Skip to main content

Showing 1–6 of 6 results for author: Ahn, N

Searching in archive eess. Search in all archives.
.
  1. arXiv:2403.09967  [pdf, other

    eess.SP

    NR-Surface: NextG-ready $μ$W-reconfigurable mmWave Metasurface

    Authors: Minseok Kim, Namjo Ahn, Song Min Kim

    Abstract: Metasurface has recently emerged as an economic solution to expand mmWave coverage. However, their pervasive deployment remains a challenge, mainly due to the difficulty in reaching the tight 260ns NR synchronization requirement and real-time wireless reconfiguration while maintaining multi-year battery life. This paper presents NR-Surface, the first real-time reconfigurable metasurface fully comp… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

    Comments: 17 pages, 28 figures, to be published in NSDI '24

  2. arXiv:2005.01996  [pdf, other

    eess.IV cs.CV

    NTIRE 2020 Challenge on Real-World Image Super-Resolution: Methods and Results

    Authors: Andreas Lugmayr, Martin Danelljan, Radu Timofte, Namhyuk Ahn, Dongwoon Bai, Jie Cai, Yun Cao, Junyang Chen, Kaihua Cheng, SeYoung Chun, Wei Deng, Mostafa El-Khamy, Chiu Man Ho, Xiaozhong Ji, Amin Kheradmand, Gwantae Kim, Hanseok Ko, Kanghyu Lee, Jungwon Lee, Hao Li, Ziluan Liu, Zhi-Song Liu, Shuai Liu, Yunhua Lu, Zibo Meng , et al. (21 additional authors not shown)

    Abstract: This paper reviews the NTIRE 2020 challenge on real world super-resolution. It focuses on the participating methods and final results. The challenge addresses the real world setting, where paired true high and low-resolution images are unavailable. For training, only one set of source input images is therefore provided along with a set of unpaired high-quality target images. In Track 1: Image Proc… ▽ More

    Submitted 5 May, 2020; originally announced May 2020.

  3. arXiv:2004.00448  [pdf, other

    eess.IV cs.CV

    Rethinking Data Augmentation for Image Super-resolution: A Comprehensive Analysis and a New Strategy

    Authors: Jaejun Yoo, Namhyuk Ahn, Kyung-Ah Sohn

    Abstract: Data augmentation is an effective way to improve the performance of deep networks. Unfortunately, current methods are mostly developed for high-level vision tasks (e.g., classification) and few are studied for low-level vision tasks (e.g., image restoration). In this paper, we provide a comprehensive analysis of the existing augmentation methods applied to the super-resolution task. We find that t… ▽ More

    Submitted 23 April, 2020; v1 submitted 1 April, 2020; originally announced April 2020.

  4. arXiv:2001.00522  [pdf

    cs.CR eess.SP eess.SY

    Schemes for Privacy Data Destruction in a NAND Flash Memory

    Authors: Na-Young Ahn, Dong Hoon Lee

    Abstract: We propose schemes for efficiently destroying privacy data in a NAND flash memory. Generally, even if privcy data is discarded from NAND flash memories, there is a high probability that the data will remain in an invalid block. This is a management problem that arises from the specificity of a program operation and an erase operation of NAND flash memories. When updating pages or performing a garb… ▽ More

    Submitted 27 December, 2019; originally announced January 2020.

    Comments: Pages 181305 - 181313

  5. arXiv:1912.12392  [pdf

    eess.SP eess.SY

    Vehicle Communication using Hash Chain-based Secure Cluster

    Authors: Na-Young Ahn, Dong Hoon Lee

    Abstract: We introduce a hash chain-based secure cluster. Here, secure cluster refers to a set of vehicles having vehicular secrecy capacity of more than a reference value. Since vehicle communication is performed in such a secure cluster, basically secure vehicle communication can be expected. Secure hash clusters can also be expected by sharing hash chains derived from vehicle identification numbers. We a… ▽ More

    Submitted 27 December, 2019; originally announced December 2019.

    Comments: 9 pages, 6 figures, submitted on Aug, 2019 in Scientific Reports

    MSC Class: 03C90

  6. arXiv:1912.06527  [pdf

    eess.SP

    Physical Layer Security of Autonomous Driving: Secure Vehicle-to-Vehicle Communication in A Security Cluster

    Authors: Na-Young Ahn, Dong Hoon Lee

    Abstract: We suggest secure Vehicle-to-Vehicle communications in a secure cluster. Here, the security cluster refers to a group of vehicles having a certain level or more of secrecy capacity. Usually, there are many difficulties in defining secrecy capacity, but we define vehicular secrecy capacity for the vehicle defined only by SNR values. Defined vehicular secrecy capacity is practical and efficient in a… ▽ More

    Submitted 13 December, 2019; originally announced December 2019.

    Comments: Ad Hoc & Sensor Wireless Networks; accepted on Nov. 21, 2019

    Journal ref: Ad Hoc and Sensor Wireless Networks, 45 (3-4), 293-336, 2019