Jaewook Jung
Orcid: 0000-0002-4196-5154
According to our database1,
Jaewook Jung
authored at least 37 papers
between 2008 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Optimized Resource Utilization Scheme for Real-Time V2V Sidelink Unicast Communication in 5G Networks.
IEEE Wirel. Commun. Lett., October, 2023
OTOP: Optimized Transmission Power Controlled OBSS PD-Based Spatial Reuse for High Throughput in IEEE 802.11be WLANs.
IEEE Internet Things J., October, 2023
IEEE Trans. Mob. Comput., September, 2023
2022
IEEE Wirel. Commun. Lett., 2022
Intelligent Dual Active Protocol Stack Handover Based on Double DQN Deep Reinforcement Learning for 5G mmWave Networks.
IEEE Trans. Veh. Technol., 2022
Multipath TCP Control Scheme for Low Latency and High Speed XR Real-Time M&S Devices.
Proceedings of the IEEE International Conference on Consumer Electronics, 2022
Partial Offloading MEC Optimization Scheme using Deep Reinforcement Learning for XR Real-Time M&S Devices.
Proceedings of the IEEE International Conference on Consumer Electronics, 2022
2021
IEEE Trans. Mob. Comput., 2021
2019
Multi-Scale Hierarchical CRF for Railway Electrification Asset Classification From Mobile Laser Scanning Data.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2019
Multipath Based Adaptive Concurrent Transfer for Real-Time Video Streaming Over 5G Multi-RAT Systems.
IEEE Access, 2019
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019
2018
Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity.
Secur. Commun. Networks, 2018
Cryptanalysis of a chaotic chebyshev polynomials based remote user authentication scheme.
Proceedings of the 2018 International Conference on Information Networking, 2018
Building Extraction From Satellite Images Using Mask R-CNN With Building Boundary Regularization.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018
2017
Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.
Sensors, 2017
Implicit Regularization for Reconstructing 3D Building Rooftop Models Using Airborne LiDAR Data.
Sensors, 2017
Robust Biometric-based Anonymous User Authenticated Key Agreement Scheme for Telecare Medicine Information Systems.
KSII Trans. Internet Inf. Syst., 2017
Int. J. Netw. Secur., 2017
Cryptanalysis and improvement of a biometric and smart card based remote user authentication scheme.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
Cryptanalysis and improvement of robust authentication scheme for telecare medicine information systems.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
Cryptanalysis of an authentication scheme for multi-gateway wireless sensor networks.
Proceedings of the Twelfth International Conference on Digital Information Management, 2017
Proceedings of the Advances in Human Factors in Cybersecurity, 2017
2016
Sensors, 2016
An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.
Sensors, 2016
Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain.
Secur. Commun. Networks, 2016
Multi-Range Conditional Random Field for Classifying Railway Electrification System Objects Using Mobile Laser Scanning Data.
Remote. Sens., 2016
Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks.
J. Sensors, 2016
Improvement and Weakness of <i>Zero-Sum Defender</i> against Return-Oriented Programming Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Cryptanalysis and Improvement of Efficient Password-Based User Authentication Scheme using Hash Function.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
2015
Cryptanalysis of Dynamic ID-Based User Authentication Scheme Using Smartcards Without Verifier Tables.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015
2014
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography.
Sensors, 2014
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014
2010
Measurement of initial motion of a flying golf ball with multi-exposure images for screen-golf.
IEEE Trans. Consumer Electron., 2010
Proceedings of the Entertainment Computing - ICEC 2010, 9th International Conference, 2010
Proceedings of the Entertainment Computing - ICEC 2010, 9th International Conference, 2010
2008