Jong Hyuk Park
Orcid: 0000-0003-1831-0309Affiliations:
- Seoul National University of Science and Technology (Seoultech), Department of Computer Science and Engineering, South Korea
- Kyungnam University, Department of Computer Science and Engineering, Changwon, South Korea (former)
- Hanwha S&C Co. Ltd., Seoul, South Korea (former)
- Waseda University, Graduate School of Human Sciences, Japan (former, PhD 2012)
- Korea University, Graduate School of Information Security, Seoul, South Korea (former, PhD 2007)
According to our database1,
Jong Hyuk Park
authored at least 520 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Int. J. Hum. Comput. Interact., November, 2024
Cogn. Comput., November, 2024
IEEE J. Biomed. Health Informatics, September, 2024
Guest Editorial: Generative Artificial Intelligence at the Edge in The Modern Internet of Things.
IEEE Internet Things Mag., May, 2024
Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions.
J. Ambient Intell. Humaniz. Comput., February, 2024
FL-CTIF: A federated learning based CTI framework based on information fusion for secure IIoT.
Inf. Fusion, February, 2024
J. Ambient Intell. Humaniz. Comput., January, 2024
Digital twin-assisted resource allocation framework based on edge collaboration for vehicular edge computing.
Future Gener. Comput. Syst., January, 2024
A comprehensive survey of digital twins: Applications, technologies and security challenges.
J. Syst. Archit., 2024
Leveraging application permissions and network traffic attributes for Android ransomware detection.
J. Netw. Comput. Appl., 2024
GRU-based digital twin framework for data allocation and storage in IoT-enabled smart home networks.
Future Gener. Comput. Syst., 2024
Digital Twin and federated learning enabled cyberthreat detection system for IoT networks.
Future Gener. Comput. Syst., 2024
Comput. Networks, 2024
IEEE Access, 2024
Proceedings of the 2024 International Conference on Multimedia Retrieval, 2024
2023
Machine Learning-Based Reversible Chaotic Masking Method for User Privacy Protection in CCTV Environment.
J. Inf. Process. Syst., December, 2023
A digital twin-based edge intelligence framework for decentralized decision in IoV system.
Inf. Sci., November, 2023
A Novel Smart Contract based Optimized Cloud Selection Framework for Efficient Multi-Party Computation.
J. Inf. Process. Syst., April, 2023
Federated Learning-Based Secure Electronic Health Record Sharing Scheme in Medical Informatics.
IEEE J. Biomed. Health Informatics, February, 2023
J. Inf. Process. Syst., February, 2023
Data-Driven Design of Electrically Conductive Nanocomposite Materials: A Case Study of Acrylonitrile-Butadiene-Styrene/Carbon Nanotube Binary Composites.
Adv. Intell. Syst., February, 2023
TaLWaR: Blockchain-Based Trust Management Scheme for Smart Enterprises With Augmented Intelligence.
IEEE Trans. Ind. Informatics, 2023
Secure and Reliable Big-Data-Based Decision Making Using Quantum Approach in IIoT Systems.
Sensors, 2023
FusionFedBlock: Fusion of blockchain and federated learning to preserve privacy in industry 5.0.
Inf. Fusion, 2023
Proceedings of the IEEE International Conference on Data Mining, 2023
2022
SecureIIoT Environment: Federated Learning Empowered Approach for Securing IIoT From Data Breach.
IEEE Trans. Ind. Informatics, 2022
A Blockchain-Enabled Secure Digital Twin Framework for Early Botnet Detection in IIoT Environment.
Sensors, 2022
Blockchain-Based Distributed Information Hiding Framework for Data Privacy Preserving in Medical Supply Chain Systems.
Sensors, 2022
J. Netw. Comput. Appl., 2022
J. Ambient Intell. Humaniz. Comput., 2022
SecureCPS: Cognitive inspired framework for detection of cyber attacks in cyber-physical systems.
Inf. Process. Manag., 2022
Comput. Networks, 2022
BIIoVT: Blockchain-Based Secure Storage Architecture for Intelligent Internet of Vehicular Things.
IEEE Consumer Electron. Mag., 2022
CoVAC: A P2P smart contract-based intelligent smart city architecture for vaccine manufacturing.
Comput. Ind. Eng., 2022
A Machine Learning based Scalable Blockchain architecture for a secure Healthcare system.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022
Blockchain-based Federated Approach for Privacy-Preserved IoT-enabled Smart Vehicular Networks.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022
2021
Blockchain-Based Secure Mist Computing Network Architecture for Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2021
A Blockchain-Based Deep Learning Approach for Cyber Security in Next Generation Industrial Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021
Ensemble learning-based prediction of contentment score using social multimedia in education.
Multim. Tools Appl., 2021
J. Inf. Process. Syst., 2021
J. Inf. Secur. Appl., 2021
Int. J. Commun. Syst., 2021
Int. J. Commun. Syst., 2021
Machine learning based distributed big data analysis framework for next generation web in IoT.
Comput. Sci. Inf. Syst., 2021
Comput. Sci. Inf. Syst., 2021
Securing Smart Cities using LSTM algorithm and lightweight containers against botnet attacks.
Appl. Soft Comput., 2021
Deep Learning and Blockchain-Empowered Security Framework for Intelligent 5G-Enabled IoT.
IEEE Access, 2021
2020
J. Supercomput., 2020
IEEE Netw., 2020
J. Inf. Process. Syst., 2020
J. Inf. Process. Syst., 2020
Enhanced Machine Learning Algorithms: Deep Learning, Reinforcement learning and Q-learning.
J. Inf. Process. Syst., 2020
Future Trends of IoT, 5G Mobile Networks, and AI: Challenges, Opportunities, and Solutions.
J. Inf. Process. Syst., 2020
J. Inf. Process. Syst., 2020
J. Inf. Process. Syst., 2020
J. Inf. Process. Syst., 2020
Waiting Time Minimized Charging and Discharging Strategy Based on Mobile Edge Computing Supported by Software-Defined Network.
IEEE Internet Things J., 2020
Hum. centric Comput. Inf. Sci., 2020
Hum. centric Comput. Inf. Sci., 2020
BlockIoTIntelligence: A Blockchain-enabled Intelligent IoT Architecture with Artificial Intelligence.
Future Gener. Comput. Syst., 2020
Adaptive resource management using many-core processing for fault tolerance based on cyber-physical cloud systems.
Future Gener. Comput. Syst., 2020
Cognitive scenario generation computing in the Internet of things for enterprise information systems.
Enterp. Inf. Syst., 2020
Concurr. Comput. Pract. Exp., 2020
Malware classification algorithm using advanced Word2vec-based Bi-LSTM for ground control stations.
Comput. Commun., 2020
IEEE Consumer Electron. Mag., 2020
Introduction to the Special Section on Artificial Intelligence-based Information Security.
Comput. Electr. Eng., 2020
Wearable Computing for Defence Automation: Opportunities and Challenges in 5G Network.
IEEE Access, 2020
A Study on the Digital Forensic Investigation Method of Clever Malware in IoT Devices.
IEEE Access, 2020
IEEE Access, 2020
2019
A Unified Framework for Behaviour Monitoring and Abnormality Detection for Smart Home.
Wirel. Commun. Mob. Comput., 2019
A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions.
J. Supercomput., 2019
A blockchain-based decentralized efficient investigation framework for IoT digital forensics.
J. Supercomput., 2019
IEEE Trans. Ind. Informatics, 2019
Symmetry, 2019
DeepCachNet: A Proactive Caching Framework Based on Deep Learning in Cellular Networks.
IEEE Netw., 2019
Affective social big data generation algorithm for autonomous controls by CRNN-based end-to-end controls.
Multim. Tools Appl., 2019
Mob. Networks Appl., 2019
BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network.
J. Netw. Comput. Appl., 2019
Future Trends of Blockchain and Crypto Currency: Challenges, Opportunities, and Solutions.
J. Inf. Process. Syst., 2019
Future Trends of AI-based Smart Systems and Services: Challenges, Opportunities, and Solutions.
J. Inf. Process. Syst., 2019
J. Inf. Process. Syst., 2019
Emerging Technologies for Sustainable Smart City Network Security: Issues, Challenges, and Countermeasures.
J. Inf. Process. Syst., 2019
J. Inf. Process. Syst., 2019
J. Inf. Process. Syst., 2019
Guest Editorial Special Issue on Advanced Computational Technologies in Mobile Edge Computing for the Internet of Things.
IEEE Internet Things J., 2019
Hum. centric Comput. Inf. Sci., 2019
Multilevel learning based modeling for link prediction and users' consumption preference in Online Social Networks.
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Adaptive job allocation scheduler based on usage pattern for computing offloading of IoT.
Future Gener. Comput. Syst., 2019
Comput. Hum. Behav., 2019
2018
An improved ant colony optimization-based approach with mobile sink for wireless sensor networks.
J. Supercomput., 2018
J. Supercomput., 2018
J. Supercomput., 2018
Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities.
IEEE Trans. Ind. Informatics, 2018
MTD-Spamguard: a moving target defense-based spammer detection system in social network.
Soft Comput., 2018
Soft Comput., 2018
An efficient approach to understanding social evolution of location-focused online communities in location-based services.
Soft Comput., 2018
J. Parallel Distributed Comput., 2018
A novel framework for internet of knowledge protection in social networking services.
J. Comput. Sci., 2018
Development of A Textile Capacitive Proximity Sensor and Gait Monitoring System for Smart Healthcare.
J. Medical Syst., 2018
J. Inf. Process. Syst., 2018
J. Inf. Process. Syst., 2018
A Survey on Cyber Physical System Security for IoT: Issues, Challenges, Threats, Solutions.
J. Inf. Process. Syst., 2018
J. Inf. Process. Syst., 2018
J. Inf. Process. Syst., 2018
J. Inf. Process. Syst., 2018
J. Inf. Process. Syst., 2018
J. Ambient Intell. Humaniz. Comput., 2018
EH-HL: Effective Communication Model by Integrated EH-WSN and Hybrid LiFi/WiFi for IoT.
IEEE Internet Things J., 2018
Human-intelligence workflow management for the big data of augmented reality on cloud infrastructure.
Neurocomputing, 2018
Hum. centric Comput. Inf. Sci., 2018
Future Gener. Comput. Syst., 2018
OpCloudSec: Open cloud software defined wireless network security for the Internet of Things.
Comput. Commun., 2018
Traffic management in the mobile edge cloud to improve the quality of experience of mobile video.
Comput. Commun., 2018
SoftEdgeNet: SDN Based Energy-Efficient Distributed Network Architecture for Edge Computing.
IEEE Commun. Mag., 2018
SLP-MCAF: Multiple Clusters of Connected Vehicles Authentication Framework in a Smart Life Platform.
IEEE Commun. Mag., 2018
DistArch-SCNet: Blockchain-Based Distributed Architecture with Li-Fi Communication for a Scalable Smart City Network.
IEEE Consumer Electron. Mag., 2018
Appl. Soft Comput., 2018
SpamSpotter: An efficient spammer detection framework based on intelligent decision support system on Facebook.
Appl. Soft Comput., 2018
Job Allocation Mechanism for Battery Consumption Minimization of Cyber-Physical-Social Big Data Processing Based on Mobile Cloud Computing.
IEEE Access, 2018
IEEE Access, 2018
IEEE Access, 2018
Remote Software Update in Trusted Connection of Long Range IoT Networking Integrated With Mobile Edge Cloud.
IEEE Access, 2018
A Fog Computing-Based Automotive Data Overload Protection System with Real-Time Analysis.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018
2017
J. Signal Process. Syst., 2017
Energy-efficient cluster-based dynamic routes adjustment approach for wireless sensor networks with mobile sinks.
J. Supercomput., 2017
Novel assessment method for accessing private data in social network security services.
J. Supercomput., 2017
DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks.
J. Supercomput., 2017
A shortest path planning algorithm for cloud computing environment based on multi-access point topology analysis for complex indoor spaces.
J. Supercomput., 2017
J. Supercomput., 2017
S-Detector: an enhanced security model for detecting Smishing attack for mobile computing.
Telecommun. Syst., 2017
Symmetry, 2017
Unmanned Aerial Vehicle Flight Point Classification Algorithm Based on Symmetric Big Data.
Symmetry, 2017
Symmetry, 2017
A light-weight secure information transmission and device control scheme in integration of CPS and cloud computing.
Microprocess. Microsystems, 2017
Adaptive power management scheme using many-core for maximizing network topology lifetime based on ubiquitous computing.
J. Syst. Archit., 2017
Adaptive data rate control in low power wide area networks for long range IoT services.
J. Comput. Sci., 2017
Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City.
J. Inf. Process. Syst., 2017
XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs.
J. Inf. Process. Syst., 2017
J. Inf. Process. Syst., 2017
Novel Approaches for Applying Linguistic Processing Techniques Based on Pattern Recognition and Machine Learning.
J. Inf. Process. Syst., 2017
J. Inf. Process. Syst., 2017
J. Inf. Process. Syst., 2017
Advanced Communications and Artificial Intelligence, and Introduction of the JIPS AWARD 2016.
J. Inf. Process. Syst., 2017
J. Inf. Process. Syst., 2017
An improved recommendation algorithm for big data cloud service based on the trust in sociology.
Neurocomputing, 2017
Neurocomputing, 2017
Magnetically-coupled boost-forward converter for high efficiency differential power processing systems.
IEICE Electron. Express, 2017
Hum. centric Comput. Inf. Sci., 2017
DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks.
IEEE Commun. Mag., 2017
DFA-AD: a distributed framework architecture for the detection of advanced persistent threats.
Clust. Comput., 2017
Radio resource management for data transmission in low power wide area networks integrated with large scale cyber physical systems.
Clust. Comput., 2017
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017
DSS-SL: Dynamic Signage System Based on SDN with LiFi Communication for Smart Buildings.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
Bootstrapping Distantly Supervised IE Using Joint Learning and Small Well-Structured Corpora.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017
2016
Wirel. Pers. Commun., 2016
Intelligent Security Model of Smart Phone Based on Human Behavior in Mobile Cloud Computing.
Wirel. Pers. Commun., 2016
Efficient Resource Management Scheme for Storage Processing in Cloud Infrastructure with Internet of Things.
Wirel. Pers. Commun., 2016
RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks.
J. Supercomput., 2016
J. Supercomput., 2016
Design of secure authentication scheme between devices based on zero-knowledge proofs in home automation service environments.
J. Supercomput., 2016
J. Supercomput., 2016
Relative weight comparison between virtual key factors of cloud computing with analytic network process.
J. Supercomput., 2016
Telecommun. Syst., 2016
Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World.
Symmetry, 2016
The Design and Analysis of a Secure Personal Healthcare System Based on Certificates.
Symmetry, 2016
Optional Frame Selection Algorithm for Adaptive Symmetric Service of Augmented Reality Big Data on Smart Devices.
Symmetry, 2016
Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments.
Sensors, 2016
A Reliable TTP-Based Infrastructure with Low Sensor Resource Consumption for the Smart Home Multi-Platform.
Sensors, 2016
Minimum Interference Channel Assignment Algorithm for Multicast in a Wireless Mesh Network.
Sensors, 2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Multim. Tools Appl., 2016
All-in-focus and multi-focus color image reconstruction from a database of color and depth image pairs.
Multim. Tools Appl., 2016
An effective locking scheme of smart multimedia devices with convenience and enhanced security.
Multim. Tools Appl., 2016
The disclosure of evaporating digital trails respecting the combinations of Gmail and IE for pervasive multimedia.
Multim. Tools Appl., 2016
Knowl. Eng. Rev., 2016
J. Netw. Comput. Appl., 2016
[EDITORIAL] Advances in Multimedia Computing and Security and the Introduction of New Senior Editors.
J. Inf. Process. Syst., 2016
[Editorial] Advanced Technologies and Applications for Security and Multimedia Computing.
J. Inf. Process. Syst., 2016
HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet.
J. Inf. Process. Syst., 2016
k-Cliques mining in dynamic social networks based on triadic formal concept analysis.
Neurocomputing, 2016
Location based authentication scheme using BLE for high performance digital content management system.
Neurocomputing, 2016
Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing.
Entropy, 2016
Beacon-based active media control interface in indoor ubiquitous computing environment.
Clust. Comput., 2016
Introduction to the special section on parallel architectures, algorithms and programming.
Comput. Electr. Eng., 2016
Energy-Efficient Distributed Topology Control Algorithm for Low-Power IoT Communication Networks.
IEEE Access, 2016
Proceedings of the International SoC Design Conference, 2016
Solving Standard Cell Placement Problem Using Discrete Firefly Algorithm: A Nature Inspired Approach.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016
Security Requirements and Countermeasures for Secure Home Network in Internet of Things.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016
Proceedings of the 19th International Conference on Artificial Intelligence and Statistics, 2016
2015
Output Effect Evaluation Based on Input Features in Neural Incremental Attribute Learning for Better Classification Performance.
Symmetry, 2015
Design of a Distributed Personal Information Access Control Scheme for Secure Integrated Payment in NFC.
Symmetry, 2015
Symmetry, 2015
The Digital Fingerprinting Analysis Concerning <i>Google Calendar</i> under Ubiquitous Mobile Computing Era.
Symmetry, 2015
Online Social Snapshots of a Generic Facebook Session Based on Digital Insight Data for a Secure Future IT Environment.
Symmetry, 2015
Multim. Tools Appl., 2015
Multim. Tools Appl., 2015
Multim. Tools Appl., 2015
Multim. Syst., 2015
J. Ambient Intell. Smart Environ., 2015
Inf., 2015
Int. J. Distributed Sens. Networks, 2015
Attendance Check System and Implementation for Wi-Fi Networks Supporting Unlimited Number of Concurrent Connections.
Int. J. Distributed Sens. Networks, 2015
An efficient authentication system of smart device using multi factors in mobile cloud service architecture.
Int. J. Commun. Syst., 2015
Hum. centric Comput. Inf. Sci., 2015
s-ITSF: a service based intelligent transportation system framework for smart accident management.
Hum. centric Comput. Inf. Sci., 2015
An efficient character input scheme with a gyro sensor of smartphone on ubiquitous cluster computing.
Clust. Comput., 2015
Bayesian Probability-Based Motion Estimation Method in Ubiquitous Computing Environments.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
2014
Cloud computing-based jam management for a manufacturing system in a Green IT environment.
J. Supercomput., 2014
J. Supercomput., 2014
Posted price model based on GRS and its optimization for improving grid resource sharing efficiency.
Telecommun. Syst., 2014
Navigation-based self-optimization handover mechanism for mobile relay stations in WiMAX networks.
Telecommun. Syst., 2014
Symmetry, 2014
An Interactive IPTV System With Community Participation in Cloud Computing Environments.
IEEE Syst. J., 2014
Secur. Commun. Networks, 2014
Digital evidence discovery of networked multimedia smart devices based on social networking activities.
Multim. Tools Appl., 2014
Multimedia contents adaptation by modality conversion with user preference in wireless network.
J. Netw. Comput. Appl., 2014
J. Intell. Manuf., 2014
J. Appl. Math., 2014
An Efficient and Secure <i>m</i>-IPS Scheme of Mobile Devices for Human-Centric Computing.
J. Appl. Math., 2014
Introduction to the thematic issue on Ambient and Smart Component Technologies for Human Centric Computing.
J. Ambient Intell. Smart Environ., 2014
Inf. Sci., 2014
Int. J. Distributed Sens. Networks, 2014
An ANP-Based Practical Quality Model for a Secure Embedded System with Sensor Network.
Int. J. Distributed Sens. Networks, 2014
Visual Scheme Monitoring of Sensors for Fault Tolerance on Wireless Body Area Networks with Cloud Service Infrastructure.
Int. J. Distributed Sens. Networks, 2014
Ensuring Healthcare Services Provision: An Integrated Approach of Resident Contexts Extraction and Analysis via Smart Objects.
Int. J. Distributed Sens. Networks, 2014
Visualization of dynamic fault tolerance rerouting for data traffic in wireless sensor network.
Int. J. Commun. Syst., 2014
Int. J. Ad Hoc Ubiquitous Comput., 2014
An enhanced smartphone security model based on information security management system (ISMS).
Electron. Commer. Res., 2014
Clust. Comput., 2014
Clust. Comput., 2014
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
Wirel. Pers. Commun., 2013
An anomaly-based detection in ubiquitous network using the equilibrium state of the catastrophe theory.
J. Supercomput., 2013
J. Supercomput., 2013
Data center selection based on neuro-fuzzy inference systems in cloud computing environments.
J. Supercomput., 2013
Revisiting reorder buffer architecture for next generation high performance computing.
J. Supercomput., 2013
J. Supercomput., 2013
Erratum to: Effective session key distribution for secure fast handover in mobile networks.
Telecommun. Syst., 2013
Advances in security and multimodality for pervasive computing environments - TS Special Issue.
Telecommun. Syst., 2013
Design and implementation of a wireless sensor network architecture using smart mobile devices.
Telecommun. Syst., 2013
Perceptual quality based error control for scalable on-demand streaming in next-generation wireless networks.
Telecommun. Syst., 2013
A RF4CE-based remote controller with interactive graphical user interface applied to home automation system.
ACM Trans. Embed. Comput. Syst., 2013
Efficient localization scheme with ring overlapping by utilizing mobile anchors in wireless sensor networks.
ACM Trans. Embed. Comput. Syst., 2013
Modeling user-generated contents: an intelligent state machine for user-centric search support.
Pers. Ubiquitous Comput., 2013
Pers. Ubiquitous Comput., 2013
Pers. Ubiquitous Comput., 2013
Pers. Ubiquitous Comput., 2013
Multim. Tools Appl., 2013
Multim. Tools Appl., 2013
Concurrent multipath transmission with forward error correction mechanism to overcome burst packet losses for delay-sensitive video streaming in wireless home networks.
Multim. Tools Appl., 2013
An Efficient Dynamic Integration Middleware for Cyber-Physical Systems in Mobile Environments.
Mob. Networks Appl., 2013
J. Syst. Archit., 2013
Structure-free message aggregation and routing in traffic information system (SMART).
J. Netw. Comput. Appl., 2013
A QoS Model for a RFID Enabled Application with Next-Generation Sensors for Manufacturing Systems.
Int. J. Distributed Sens. Networks, 2013
Int. J. Distributed Sens. Networks, 2013
Maximizing Network Lifetime of Directional Sensor Networks Considering Coverage Reliability.
Int. J. Distributed Sens. Networks, 2013
Int. J. Distributed Sens. Networks, 2013
Load balancing and adaptive scheduling for data intensive prioritised traffic in multi-radio multi-channel wireless mesh networks.
Int. J. Ad Hoc Ubiquitous Comput., 2013
Electron. Commer. Res., 2013
Adaptive network-based fuzzy inference model on CPS for large scale intelligent and cooperative surveillance.
Computing, 2013
Comput. Math. Appl., 2013
Comput. Math. Appl., 2013
Comput. J., 2013
High availability and efficient energy consumption for cloud computing service with grid infrastructure.
Comput. Electr. Eng., 2013
A novel and efficient source-path discovery and maintenance method for application layer multicast.
Comput. Electr. Eng., 2013
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013
Proceedings of the Multimedia and Ubiquitous Engineering, 2013
Proceedings of the Information Technology Convergence, 2013
Proceedings of the Information Technology Convergence, 2013
Proceedings of the International Joint Conference on Awareness Science and Technology & Ubi-Media Computing, 2013
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
2012
The weighted shortest path search based on multi-agents in mobile GIS management services.
Wirel. Commun. Mob. Comput., 2012
An interference-aware multichannel media access control protocol for wireless sensor networks.
J. Supercomput., 2012
An authentication protocol offering service anonymity of mobile device in ubiquitous environment.
J. Supercomput., 2012
Efficient scheme of verifying integrity of application binaries in embedded operating systems.
J. Supercomput., 2012
A self-adaptive K selection mechanism for re-authentication load balancing in large-scale systems.
J. Supercomput., 2012
Design and simulation of a hierarchical priority fairness scheduler in an uplink Worldwide Interoperability for Microwave Access system.
Simul., 2012
Improved RF4CE key agreement approach involving two-phase key distribution for smart-convergence home device.
Secur. Commun. Networks, 2012
Secur. Commun. Networks, 2012
Secur. Commun. Networks, 2012
A partially reconstructed previous Gmail session by live digital evidences investigation through volatile data acquisition.
Secur. Commun. Networks, 2012
Guest editorial: Theme issue on smartphone applications and services for pervasive computing.
Pers. Ubiquitous Comput., 2012
Pers. Ubiquitous Comput., 2012
Multim. Tools Appl., 2012
Intelligent video surveillance system: 3-tier context-aware surveillance system with metadata.
Multim. Tools Appl., 2012
A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment.
Math. Comput. Model., 2012
J. Netw. Comput. Appl., 2012
J. Intell. Manuf., 2012
Study on the common criteria methodology for secure ubiquitous environment construction.
J. Intell. Manuf., 2012
Int. J. Commun. Syst., 2012
Int. J. Ad Hoc Ubiquitous Comput., 2012
MSNS: mobile sensor network simulator for area coverage and obstacle avoidance based on GML.
EURASIP J. Wirel. Commun. Netw., 2012
Chain-to-chain inventory transshipment model and robust switch control in CSC networks.
Concurr. Comput. Pract. Exp., 2012
MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012
The Partial Digital Evidence Disclosure in Respect to the Instant Messaging Embedded in Viber Application Regarding an Android Smart Phone.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012
Proceedings of the Advances in Grid and Pervasive Computing - 7th International Conference, 2012
Design and Implementation of Improved Authentication System for Android Smartphone Users.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
Wirel. Pers. Commun., 2011
Wirel. Pers. Commun., 2011
Ontology Based Resource Usage Policy Matching in Computational Grid for Pervasive Computing Applications.
Wirel. Pers. Commun., 2011
Wirel. Commun. Mob. Comput., 2011
Security analysis and improvements of IEEE standard 802.16 in next generation wireless metropolitan access network.
Wirel. Commun. Mob. Comput., 2011
Wirel. Commun. Mob. Comput., 2011
Wirel. Commun. Mob. Comput., 2011
Admissible bilinear map-based key management protocol for HPCCS in heterogeneous network.
J. Supercomput., 2011
A portable UPnP-based high performance content sharing system for supporting multimedia devices.
J. Supercomput., 2011
Policy-Based Scheduling and Resource Allocation for Multimedia Communication on Grid Computing Environment.
IEEE Syst. J., 2011
An Emergency-Adaptive Routing Scheme for Wireless Sensor Networks for Building Fire Hazard Monitoring.
Sensors, 2011
Throughput Fairness Enhancement Using Differentiated Channel Access in Heterogeneous Sensor Networks.
Sensors, 2011
Math. Comput. Model., 2011
Live Data Mining Concerning Social Networking Forensics Based on a Facebook Session Through Aggregation of Social Data.
IEEE J. Sel. Areas Commun., 2011
J. Netw. Comput. Appl., 2011
Enhanced HCCA mechanism for multimedia traffics with QoS support in IEEE 802.11e networks.
J. Netw. Comput. Appl., 2011
J. Medical Syst., 2011
J. Inf. Process. Syst., 2011
A security management scheme for failure detector distributed systems based on self-tuning control theory.
J. Intell. Manuf., 2011
Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems.
Inf. Syst. Frontiers, 2011
Inf. Fusion, 2011
Using Multi-Modal Semantic Association Rules to fuse keywords and visual features automatically for Web image retrieval.
Inf. Fusion, 2011
Int. J. Internet Protoc. Technol., 2011
Int. J. Commun. Syst., 2011
A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication.
Int. J. Commun. Syst., 2011
Quantum entanglement and non-locality based secure computation for future communication.
IET Inf. Secur., 2011
Efficient sensor node authentication in third generation-wireless sensor networks integrated networks.
IET Commun., 2011
EURASIP J. Wirel. Commun. Netw., 2011
A Novel Approach to Detect Network Attacks Using G-HMM-Based Temporal Relations between Internet Protocol Packets.
EURASIP J. Wirel. Commun. Netw., 2011
Robust one-time password authentication scheme using smart card for home network environment.
Comput. Commun., 2011
Special issue of computer communications on information and future communication security.
Comput. Commun., 2011
Preface to Special Section on Intelligent Multimedia Systems and Data Management for UBI-COM.
Comput. Informatics, 2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Digital Trails Discovering of a GPS Embedded Smart Phone - Take Nokia N78 Running Symbian S60 Ver 3.2 for Example.
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011
A High-Capacity CDMA Watermarking Scheme Based on Orthogonal Pseudorandom Sequence Subspace Projection.
Proceedings of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, 2011
A Study on the Performance of Wireless Localization System Based on AoA in WSN Environment.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
A Study on the Performance Improvement of Impulse-Radio System in Multiple Interference Environment.
Proceedings of the 2011 International Conference on Broadband, 2011
Design and Analysis of a MST-Based Topology Control Scheme with PSO for Wireless Sensor Networks.
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011
2010
Wirel. Pers. Commun., 2010
Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments.
Wirel. Pers. Commun., 2010
J. Supercomput., 2010
J. Supercomput., 2010
Design and implementation of a framework for building distributed smart object systems.
J. Supercomput., 2010
Telecommun. Syst., 2010
Telecommun. Syst., 2010
Telecommun. Syst., 2010
Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device.
Telecommun. Syst., 2010
Simul. Model. Pract. Theory, 2010
The Domain Decomposition Method for Maxwell's Equations in Time Domain Simulations with Dispersive Metallic Media.
SIAM J. Sci. Comput., 2010
Special issue on advanced intelligent multimedia applications for next generation environments.
Multim. Tools Appl., 2010
Multim. Tools Appl., 2010
A portable toolkit for supporting end-user personalization and control in context-aware applications.
Multim. Tools Appl., 2010
Multim. Tools Appl., 2010
ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Advanced Mobile Applications and Intelligent Multimedia systems for Ubi-Com".
Mob. Networks Appl., 2010
Mob. Networks Appl., 2010
A Framework for Engineering Pervasive Applications Applied to Intra-vehicular Sensor Network Applications.
Mob. Networks Appl., 2010
Power-Aware and Reliable Sensor Selection Based on Trust for Wireless Sensor Networks.
J. Commun., 2010
A sensing policy based on the statistical property of licensed channel in cognitive network.
Int. J. Internet Protoc. Technol., 2010
Int. J. Commun. Syst., 2010
Int. J. Ad Hoc Ubiquitous Comput., 2010
Multi-path transmission control scheme combining bandwidth aggregation and packet scheduling for real-time streaming in multi-path environment.
IET Commun., 2010
IET Commun., 2010
Predictive control for vehicular sensor networks based on round-trip time-delay prediction.
IET Commun., 2010
Intell. Autom. Soft Comput., 2010
Intell. Autom. Soft Comput., 2010
IEEE Intell. Syst., 2010
EURASIP J. Wirel. Commun. Netw., 2010
Comput. Stand. Interfaces, 2010
A secure model for controlling the hubs in P2P wireless network based on trust value.
Comput. Commun., 2010
Special issue of computers and mathematics with applications on "Advances in cryptography, security and applications for future computer science".
Comput. Math. Appl., 2010
Comput. Math. Appl., 2010
Comput. J., 2010
An Efficient Localization Scheme with Ring Overlapping by Utilizing Mobile Anchors in Wireless Sensor Networks.
Proceedings of the 4th International Conference on Multimedia and Ubiquitous Engineering, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
2009
Performance Optimization with Efficient Polling Mechanism in IEEE 802.16 Networks with Cross-Layer Consideration.
Wirel. Pers. Commun., 2009
Towards a Performance-Based Resource Server Access Control in Future Grid Communication Environments.
Wirel. Pers. Commun., 2009
Editorial: Special Issue on "Information Security and Data Protection in Future Generation Communication and Networking".
Wirel. Pers. Commun., 2009
RHS-US: Real-Time Hash-Chain Scheme Decreasing Pre-Calculation Mechanism for Ubiquitous Services.
Wirel. Pers. Commun., 2009
Telecommun. Syst., 2009
Pers. Ubiquitous Comput., 2009
Pers. Ubiquitous Comput., 2009
Pers. Ubiquitous Comput., 2009
On modeling and evaluating multicomputer transcoding architectures for live-video streams.
Multim. Tools Appl., 2009
A Neural Network Based Vehicle Classification System for Pervasive Smart Road Security.
J. Univers. Comput. Sci., 2009
J. Univers. Comput. Sci., 2009
J. Intell. Manuf., 2009
Ubiquitous software controller to prevent deadlocks for automated guided vehicle systems in a container port terminal environment.
J. Intell. Manuf., 2009
Privacy and fair information practices in ubiquitous environments: Research challenges and future directions.
Internet Res., 2009
An efficient collusion resistant security mechanism for heterogeneous sensor networks.
Internet Res., 2009
Int. J. Commun. Syst., 2009
Security analysis of mCrypton proper to low-cost ubiquitous computing devices and applications.
Int. J. Commun. Syst., 2009
Int. J. Commun. Syst., 2009
Int. J. Commun. Syst., 2009
Job partition and allocation using the prediction model in non-dedicated heterogeneous wireless network environments.
IET Commun., 2009
Special Section On Embedded System And Software For IPC Guest Editorial - Guest Editorial.
Intell. Autom. Soft Comput., 2009
Intelligent Decision-Making System with Green Pervasive Computing for Renewable Energy Business in Electricity Markets on Smart Grid.
EURASIP J. Wirel. Commun. Netw., 2009
Comput. Commun., 2009
Comput. Networks, 2009
SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems.
Comput. J., 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009
Adaptive Multi-channel Utilization Scheme for Coexistence of IEEE802.15.4 LR-WPAN with Other Interfering Systems.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009
The Detection and Response Mechanism against Abnormal Traffic Attack in ATN Network.
Proceedings of the 2009 International Conference on Security & Management, 2009
Implementation of Rate Control in Distributed Wireless Multicast by Neural Network Prediction.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Decentralized Flocking Algorithms for a Swarm of Mobile Robots: Problem, Current Research and Future Directions.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009
2008
Wirel. Commun. Mob. Comput., 2008
U-multimedia framework: a secure and intelligent multimedia service framework based on context information in U-home.
J. Supercomput., 2008
On improving resource utilization and system throughput of master slave job scheduling in heterogeneous systems.
J. Supercomput., 2008
IET Commun., 2008
EURASIP J. Wirel. Commun. Netw., 2008
Comput. Commun., 2008
Comput. Commun., 2008
A compensation scheme of fingerprint distortion using combined radial basis function model for ubiquitous services.
Comput. Commun., 2008
Predictive handoff mechanism with real-time mobility tracking in a campus wide wireless network considering ITS.
Comput. Commun., 2008
A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008
Extraction of Residual Information in the Microsoft PowerPoint file from the Viewpoint of Digital Forensics considering PerCom Environment.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008
Investigating Wireless Sensor Network Lifetime Using a Realistic Radio Communication Model.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008
A study on authentication/authorization/accounting and roaming mechanism in pervasive environment.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Adaptive Scheduling Mechanisms toward Intelligent Services in Mobile and Wireless RFID Environments.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Performance Evaluations of the FTOG Framework for Effective Object Management and Load Distribution.
Proceedings of the 15th Euromicro International Conference on Parallel, 2007
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
Intelligent Home Network Authentication: Home Device Authentication Using Device Certification.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
PIS-CC RBAC: Patient Information Service based on CC-RBAC in Next Generation Hospital considering Ubiquitous Intelligent Environment.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007
Proceedings of the Advances in Multimedia Modeling, 2007
A Centralized-Abstraction and Replicated-View Architecture Running on Ubiquitous Networks for Collaborative Multimedia Distance Education Services.
Proceedings of the Advances in Multimedia Modeling, 2007
Proceedings of the Third International Conference on Natural Computation, 2007
Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems.
Proceedings of the Future Generation Communication and Networking, 2007
Proceedings of the Future Generation Communication and Networking, 2007
A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Performance Analysis of Location Estimation Algorithm in ZigBee Networks Using Received Signal Strength.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
IEICE Trans. Inf. Syst., 2006
A DRBAC Model Based on Context for Smart and Secure Services in Intelligent Ubiquitous Home.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
<i>ui</i>H-PMAC Model Suitable for Ubi-Home Gateway in Ubiquitous Intelligent Environment.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
A Hybrid Intelligent Multimedia Service Framework in Next Generation Home Network Environment.
Proceedings of the Advances in Hybrid Information Technology, 2006
Proceedings of the Advances in Hybrid Information Technology, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the High Performance Computing and Communications, 2006
<i>C-i</i>UMS: Context Based Smart and Secure Multimedia Service in Intelligent Ubiquitous Home.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Design and Implementation of the IMS-IPMP System in Convergence Home-Network Environment.
Proceedings of the Digital Libraries: Implementing Strategies and Sharing Experiences, 2005
User-Oriented Multimedia Service Using Smart Sensor Agent Module in the Intelligent Home.
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2001
Proceedings of the 19th International Conference on Computer Design (ICCD 2001), 2001