Chang Choi

Orcid: 0000-0002-2276-2378

According to our database1, Chang Choi authored at least 148 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Automated classification of liver fibrosis stages using ultrasound imaging.
BMC Medical Imaging, December, 2024

Adversarial attack vulnerability for multi-biometric authentication system.
Expert Syst. J. Knowl. Eng., October, 2024

Kiosk Recommend System Based on Self-Supervised Representation Learning of User Behaviors in Offline Retail.
IEEE Internet Things J., May, 2024

Depthwise channel attention network (DWCAN): An efficient and lightweight model for single image super-resolution and metaverse gaming.
Expert Syst. J. Knowl. Eng., April, 2024

Editorial: Artificial intelligence in biomedical big data and digital healthcare.
Future Gener. Comput. Syst., March, 2024

VisGIN: Visibility Graph Neural Network on one-dimensional data for biometric authentication<AC.
Expert Syst. Appl., March, 2024

Real-Time Multi-Class Classification of Respiratory Diseases Through Dimensional Data Combinations.
Cogn. Comput., March, 2024

Blockchain-Based System and Methods for Sensitive Data Transactions.
IEEE Consumer Electron. Mag., March, 2024

System for automatically assessing the likelihood of inferior alveolar nerve injury.
Comput. Biol. Medicine, February, 2024

A precise method of identifying Android application family.
Expert Syst. J. Knowl. Eng., January, 2024

Triple-modality interaction for deepfake detection on zero-shot identity.
Inf. Fusion, 2024

Electrocardiogram identification based on data generative network and non-fiducial data processing.
Comput. Biol. Medicine, 2024

Quad-Biometrics for Few-Shot User Identification.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

Knowledge Sharing based Lightweight Transformer for Construction Safety Accident Prevention.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

Optimizing Mobile Robot Localization: Drones-Enhanced Sensor Fusion with Innovative Wireless Communication.
Proceedings of the IEEE INFOCOM 2024, 2024

Autoencoders Based Optimized Deep Learning Model for the Detection of Cyber Attack in IoT Environment.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024

2023
Multimedia analysis of robustly optimized multimodal transformer based on vision and language co-learning.
Inf. Fusion, December, 2023

Use all tokens method to improve semantic relationship learning.
Expert Syst. Appl., December, 2023

Multi-modal Biometrics Based Implicit Driver Identification System Using Multi-TF Images of ECG and EMG.
Comput. Biol. Medicine, June, 2023

Real-Time Context-Aware Recommendation System for Tourism.
Sensors, April, 2023

Classification of vertices on social networks by multiple approaches.
CoRR, 2023

A LoRaWAN monitoring system for large buildings based on embedded edge computing in indoor environment.
Concurr. Comput. Pract. Exp., 2023

Data Augmentation Based on Generative Adversarial Networks for Endoscopic Image Classification.
IEEE Access, 2023

Correction to "Ensemble Networks for User Recognition in Various Situations Based on Electrocardiogram".
IEEE Access, 2023

One-Dimensional Shallow Neural Network Using Non-Fiducial Based Segmented Electrocardiogram for User Identification System.
IEEE Access, 2023

Classification of Liver Fibrosis From Heterogeneous Ultrasound Image.
IEEE Access, 2023

Classification of the Relationship Between Mandibular Third Molar and Inferior Alveolar Nerve Based on Generated Mask Images.
IEEE Access, 2023

Security Verification Software Platform of Data-efficient Image Transformer Based on Fast Gradient Sign Method.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

Design and Implementation of a Blockchain-based e-Voting system by using the Algorand platform.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

News Category Classification via Multimodal Fusion Method.
Proceedings of the 2023 International Conference on Research in Adaptive and Convergent Systems, 2023

Long Short-Term Memory Network (LSTM) based Stock Price Prediction.
Proceedings of the 2023 International Conference on Research in Adaptive and Convergent Systems, 2023

Performance Evaluation of Enhanced ConvNeXtTiny-based Fire Detection System in Real-world Scenarios.
Proceedings of the First Tiny Papers Track at ICLR 2023, 2023

2022
An Intelligent Signal Processing Data Denoising Method for Control Systems Protection in the Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022

Automatic Classification Service System for Citrus Pest Recognition Based on Deep Learning.
Sensors, 2022

Evaluation and Comparative Analysis of Semantic Web-Based Strategies for Enhancing Educational System Development.
Int. J. Semantic Web Inf. Syst., 2022

Accelerating temporal action proposal generation via high performance computing.
Frontiers Comput. Sci., 2022

Prediction of Number of Suicidal People Based on KNN.
Proceedings of the International Conference on Electronics, Information, and Communication, 2022

2021
Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey.
Wirel. Commun. Mob. Comput., 2021

An enhanced 3DCNN-ConvLSTM for spatiotemporal multimedia data analysis.
Concurr. Comput. Pract. Exp., 2021

Offensive Security of Keyboard Data Using Machine Learning for Password Authentication in IoT.
IEEE Access, 2021

2020
Inter-Beam Interference Cancellation and Physical Layer Security Constraints by 3D Polarized Beamforming in Power Domain NOMA Systems.
IEEE Trans. Sustain. Comput., 2020

Special Issue on Intelligent Systems in Sensor Networks and Internet of Things.
Sensors, 2020

Visual saliency guided complex image retrieval.
Pattern Recognit. Lett., 2020

Robust Decentralised Trust Management for the Internet of Things by Using Game Theory.
Inf. Process. Manag., 2020

Internet of Knowledge.
Future Gener. Comput. Syst., 2020

Threats and Corrective Measures for IoT Security with Observance to Cybercrime.
CoRR, 2020

Green resource allocation method for intelligent medical treatment-oriented service in a 5G mobile network.
Concurr. Comput. Pract. Exp., 2020

Packer identification method based on byte sequences.
Concurr. Comput. Pract. Exp., 2020

Novel data mining paradigms based on soft computing and machine learning in the current and upcoming information society revolution.
Concurr. Comput. Pract. Exp., 2020

A Blockchain-Based P2P Transaction Method and Sensitive Data Encoding for E-Commerce Transactions.
IEEE Consumer Electron. Mag., 2020

The Effects of Depth of Field on Subjective Evaluation of Aesthetic Appeal and Image Quality of Photographs.
IEEE Access, 2020

A Reliable Physical Layer Authentication Algorithm for Massive IoT Systems.
IEEE Access, 2020

A Localization Based on Unscented Kalman Filter and Particle Filter Localization Algorithms.
IEEE Access, 2020

Ensemble Networks for User Recognition in Various Situations Based on Electrocardiogram.
IEEE Access, 2020

Summarizing social media content via bio-inspired influence maximization algorithms.
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020

Multimodal Neuroimaging Game Theoretic Data Fusion in Adversarial Conditions.
Proceedings of the RACS '20: International Conference on Research in Adaptive and Convergent Systems, 2020

A Classification method of Fake News based on Ensemble Learning.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

Efficient data processing method for edge intelligence based on SVM.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

Efficient healthcare service based on Stacking Ensemble.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

Behavioral Analysis to Detect Social Spammer in Online Social Networks (OSNs).
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

A Novel Approach for Fake News Detection in Vehicular Ad-Hoc Network (VANET).
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

XSSPro: XSS Attack Detection Proxy to Defend Social Networking Platforms.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

2019
An Edge Intelligence Empowered Recommender System Enabling Cultural Heritage Applications.
IEEE Trans. Ind. Informatics, 2019

Generative Neural Networks for Anomaly Detection in Crowded Scenes.
IEEE Trans. Inf. Forensics Secur., 2019

A reinforcement learning approach for UAV target searching and tracking.
Multim. Tools Appl., 2019

A novel energy-efficient neighbor discovery procedure in a wireless self-organization network.
Inf. Sci., 2019

A novel CNN based security guaranteed image watermarking generation scenario for smart city applications.
Inf. Sci., 2019

A Reliable Energy Efficient Dynamic Spectrum Sensing for Cognitive Radio IoT Networks.
IEEE Internet Things J., 2019

Improving temporal action proposal generation by using high performance computing.
CoRR, 2019

Metamorphic malicious code behavior detection using probabilistic inference methods.
Cogn. Syst. Res., 2019

Localization and Detection of Targets in Underwater Wireless Sensor Using Distance and Angle Based Algorithms.
IEEE Access, 2019

Ontology-Based Security Context Reasoning for Power IoT-Cloud Security Service.
IEEE Access, 2019

Medical Information Protection Frameworks for Smart Healthcare based on IoT.
Proceedings of the 9th International Conference on Web Intelligence, Mining and Semantics, 2019

Clustered NFV service chaining scheme for ocean observations.
Proceedings of the Conference on Research in Adaptive and Convergent Systems, 2019

Moving intelligence of mobile edge computing to maritime network.
Proceedings of the Conference on Research in Adaptive and Convergent Systems, 2019

Automatic Maritime Traffic Synthetic Route: A Framework for Route Prediction.
Proceedings of the Pervasive Systems, Algorithms and Networks, 2019

2018
Securing Collaborative Deep Learning in Industrial Applications Within Adversarial Scenarios.
IEEE Trans. Ind. Informatics, 2018

An improved method of automatic text summarization for web contents using lexical chain with semantic-related terms.
Soft Comput., 2018

Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures.
Secur. Commun. Networks, 2018

Fine-Grained Big Traffic Data Reverse-charge System: A Method of Saving Expenses.
Mob. Networks Appl., 2018

Combined pre-detection and sleeping for energy-efficient spectrum sensing in cognitive radio networks.
J. Parallel Distributed Comput., 2018

Microservices Scheduling Model Over Heterogeneous Cloud-Edge Environments As Support for IoT Applications.
IEEE Internet Things J., 2018

Performance analysis of smart cultural heritage protection oriented wireless networks.
Future Gener. Comput. Syst., 2018

Power domain NOMA to support group communication in public safety networks.
Future Gener. Comput. Syst., 2018

CNN-based malicious user detection in social networks.
Concurr. Comput. Pract. Exp., 2018

Intelligent approaches for security technologies.
Concurr. Comput. Pract. Exp., 2018

Intelligent Power Equipment Management Based on Distributed Context-Aware Inference in Smart Cities.
IEEE Commun. Mag., 2018

A novel valuation pruning optimization fuzzing test model based on mutation tree for industrial control systems.
Appl. Soft Comput., 2018

Improved performance optimization for massive small files in cloud computing environment.
Ann. Oper. Res., 2018

Tensor 2-D DOA Estimation for a Cylindrical Conformal Antenna Array in a Massive MIMO System Under Unknown Mutual Coupling.
IEEE Access, 2018

Unsupervised translated word sense disambiguation in constructing bilingual lexical database.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Signal reception for successive interference cancellation in NOMA downlink.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018

Ontology modeling for APT attack detection in an IoT-based power system.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018

A survey on ocean observatory networks.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018

Vulnerability Analysis on a Secure USB: Based on a Commercial Product A.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

2017
Signaling game based strategy for secure positioning in wireless sensor networks.
Pervasive Mob. Comput., 2017

Channel allocation and power control schemes for cross-tier 3GPP LTE networks to support multimedia applications.
Multim. Tools Appl., 2017

Abnormal behaviour pattern mining for unknown threat detection.
Comput. Syst. Sci. Eng., 2017

Intelligent Handover Scheme for Drone Using Fuzzy Inference Systems.
IEEE Access, 2017

Study on a Text Reuse Measurement Method Using Expanded Index Term.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2017

Towards Affective Lifelogging with Information Fusion.
Proceedings of the 2017 International Conference on Intelligent Environments, 2017

A Study of Interference Cancellation for NOMA Downlink Near-Far Effect to Support Big Data.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

SwiftRank: An Unsupervised Statistical Approach of Keyword and Salient Sentence Extraction for Individual Documents.
Proceedings of the 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2017) / The 7th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2017) / Affiliated Workshops, 2017

Case study on password complexity enhancement for smart devices.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

APT attack behavior pattern mining using the FP-growth algorithm.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

2016
Power Allocation Scheme for Femto-to-Macro Downlink Interference Reduction for Smart Devices in Ambient Intelligence.
Mob. Inf. Syst., 2016

Intelligent Healthcare Service Using Health Lifelog Analysis.
J. Medical Syst., 2016

Adaptive authentication scheme for mobile devices in proxy MIPv6 networks.
IET Commun., 2016

Interference cancellation for non-orthogonal multiple access used in future wireless mobile networks.
EURASIP J. Wirel. Commun. Netw., 2016

Coordinated Scheduling Algorithm for System Utility Maximization With Heterogeneous QoS Requirements in Wireless Relay Networks.
IEEE Access, 2016

The Method of Semi-supervised Automatic Keyword Extraction for Web Documents using Transition Probability Distribution Generator.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2016

An Approach for Predicting Disease Outbreaks Using Fuzzy Inference among Physiological Variables.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Invisible Secure Keypad Solution Resilient against Shoulder Surfing Attacks.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

MMSE Based Interference Cancellation and Beamforming Scheme for Signal Transmission in IoT.
Proceedings of the Big Data Technologies and Applications - 7th International Conference, 2016

2015
Markov Logic Network Based Social Relation Inference for Personalized Social Search.
Proceedings of the New Trends in Computational Collective Intelligence, 2015

Personal information leakage detection method using the inference-based access control model on the Android platform.
Pervasive Mob. Comput., 2015

Polymorphic Malicious JavaScript Code Detection for APT Attack Defence.
J. Univers. Comput. Sci., 2015

Malicious behavior pattern mining using control flow graph.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015

Travel Destination Recommendation Based on Probabilistic Spatio-temporal Inference.
Proceedings of the Context-Aware Systems and Applications - 4th International Conference, 2015

Ontology Based APT Attack Behavior Analysis in Cloud Computing.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
Ontology-based access control model for security policy reasoning in cloud computing.
J. Supercomput., 2014

Intelligent healthcare service based on context inference using smart device.
Soft Comput., 2014

A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment.
Soft Comput., 2014

A semantic weighting method for document classification based on Markov logic networks.
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014

A Design of Sensor Data Ontology for a Large Scale Crop Growth Environment System.
Proceedings of the Scalable Information Systems - 5th International Conference, 2014

Research for the Pattern Analysis of Individual Interest Using SNS Data: Focusing on Facebook.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A Design of Web Log Integration Framework Using NoSQL.
Proceedings of the Information and Communication Technology, 2014

2013
Detecting Web based DDoS Attack using MapReduce operations in Cloud Computing Environment.
J. Internet Serv. Inf. Secur., 2013

Intelligent Reconfigurable Method of Cloud Computing Resources for Multimedia Data Delivery.
Informatica, 2013

Probabilistic spatio-temporal inference for motion event understanding.
Neurocomputing, 2013

2012
Detection of cross site scripting attack in wireless networks using n-Gram and SVM.
Mob. Inf. Syst., 2012

A Design of Onto-ACM(Ontology based Access Control Model) in Cloud Computing Environments.
J. Internet Serv. Inf. Secur., 2012

Document Classification through Building Specified N-Gram.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

2011
Automatic Enrichment of Semantic Relation Network and Its Application to Word Sense Disambiguation.
IEEE Trans. Knowl. Data Eng., 2011

Semantic relation extraction for automatically building domain ontology using a link grammar.
Proceedings of the Research in Applied Computation Symposium, 2011

Efficient Malicious Code Detection Using N-Gram Analysis and SVM.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

Extended Spatio-temporal Relations between Moving and Non-moving Objects.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2009
Travel Ontology for Intelligent Recommendation System.
Proceedings of the Third Asia International Conference on Modelling & Simulation, 2009

2008
Word Sense Disambiguation Based on Relation Structure.
Proceedings of the ALPIT 2008, 2008

2007
Efficient Image Retrieval Using Conceptualization of Annotated Images.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

Image Retrieval and Classification Through Conceptualization Based on WordNet.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2007

Trajectory Retrieval Using Similarity Measure According to Link Type between Motion Verbs.
Proceedings of the First Asia International Conference on Modelling and Simulation, 2007

Trajectory Annotation and Retrieval Based on Semantics.
Proceedings of the Adaptive Multimedial Retrieval: Retrieval, 2007

2006
Knowledge Representation for Video Assisted by Domain-Specific Ontology.
Proceedings of the Advances in Knowledge Acquisition and Management, 2006

Measuring Similarity in the Semantic Representation of Moving Objects in Video.
Proceedings of the Knowledge Science, 2006

A Method for Efficient Malicious Code Detection Based on Conceptual Similarity.
Proceedings of the Computational Science and Its Applications, 2006

Object Retrieval by Query with Sensibility Based on the KANSEI-Vocabulary Scale.
Proceedings of the Computer Vision in Human-Computer Interaction, 2006

Comparison Between Motion Verbs Using Similarity Measure for the Semantic Representation of Moving Object.
Proceedings of the Image and Video Retrieval, 5th International Conference, 2006


  Loading...