Hoon Ko

Orcid: 0000-0002-4604-1735

According to our database1, Hoon Ko authored at least 84 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Correlation-based advanced feature analysis for wireless sensor networks.
J. Supercomput., May, 2024

Anomaly detection analysis based on correlation of features in graph neural network.
Multim. Tools Appl., March, 2024

A study on experience contents of Baekje Muryeong Royal tomb using virtual reality.
J. Ambient Intell. Humaniz. Comput., February, 2024

2023
Machine Learning for Detecting Blood Transfusion Needs Using Biosignals.
Comput. Syst. Sci. Eng., 2023

Classification of vertices on social networks by multiple approaches.
CoRR, 2023

Fuzzy-based secure exchange of digital data using watermarking in NSCT-RDWT-SVD domain.
Concurr. Comput. Pract. Exp., 2023

Gradient descent for quadratic functions using geometric mean and the Kai Fang method.
Concurr. Comput. Pract. Exp., 2023

AI advisor platform for disaster response based on big data.
Concurr. Comput. Pract. Exp., 2023

2022
Retraction Note to: Modeling for small cell networks in 5G communication environment.
Telecommun. Syst., 2022

Adaptive scheduling of acceleration and gyroscope for motion artifact cancelation in photoplethysmography.
Comput. Methods Programs Biomed., 2022

2021
Introduction to the Special Issue on Recent Trends in Medical Data Security for e-Health Applications.
ACM Trans. Multim. Comput. Commun. Appl., 2021

A Survey on Healthcare Data: A Security Perspective.
ACM Trans. Multim. Comput. Commun. Appl., 2021

Design and Implementation of BCI-based Intelligent Upper Limb Rehabilitation Robot System.
ACM Trans. Internet Techn., 2021

Influence of Features on Accuracy of Anomaly Detection for an Energy Trading System.
Sensors, 2021

Modeling of Recommendation System Based on Emotional Information and Collaborative Filtering.
Sensors, 2021

Method of Profanity Detection Using Word Embedding and LSTM.
Mob. Inf. Syst., 2021

A Special Section on Deep & Advanced Machine Learning Approaches for Human Behavior Analysis.
J. Inf. Process. Syst., 2021

Recent advances in multimedia security and information hiding.
Trans. Emerg. Telecommun. Technol., 2021

Customizing intelligent recommendation study with multiple advisors based on hierarchy structured fuzzy-analytic hierarchy process.
Concurr. Comput. Pract. Exp., 2021

Smart media and application.
Concurr. Comput. Pract. Exp., 2021

Cultural intelligence as education contents: Exploring the pedagogical aspects of effective functioning in higher education.
Concurr. Comput. Pract. Exp., 2021

2020
Intelligent Data Management and Security in Cloud Computing.
Sensors, 2020

Recognition System Using Fusion Normalization Based on Morphological Features of Post-Exercise ECG for Intelligent Biometrics.
Sensors, 2020

Smart home energy strategy based on human behaviour patterns for transformative computing.
Inf. Process. Manag., 2020

Extraction of abstracted sensory data to reduce the execution time of context-aware services in wearable computing environments.
Concurr. Comput. Pract. Exp., 2020

Personal identification study for touchable devices with ECG.
Concurr. Comput. Pract. Exp., 2020

Augmented reality for botulinum toxin injection.
Concurr. Comput. Pract. Exp., 2020

Deep Learning for Heart Rate Estimation From Reflectance Photoplethysmography With Acceleration Power Spectrum and Acceleration Intensity.
IEEE Access, 2020

Case Study: Continual Evaluation of IT Process Portfolio in SME based on Val IT 2.0.
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020

Robot Assisted Instantaneous Heart Rate Estimator using Camera based Remote Photoplethysmograpy via Plane-Orthogonal-to-Skin and Finite State Machine.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020

Feasible Study on Intracranial Hemorrhage Detection and Classification using a CNN-LSTM Network.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020

2019
A Study on User Recognition Using 2D ECG Image Based on Ensemble Networks for Intelligent Vehicles.
Wirel. Commun. Mob. Comput., 2019

Human-machine interaction: A case study on fake news detection using a backtracking based on a cognitive system.
Cogn. Syst. Res., 2019

ECG-Based Advanced Personal Identification Study With Adjusted (Q<sub>i</sub> * S<sub>i</sub>).
IEEE Access, 2019

Blog Reliability Analysis With Conflicting Interests of Contexts in the Extended Branch for Cyber-Security.
IEEE Access, 2019

Cultural Intelligence and ARCS Model for Digital Era.
Proceedings of the 9th International Conference on Web Intelligence, Mining and Semantics, 2019

Medical Information Protection Frameworks for Smart Healthcare based on IoT.
Proceedings of the 9th International Conference on Web Intelligence, Mining and Semantics, 2019

Feasibility Study of Deep Neural Network for Heart Rate Estimation from Wearable Photoplethysmography and Acceleration Signals.
Proceedings of the 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2019

ECG Security Challenges: Case Study on Change of ECG According to Time for User Identification.
Proceedings of the Handbook of Multimedia Information Security: Techniques and Applications., 2019

2018
A Study on Context-Relationship with Context-Attributes for a Smart Service Generation in Smart City.
J. Univers. Comput. Sci., 2018

A Study on Secure Contents Strategies for Applications With DRM on Cloud Computing.
Int. J. Cloud Appl. Comput., 2018

A smart service model in greenhouse environment using event-based security based on wireless sensor network.
Concurr. Comput. Pract. Exp., 2018

Generalized distributed compressive sensing with security challenges for linearly correlated information sources.
Concurr. Comput. Pract. Exp., 2018

Bio-inspired and cognitive approaches in cryptography and security applications.
Concurr. Comput. Pract. Exp., 2018

Cognitive systems and operations research in big data and cloud computing.
Ann. Oper. Res., 2018

Experimental comparisons with respect to the usage of the promising relations in EDA-based causal discovery.
Ann. Oper. Res., 2018

Analysis an identification with ECG base in augmented-reality.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018

2017
EKRUCAmI Architecture - Applications in Healthcare Domain.
Proceedings of the State of the Art in AI Applied to Ambient Intelligence, 2017

TARD: Temporary Access Rights Delegation for guest network devices.
J. Comput. Syst. Sci., 2017

A Pilot Study on Hip Bone Mineral Densities Estimation from Forearm CBCT images.
KSII Trans. Internet Inf. Syst., 2017

Security challenges with network functions virtualization.
Future Gener. Comput. Syst., 2017

A flexible architecture for orchestrating network security functions to support high-level security policies.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

2016
Similarity recognition using context-based pattern for cyber-society.
Soft Comput., 2016

A Study on the Secure User Profiling Structure and Procedure for Home Healthcare Systems.
J. Medical Syst., 2016

Intelligent Healthcare Service Using Health Lifelog Analysis.
J. Medical Syst., 2016

Reflectance pulse oximetry: Practical issues and limitations.
ICT Express, 2016

Multiple switching light sources based motion artifacts reduction in reflectance photoplethysmography.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016

Distributed Compressive Sensing for Correlated Information Sources.
Proceedings of the Big Data Technologies and Applications - 7th International Conference, 2016

2015
Design on the BPEL Engine Generator for Adding New Functions.
Proceedings of the HCI in Business - Second International Conference, 2015

2014
A Study on the Security Algorithm for Contexts in Smart Cities.
Int. J. Distributed Sens. Networks, 2014

Advance in Safe and Useful Social Network Services with Context-Sensitive Data in Cyber-Physical System.
Int. J. Distributed Sens. Networks, 2014

A Smart Service Robot Middleware on Ubiquitous Network Environments.
Intell. Autom. Soft Comput., 2014

2013
Analysis on Smart Warning System for Home Network in Smart Grid.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

2012
Context-Enriched and Location-Aware Services.
J. Comput. Networks Commun., 2012

Intelligent supervisory control system for home devices using a cyber physical approach.
Integr. Comput. Aided Eng., 2012

Towards context, cognitive, and secure computing.
Comput. Math. Appl., 2012

A study on dynamic state information (DSI) around users for safe urban life.
Comput. Math. Appl., 2012

Horizontal Search Method for Wikipedia Category Grouping.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

Secure Contents Design and Implement of Smart Home Management System in OISCS.
Proceedings of the Future Generation Information Technology - 4th International Conference, 2012

Environmental Impact Assessment (EIA) and Photo-Manipulation Techniques.
Proceedings of the Computer Applications for Bio-technology, Multimedia, and Ubiquitous City, 2012

2011
A Privacy Technique for Providing Anonymity to Sensor Nodes in a Sensor Network.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Study on Group Key Agreement Using Two-Dimensional Array in Sensor Network Environment.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Contexts-Management Strategy in Considering the Security in Urban Computing Based on Urban Design.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

A Study on Context Services Model with Location Privacy.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
Optimal Intelligent Supervisory Control System in Cyber-Physical Intelligence.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

A Survey of Context Classfication for Intelligent Systems Research for Ambient Intelligence.
Proceedings of the CISIS 2010, 2010

2009
A Study on Users Authentication Method for Safety Group Decision System in Dynamic Small Group.
J. Convergence Inf. Technol., 2009

Safety High Accuracy Context-Aware Matrix (CAM) Making Based on X.509 Proxy Certificate.
Proceedings of the Advances in Information Security and Assurance, 2009

A study on Security Status Matrix (SSM) in Urban Computing.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Issues for Applying Instant Messaging to Smart Home Systems.
Proceedings of the Computational Science and Its Applications, 2009

A Study on Secure Contents Using in Urban Computing.
Proceedings of the Security Technology, 2009

2007
A Design of Authentication Protocol for Multi-key RFID Tag.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

2005
Safe Authentication Method for Security Communication in Ubiquitous.
Proceedings of the Computational Science and Its Applications, 2005

A Study on Secure Group Transmission in Group Environment.
Proceedings of the 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 2005


  Loading...