ByungRae Cha
Orcid: 0000-0001-6686-5400
According to our database1,
ByungRae Cha
authored at least 44 papers
between 2005 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Experimental Design for Multi-task Deep Learning toward Intelligence Augmented Visual AI.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021
2020
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020
Prototype of Strawberry Maturity-level Classification to Determine Harvesting Time of Strawberry.
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020
2019
Draft Design of Li-Fi Based Acquisition Layer of DataLake Framework for IIoT and Smart Factory.
Proceedings of the Advances in Networked-based Information Systems, 2019
Enhancing Red Tide Image Recognition using Hierarchical Learning Approach based on Semantic Feature.
Proceedings of the 2nd International Conference on Electronics, 2019
2018
International Network Performance and Security Testing Based on Distributed Abyss Storage Cluster and Draft of Data Lake Framework.
Secur. Commun. Networks, 2018
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018
Proceedings of the 2018 International Conference on Information Networking, 2018
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018
2017
Global experimental verification of Docker-based secured mVoIP to protect against eavesdropping and DoS attacks.
EURASIP J. Wirel. Commun. Netw., 2017
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017
2016
Availability analysis and case study of mobile-OTP key generation using skip sampling of voice.
Clust. Comput., 2016
Document Summarization Using NMF and Pseudo Relevance Feedback Based on K-Means Clustering.
Comput. Informatics, 2016
Proceedings of the International Conference on Cloud Computing Research and Innovations, 2016
A Study of Determining Abnormal Behaviors by Using System for Preventing Agricultural Product Theft.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016
Experimental Verification of Docker-Based Distributed Cloud Applications for Secured Mobile VoIP.
Proceedings of the 10th International Conference on Complex, 2016
2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
2014
Int. J. Space Based Situated Comput., 2014
Agile and economic media-centric service realization over Software-Defined Infrastructure.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2014
2013
Telecommun. Syst., 2013
Handling and analysis of fake multimedia contents threats with collective intelligence in P2P file sharing environments.
Int. J. Grid Util. Comput., 2013
Proceedings of the International Conference on Information Networking 2013, 2013
Design of NFC Based Micro-payment to Support MD Authentication and Privacy for Trade Safety in NFC Applications.
Proceedings of the Seventh International Conference on Complex, 2013
2011
Proceedings of the International Conference on IT Convergence and Security, 2011
Proceedings of the U- and E-Service, Science and Technology, 2011
Study of Multistage Anomaly Detection for Secured Cloud Computing Resources in Future Internet.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
2010
Handling Fake Multimedia Contents Threat with Collective Intelligence in P2P File Sharing Environments.
Proceedings of the 3PGCIC 2010, 2010
2009
CRYPTEX Model for E-Commercial Contract of Software Source Code Using Secrete Sharing Scheme.
Proceedings of the Advances in Information Security and Assurance, 2009
2008
Query-Based Multi-Document Summarization Using Non-Negative Semantic Feature and NMF Clustering.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
Proceedings of the Selected Papers of the Sixth International Conference on Computational Sciences and Its Applications, 2008
Energy Efficient Location-Based Clustering for Skewed-Topology Wireless Sensor Networks.
Proceedings of the Workshops at the Grid and Pervasive Computing Conference, 2008
Random password generation of OTP system using changed location and angle of fingerprint features.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008
2007
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007
Network-Based Anomaly Intrusion Detection Improvement by Bayesian Network and Indirect Relation.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Improvement of Anomaly Intrusion Detection Performance by Indirect Relation for FTP Service.
Proceedings of the Computational and Ambient Intelligence, 2007
Proceedings of the Selected Papers of the Fifth International Conference on, 2007
Proceedings of the Computational Science and Its Applications, 2007
2005
Anomaly Intrusion Detection for System Call Using the Soundex Algorithm and Neural Networks.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005
Host Anomaly Detection Performance Analysis Based on System Call of Neuro-Fuzzy Using Soundex Algorithm and N-gram Technique.
Proceedings of the Systems Communications 2005 (ICW / ICHSN / ICMCS / SENET 2005), 2005
Neural Network Techniques for Host Anomaly Intrusion Detection Using Fixed Pattern Transformation.
Proceedings of the Computational Science and Its Applications, 2005