Jin Young Choi

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
Human Joint Angle Estimation Using Deep Learning-Based Three-Dimensional Human Pose Estimation for Application in a Real Environment.
Sensors, June, 2024

Propagation and Masking Characteristics of Errors During Software Testing in Synchronous Programming.
IEEE Access, 2024

A Novel Scheme for Managing Multiple Context Transitions While Ensuring Consistency in Text-to-Image Generative Artificial Intelligence.
IEEE Access, 2024

A Novel Scheme for Generating Context-Aware Images Using Generative Artificial Intelligence.
IEEE Access, 2024

NIR to LWIR Image Translation for Generating LWIR Image Datasets.
Proceedings of the International Conference on Electronics, Information, and Communication, 2024

2023
Security Attacks Against the Availability of Low Earth Orbit Satellite Networks.
Proceedings of the 12th International Conference on Networks, Communication and Computing, 2023

2022
Formal Modeling of Smart Contract-based Trading System.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

2021
Three-Dimensional Digital Superimposition of Orthodontic Bracket Position by Using a Computer-Aided Transfer Jig System: An Accuracy Analysis.
Sensors, 2021

Detection of Dental Caries and Cracks with Quantitative Light-Induced Fluorescence in Comparison to Radiographic and Visual Examination: A Retrospective Case Study.
Sensors, 2021

Evaluation of Periodontal Risk Factors with Quantitative Light-Induced Fluorescence Based Fluorescent Plaque Index, in Comparison to Radiographic and Oral Health Habit Scoring: A Retrospective Case Study.
Sensors, 2021

Computerized Assessment of Occlusion and Muscle Activity during Use of a Multilayer Clear Retainer: A Preliminary Study.
Sensors, 2021

Effect of Different Head Hole Position on the Rotational Resistance and Stability of Orthodontic Miniscrews: A Three-Dimensional Finite Element Study.
Sensors, 2021

Effect of Different Surface Designs on the Rotational Resistance and Stability of Orthodontic Miniscrews: A Three-Dimensional Finite Element Study.
Sensors, 2021

Is a False Positive really False Positive?
Proceedings of the 23rd International Conference on Advanced Communication Technology, 2021

2020
Hierarchical Anomaly Detection Model for In-Vehicle Networks Using Machine Learning Algorithms.
Sensors, 2020

Risk management-based security evaluation model for telemedicine systems.
BMC Medical Informatics Decis. Mak., 2020

Gaussian-response correlation filter for robust visual object tracking.
Neurocomputing, 2020

Constraint-Based Schedulability Analysis in Multiprocessor Real-Time Systems.
IEEE Access, 2020

Medical Device Safety Management Using Cybersecurity Risk Analysis.
IEEE Access, 2020

Analysis of software weakness detection of CBMC based on CWE.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

2019
Formal Modeling and Verification of Software-Defined Networking with Multiple Controllers.
Proceedings of the Testbeds and Research Infrastructures for the Development of Networks and Communications, 2019

Risk and avoidance strategy for blocking mechanism of SDN-based security service.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

2018
Advanced Power Sharing Method to Improve the Energy Efficiency of Multiple Battery Energy Storages System.
IEEE Trans. Smart Grid, 2018

Automatic Prevention of Buffer Overflow Vulnerability Using Candidate Code Generation.
IEICE Trans. Inf. Syst., 2018

Reliable Approximated Number System with Exact Bounds and Three-Valued Logic.
Comput. Syst. Sci. Eng., 2018

Constraint Solving Approach to Schedulability Analysis in Real-Time Systems.
IEEE Access, 2018

2017
A process algebraic approach to the schedulability analysis and workload abstraction of hierarchical real-time systems.
J. Log. Algebraic Methods Program., 2017

Formal Specification and Verification of System of Systems Using UPPAAL: A Case Study of a Defensive Missile Systems.
J. Commun., 2017

MemPatrol: Reliable Sideline Integrity Monitoring for High-Performance Systems.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

2016
Optimizing the resource requirements of hierarchical scheduling systems.
SIGBED Rev., 2016

A design framework for hierarchical ensemble of multiple feature extractors and multiple classifiers.
Pattern Recognit., 2016

A Verification Method of SDN Firewall Applications.
IEICE Trans. Commun., 2016

Hierarchical System Schedulability Analysis Framework Using UPPAAL.
IEICE Trans. Inf. Syst., 2016

2015
Formal synthesis of application and platform behaviors of embedded software systems.
Softw. Syst. Model., 2015

Verification for NFV-enabled network services.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015

2014
Combining histogram-wise and pixel-wise matchings for kernel tracking through constrained optimization.
Comput. Vis. Image Underst., 2014

Monitoring Translation Lookahead Buffers to Detect Code Injection Attacks.
Computer, 2014

Detecting SQL injection attacks using query result size.
Comput. Secur., 2014

Using a Process Algebraic Approach of Verifying Access Control in XML-based Healthcare Systems.
J. Res. Pract. Inf. Technol., 2014

The Research on Vulnerability Analysis in OpenADR for Smart Grid.
Proceedings of the Data Analytics for Renewable Energy Integration, 2014

Cooperative control between the distributed energy resources in AC/DC hybrid microgrid.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2014

2013
Deriving System Behavior from UML State Machine Diagram: Applied to Missile Project.
J. Univers. Comput. Sci., 2013

Formal Modeling and Verification of SDN-OpenFlow.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

2012
Secure communication in IPTV broadcasting.
J. Supercomput., 2012

Process Algebraic Specification of Software Defined Networks.
Proceedings of the Fourth International Conference on Computational Intelligence, 2012

Formal specifications for software-defined networking.
Proceedings of the 7th International Conference on Future Internet Technologies, 2012

2011
Generating composite behavior of embedded software components based on UML behavioral model and process algebra.
ACM SIGSOFT Softw. Eng. Notes, 2011

Spatial Modelling for Mobile Robot's Vision-based Navigation.
J. Intell. Robotic Syst., 2011

Improved User Authentication Scheme with User Anonymity for Wireless Communications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

A Thyristor-Only Input ESD Protection Scheme for CMOS RF ICs.
Circuits Syst., 2011

2010
Timed and Resource-oriented Statecharts for Embedded Software.
IEEE Trans. Ind. Informatics, 2010

UML Behavior Models of Real-Time Embedded Software for Model-Driven Architecture.
J. Univers. Comput. Sci., 2010

A Comparison Study of Input ESD Protection Schemes Utilizing NMOS, Thyristor, and Diode Devices.
Commun. Netw., 2010

Security analysis of smart card based password authentication schemes.
Proceedings of the 3rd International Conference on Information Sciences and Interaction Sciences (ICIS 2010), 2010

Modeling autonomous military robots using hybrid system framework.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2010

Abnormal Traffic Detection Using Intelligent Driver Model.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

A Process Algebraic Framework for Modeling Resource Demand and Supply.
Proceedings of the Formal Modeling and Analysis of Timed Systems, 2010

2009
Ensuring Sound Numerical Simulation of Hybrid Automata.
J. Comput. Sci. Eng., 2009

Model Checking of Real-Time Properties of Resource-Bound Process Algebra.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Enhanced password-based simple three-party key exchange protocol.
Comput. Electr. Eng., 2009

Cryptanalysis of Secure Key Exchange Protocol between STB and Smart Card in IPTV Broadcasting.
Proceedings of the Advances in Information Security and Assurance, 2009

An Energy Efficient Concentric Clustering Scheme in Wireless Sensor Networks.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

2008
Secure Handover Protocol for Mobile WiMAX Networks.
IEICE Trans. Inf. Syst., 2008

Formal Verification of Cryptographic Protocol for Secure RFID System.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

A Calculus to Reduce Spatial and Temporal Complexity for Specification and Analysis of Complex Real-Time Systems.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

A Lightweight Protocol Analysis and Modification for Secure RFID System.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

Weaknesses Analysis and Countermeasure of a Verifier-Based Key Agreement Protocol.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Extended Concentric-Clustering Routing Scheme Adapted to Various Environments of Sensor Networks.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

2007
Resource-Oriented Design Framework for Embedded System Components.
Proceedings of the 4th International Workshop on Formal Aspects of Component Software, 2007

Formal Embedded Operating System Model Based on Resource-Based Design Framework.
Proceedings of the Seventh International Conference on Quality Software (QSIC 2007), 2007

A novel algorithm for polyp detection using Eigen decomposition of Hessian-matrix for CT colonography CAD: validation with physical phantom study.
Proceedings of the Medical Imaging 2007: Computer-Aided Diagnosis, San Diego, 2007

RFID Privacy Protection Scheme for Secure Ubiquitous Computing.
Proceedings of the RFID Technology - Concepts, Applications, Challenges, Proceedings of the 1st International Workshop on RFID Technology, 2007

A Light-weight Security Protocol for RFID System.
Proceedings of the Personal Wireless Communications, 2007

Security and Privacy Analysis of RFID Authentication Protocol for Ubiquitous Computing.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Embedded System Modeling Based on Resource-Oriented Model.
Proceedings of the 14th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2007), 2007

The Design and Verification of RFID Authentication Protocol for Ubiquitous Computing.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

A Secure Communication Protocol for Low-Cost RFID System.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

2006
Threat Evaluation Method for Distributed Network Environment.
J. Inf. Sci. Eng., 2006

Formal Verification of Security Model Using SPR Tool.
Comput. Artif. Intell., 2006

A Medium Access Control Scheme for Providing Reliability in Wireless <i>Ad Hoc</i> Networks.
Proceedings of the Wireless Algorithms, 2006

Transformation of the Ravenscar Profile Based Ada Real-time Application to the Verification-ready Statecharts: Reverse Engineering and Statemate approach.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006

Security and Privacy Analysis of RFID Systems Using Model Checking.
Proceedings of the High Performance Computing and Communications, 2006

Security Analysis of RFID Authentication for Pervasive Systems using Model Checking.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

Secrecy Analysis of Purchase Transaction in Electronic Purses.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

The Vulnerabilities Analysis and Design of the Security Protocol for RFID System.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

2005
A Video Streaming System for Mobile Phones: Practice and Experience.
Wirel. Networks, 2005

Exploiting NIC architectural support for enhancing IP-based protocols on high-performance networks.
J. Parallel Distributed Comput., 2005

System Resource Utilization Analysis Based on Model Checking Method.
Informatica (Slovenia), 2005

Model Checking of RADIUS Protocol in Wireless Networks.
IEICE Trans. Commun., 2005

Model-Based Analysis of Money Accountability in Electronic Purses.
Proceedings of the Internet and Network Economics, First International Workshop, 2005

Analysis of Security Protocols with Certificate over Open Networks: Electronic Payment System.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

Automatic Generation of the C# Code for Security Protocols Verified with Casper/FDR.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Answer Set Semantics for Prioritized Defaults Logic.
IEICE Trans. Inf. Syst., 2004

New S/Key System against Dictionary Attack: A Case Study in Casper and CSP/FDR.
Proceedings of the Verification and Validation of Enterprise Information Systems, 2004

FDR verification of ESANP protocol in Ad hoc Network.
Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 2004

Formal Specification and Verification of Embedded System with Shared Resources.
Proceedings of the 15th IEEE International Workshop on Rapid System Prototyping (RSP 2004), 2004

Sound Code Generation from Communicating Hybrid Models.
Proceedings of the Hybrid Systems: Computation and Control, 7th International Workshop, 2004

Formal Specification of Business Rules using Z.
Proceedings of the 2nd International Conference Computing, 2004

Development of RTOS for PLC Using Formal Methods.
Proceedings of the Automated Technology for Verification and Analysis: Second International Conference, 2004

An anti-windup design for single input adaptive control systems in strict feedback form.
Proceedings of the 2004 American Control Conference, 2004

Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Firmware-Level Latency Analysis on a Gigabit Network.
J. Supercomput., 2003

SSR : Statechart with shared resources.
Proceedings of the 2003 IEEE Symposium on Human Centric Computing Languages and Environments (HCC 2003), 2003

Process Algebraic Model of Superscalar Processor Programs for Instruction Level Timing Analysis.
Proceedings of the Parallel Computing Technologies, 2003

Formal Modeling for a Real-Time Scheduler and Schedulability Analysis.
Proceedings of the Parallel Computing Technologies, 2003

2002
Flux observer with online tuning of stator and rotor resistances for induction motors.
IEEE Trans. Ind. Electron., 2002

Bottleneck Analysis of a Gigabit Network Interface Card: Formal Verification Approach.
Proceedings of the Model Checking of Software, 2002

2001
Comments on 'The Model Checker SPIN'.
IEEE Trans. Software Eng., 2001

A visual component based tool for developing embedded application software.
Proceedings of the Universal Access In HCI: Towards an Information Society for All, 2001

A Family of Resource-Bound Real-Time Process Algebras.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2001

Distributed Test using Logical Clock.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2001

2000
Use of neural networks in iterative learning control systems.
Int. J. Syst. Sci., 2000

Equivalence Checking of Two Statechart Specifications.
Proceedings of the 11th IEEE International Workshop on Rapid System Prototyping (RSP 2000), 2000

A Framework for Embedded Real-Time System Design.
Proceedings of the Parallel and Distributed Processing, 2000

Second-order multilayer perceptrons and its optimization with genetic algorithms.
Proceedings of the 2000 Congress on Evolutionary Computation, 2000

1998
A Process Algebraic Approach to the Schedulability Analysis of Real-Time Systems.
Real Time Syst., 1998

Neural Iterative Learning Control for Unknown Nonlinear Systems.
Neural Parallel Sci. Comput., 1998

Symbolic Schedulability Analysis of Real-Time Systems.
Proceedings of the 19th IEEE Real-Time Systems Symposium, 1998

1997
A Complete Axiomatization of Finite-State ACSR Processes.
Inf. Comput., 1997

Specification and verification of real-time systems using ACSR-VP.
Proceedings of the 4th International Workshop on Real-Time Computing Systems and Applications (RTCSA '97), 1997

The Design and Evaluation of Policy-Controllable Buffer Cache.
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997

1996
Computationally Efficient Fuzzy Adaptive Equalizer for Nonlinear Channels.
J. Intell. Fuzzy Syst., 1996

Evolutionary Learning Algorithm for Projection Neural Networks.
Proceedings of the Simulated Evolution and Learning, First Asia-Pacific Conference, 1996

1995
Adaptive nonlinear equalizer with reduced computational complexity.
Signal Process., 1995

Partially trained neural networks with self-localizing capability for function approximations.
Neural Parallel Sci. Comput., 1995

The Specification and Schedulability Analysis of Real-Time Systems using ACSR.
Proceedings of the 16th IEEE Real-Time Systems Symposium, 1995

A Graphical Language with Formal Semantics for the Specification and Analysis of Real-Time Systems.
Proceedings of the 16th IEEE Real-Time Systems Symposium, 1995

Adaptive learning control of affine nonlinear systems using piecewise linearly trained networks.
Proceedings of International Conference on Neural Networks (ICNN'95), Perth, WA, Australia, November 27, 1995

1994
Constructive neural networks with piecewise interpolation capabilities for function approximations.
IEEE Trans. Neural Networks, 1994

1993
Construction of neural networks for piecewise approximation of continuous functions.
Proceedings of International Conference on Neural Networks (ICNN'88), San Francisco, CA, USA, March 28, 1993

1992
Sensitivity analysis of multilayer perceptron with differentiable activation functions.
IEEE Trans. Neural Networks, 1992


  Loading...