Jaewook Jung

Orcid: 0000-0002-4196-5154

According to our database1, Jaewook Jung authored at least 37 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Optimized Resource Utilization Scheme for Real-Time V2V Sidelink Unicast Communication in 5G Networks.
IEEE Wirel. Commun. Lett., October, 2023

OTOP: Optimized Transmission Power Controlled OBSS PD-Based Spatial Reuse for High Throughput in IEEE 802.11be WLANs.
IEEE Internet Things J., October, 2023

REVeno: RTT Estimation Based Multipath TCP in 5G Multi-RAT Networks.
IEEE Trans. Mob. Comput., September, 2023

2022
5G mmWave Multiple Active Protocol Stack Optimized Deep Learning Handover.
IEEE Wirel. Commun. Lett., 2022

Intelligent Dual Active Protocol Stack Handover Based on Double DQN Deep Reinforcement Learning for 5G mmWave Networks.
IEEE Trans. Veh. Technol., 2022

Multipath TCP Control Scheme for Low Latency and High Speed XR Real-Time M&S Devices.
Proceedings of the IEEE International Conference on Consumer Electronics, 2022

Partial Offloading MEC Optimization Scheme using Deep Reinforcement Learning for XR Real-Time M&S Devices.
Proceedings of the IEEE International Conference on Consumer Electronics, 2022

2021
DEFT: Multipath TCP for High Speed Low Latency Communications in 5G Networks.
IEEE Trans. Mob. Comput., 2021

2019
Multi-Scale Hierarchical CRF for Railway Electrification Asset Classification From Mobile Laser Scanning Data.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2019

Multipath Based Adaptive Concurrent Transfer for Real-Time Video Streaming Over 5G Multi-RAT Systems.
IEEE Access, 2019

Efficient Identity-Based Encryption from LWR.
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019

2018
Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity.
Secur. Commun. Networks, 2018

Cryptanalysis of a chaotic chebyshev polynomials based remote user authentication scheme.
Proceedings of the 2018 International Conference on Information Networking, 2018

Building Extraction From Satellite Images Using Mask R-CNN With Building Boundary Regularization.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018

2017
Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.
Sensors, 2017

Implicit Regularization for Reconstructing 3D Building Rooftop Models Using Airborne LiDAR Data.
Sensors, 2017

Robust Biometric-based Anonymous User Authenticated Key Agreement Scheme for Telecare Medicine Information Systems.
KSII Trans. Internet Inf. Syst., 2017

Improvement of Efficient and Secure Smart Card Based Password Authentication Scheme.
Int. J. Netw. Secur., 2017

Cryptanalysis and improvement of a biometric and smart card based remote user authentication scheme.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

An enhanced unlinkable anonymous payment scheme based on near field commnication.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Cryptanalysis and improvement of robust authentication scheme for telecare medicine information systems.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Cryptanalysis of an authentication scheme for multi-gateway wireless sensor networks.
Proceedings of the Twelfth International Conference on Digital Information Management, 2017

Cryptanalysis of Lightweight User Authentication Scheme Using Smartcard.
Proceedings of the Advances in Human Factors in Cybersecurity, 2017

2016
Matching Aerial Images to 3D Building Models Using Context-Based Geometric Hashing.
Sensors, 2016

An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.
Sensors, 2016

Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain.
Secur. Commun. Networks, 2016

Multi-Range Conditional Random Field for Classifying Railway Electrification System Objects Using Mobile Laser Scanning Data.
Remote. Sens., 2016

Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks.
J. Sensors, 2016

Improvement and Weakness of <i>Zero-Sum Defender</i> against Return-Oriented Programming Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Cryptanalysis and Improvement of Efficient Password-Based User Authentication Scheme using Hash Function.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

2015
Cryptanalysis of Dynamic ID-Based User Authentication Scheme Using Smartcards Without Verifier Tables.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

2014
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography.
Sensors, 2014

An enhanced remote user authentication scheme using smart card.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

2010
Measurement of initial motion of a flying golf ball with multi-exposure images for screen-golf.
IEEE Trans. Consumer Electron., 2010

Smile Like Hollywood Star: Face Components as Game Input.
Proceedings of the Entertainment Computing - ICEC 2010, 9th International Conference, 2010

Healthy Super Mario: Tap Your Stomach and Shout for Active Healthcare.
Proceedings of the Entertainment Computing - ICEC 2010, 9th International Conference, 2010

2008
Activity-Based Computing.
IEEE Pervasive Comput., 2008


  Loading...