoon Kim, Jungseok Hwang, Raehyun Song, Hyunsik Jang, Jae-Ick Son, Hongsoo Jeon, Myunghun Lee, Mookyung Lee, Kisung Kim, Eungsuk Lee, Myeong-Woo Lee, Sungkyu Jo, Chan Ho Kim, Jong Chul Park, Kyunghwa Yun, Soonock Seol, Ji-Ho Cho, Seungjae Lee, Jin-Yub Lee, Sunghoi Hur:
13.3 A 280-Layer 1Tb 4b/cell 3D-NAND Flash Memory with a 28.5Gb/mm2 Areal Density and a 3.2GB/s High-Speed IO Rate. ISSCC 2024: 236-237 - [i8]Shrayani Mondal, Rishabh Garodia, Arbaaz Qureshi, Taesung Lee, Youngja Park:
Towards Generating Informative Textual Description for Neurons in Language Models. CoRR abs/2401.16731 (2024) - 2023
- [c22]Myles Foley, Ambrish Rawat, Taesung Lee, Yufang Hou, Gabriele Picco, Giulio Zizzo:
Matching Pairs: Attributing Fine-Tuned Models to their Pre-Trained Large Language Models. ACL (1) 2023: 7423-7442 - [c21]Isaiah J. King, Xiaokui Shu, Jiyong Jang, Kevin Eykholt, Taesung Lee, H. Howie Huang:
EdgeTorrent: Real-time Temporal Graph Representations for Intrusion Detection. RAID 2023: 77-91 - [c20]Nathalie Baracaldo, Farhan Ahmed, Kevin Eykholt, Yi Zhou, Shriti Priya, Taesung Lee, Swanand Kadhe, Mike Tan, Sridevi Polavaram, Sterling Suggs, Yuyang Gao, David Slater:
Benchmarking the Effect of Poisoning Defenses on the Security and Bias of Deep Learning Models. SP (Workshops) 2023: 45-56 - [c19]Kevin Eykholt, Taesung Lee, Douglas Lee Schales, Jiyong Jang, Ian M. Molloy, Masha Zorin:
URET: Universal Robustness Evaluation Toolkit (for Evasion). USENIX Security Symposium 2023: 3817-3833 - [c18]Youngmin Jo, Anil Kavala, Tongsung Kim, Byung-Kwan Chun, Jungjune Park, Taesung Lee, Jungmin Seo, Manjae Yang, Taehyeon Park, Hyunjin Kwon, Cheolhui Lee, Younghoon Son, Junghwan Kwak, Younggyu Lee, Hwan-Seok Ku, Dae-Hoon Na, Changyeon Yu, Jonghoon Park, Jae-Hwan Kim, Hyojin Kwon, Chan-ho Kim, Moon-Ki Jung, Chanjin Park, Donghyun Seo, Moosung Kim, Seungjae Lee, Jin-Yub Lee, Dongku Kang, Chiweon Yoon, Sunghoi Hur:
A 3.0 Gb/s/pin 4th generation F-chip with Toggle 5.0 Specification for 16Tb NAND Flash Memory Multi chip Package. VLSI Technology and Circuits 2023: 1-2 - [i7]Myles Foley, Ambrish Rawat, Taesung Lee, Yufang Hou, Gabriele Picco, Giulio Zizzo:
Matching Pairs: Attributing Fine-Tuned Models to their Pre-Trained Large Language Models. CoRR abs/2306.09308 (2023) - [i6]Kevin Eykholt, Taesung Lee, Douglas Lee Schales, Jiyong Jang, Ian M. Molloy, Masha Zorin:
URET: Universal Robustness Evaluation Toolkit (for Evasion). CoRR abs/2308.01840 (2023) - 2022
- [j5]Kathrin Grosse, Taesung Lee, Battista Biggio, Youngja Park, Michael Backes, Ian M. Molloy:
Backdoor smoothing: Demystifying backdoor attacks on deep neural networks. Comput. Secur. 120: 102814 (2022) - [c17]Youngja Park, Taesung Lee:
Full-Stack Information Extraction System for Cybersecurity Intelligence. EMNLP (Industry Track) 2022: 531-539 - [c16]Hye Yeon Park, Yunki Lee, Jonghoon Park, Hyunseok Song, Taesung Lee, Hyung Keun Gweon, Yunji Jung, Jeongmin Bae, Boseong Kim, Junwon Han, Seungwon Kim, Cheolsang Yoon, Jeongki Kim, Changkeun Lee, Sehoon Yoo, Euiyeol Kim, Hyunmin Baek, Howoo Park, Bumsuk Kim, JungChak Ahn, Joonseo Yim:
Advanced novel optical stack technologies for high SNR in CMOS Image Sensor. VLSI Technology and Circuits 2022: 353-354 - [i5]Shriya Atmakuri, Tejas Chheda, Dinesh Kandula, Nishant Yadav, Taesung Lee, Hessel Tuinhof:
Robustness of Explanation Methods for NLP Models. CoRR abs/2206.12284 (2022) - 2021
- [c15]Shiqi Wang, Kevin Eykholt, Taesung Lee, Jiyong Jang, Ian M. Molloy:
Adaptive Verifiable Training Using Pairwise Class Similarity. AAAI 2021: 10201-10209 - [c14]Seongyun Ko, Taesung Lee, Kijae Hong, Wonseok Lee, In Seo, Jiwon Seo, Wook-Shin Han:
iTurboGraph: Scaling and Automating Incremental Graph Analytics. SIGMOD Conference 2021: 977-990 - 2020
- [c13]Wenjie Wang, Youngja Park, Taesung Lee, Ian M. Molloy, Pengfei Tang, Li Xiong:
Utilizing Multimodal Feature Consistency to Detect Adversarial Examples on Clinical Summaries. ClinicalNLP@EMNLP 2020: 259-268 - [i4]Kathrin Grosse, Taesung Lee, Youngja Park, Michael Backes, Ian M. Molloy:
A new measure for overfitting and its implications for backdooring of deep learning. CoRR abs/2006.06721 (2020) - [i3]Shiqi Wang, Kevin Eykholt, Taesung Lee, Jiyong Jang, Ian M. Molloy:
Adaptive Verifiable Training Using Pairwise Class Similarity. CoRR abs/2012.07887 (2020)
2010 – 2019
- 2019
- [c12]Bryant Chen, Wilka Carvalho, Nathalie Baracaldo, Heiko Ludwig, Benjamin Edwards, Taesung Lee, Ian M. Molloy, Biplav Srivastava:
Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering. SafeAI@AAAI 2019 - [c11]Arpita Roy, Youngja Park, Taesung Lee, Shimei Pan:
Supervising Unsupervised Open Information Extraction Models. EMNLP/IJCNLP (1) 2019: 728-737 - [c10]Chaowei Xiao, Ruizhi Deng, Bo Li, Taesung Lee, Benjamin Edwards, Jinfeng Yi, Dawn Song, Mingyan Liu, Ian M. Molloy:
AdvIT: Adversarial Frames Identifier Based on Temporal Consistency in Videos. ICCV 2019: 3967-3976 - [c9]Taesung Lee, Youngja Park:
Unsupervised Sentence Embedding Using Document Structure-Based Context. ECML/PKDD (2) 2019: 633-647 - [c8]Taesung Lee, Benjamin Edwards, Ian M. Molloy, Dong Su:
Defending Against Neural Network Model Stealing Attacks Using Deceptive Perturbations. IEEE Symposium on Security and Privacy Workshops 2019: 43-49 - 2018
- [j4]Sunghwan Kim, Taesung Lee, Seung-won Hwang, Sameh Elnikety:
List Intersection for Web Search: Algorithms, Cost Models, and Optimizations. Proc. VLDB Endow. 12(1): 1-13 (2018) - [i2]Taesung Lee, Benjamin Edwards, Ian M. Molloy, Dong Su:
Defending Against Model Stealing Attacks Using Deceptive Perturbations. CoRR abs/1806.00054 (2018) - [i1]Bryant Chen, Wilka Carvalho, Nathalie Baracaldo, Heiko Ludwig, Benjamin Edwards, Taesung Lee, Ian M. Molloy, Biplav Srivastava:
Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering. CoRR abs/1811.03728 (2018) - 2016
- [c7]Taesung Lee, Seung-won Hwang, Zhongyuan Wang:
Trivia quiz mining using probabilistic knowledge. ASONAM 2016: 1392-1393 - [c6]Taesung Lee, Seung-won Hwang, Zhongyuan Wang:
Probabilistic Prototype Model for Serendipitous Property Mining. COLING 2016: 663-673 - [c5]Taesung Lee, Seung-won Hwang:
Linking, integrating, and translating entities via iterative graph matching. TAAI 2016: 248-255 - 2015
- [j3]Taesung Lee, Jin-Woo Park, Sanghoon Lee, Seung-won Hwang, Sameh Elnikety, Yuxiong He:
Processing and Optimizing Main Memory Spatial-Keyword Queries. Proc. VLDB Endow. 9(3): 132-143 (2015) - 2014
- [j2]Taesung Lee, Young-rok Cha, Seung-won Hwang:
Overcoming Asymmetry in Entity Graphs. IEEE Trans. Knowl. Data Eng. 26(12): 3051-3063 (2014) - [c4]Taesung Lee, Seung-won Hwang:
Understanding Relation Temporality of Entities. ACL (2) 2014: 848-853 - [c3]Sunyou Lee, Taesung Lee, Seung-won Hwang:
Map Translation Using Geo-tagged Social Media. EACL 2014: 59-63 - 2013
- [c2]Taesung Lee, Seung-won Hwang:
Bootstrapping Entity Translation on Weakly Comparable Corpora. ACL (1) 2013: 631-640 - [c1]Taesung Lee, Zhongyuan Wang, Haixun Wang, Seung-won Hwang:
Attribute extraction and scoring: A probabilistic approach. ICDE 2013: 194-205 - 2011
- [j1]Taesung Lee, Zhongyuan Wang, Haixun Wang, Seung-won Hwang:
Web Scale Taxonomy Cleansing. Proc. VLDB Endow. 4(12): 1295-1306 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-08 20:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint