Sang-Soo Yeo

Orcid: 0000-0002-0224-0150

According to our database1, Sang-Soo Yeo authored at least 84 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
POSNet: a hybrid deep learning model for efficient person re-identification.
J. Supercomput., August, 2023

An efficient deep learning-assisted person re-identification solution for intelligent video surveillance in smart cities.
Frontiers Comput. Sci., August, 2023

Secure Gait Recognition-Based Smart Surveillance Systems Against Universal Adversarial Attacks.
J. Database Manag., 2023

A Triplet-Branch Convolutional Neural Network for Part-Based Gait Recognition.
Comput. Syst. Sci. Eng., 2023

2022
Exploiting vulnerability of convolutional neural network-based gait recognition system.
J. Supercomput., 2022

2018
Schmitt trigger-based single-ended 7T SRAM cell for Internet of Things (IoT) applications.
J. Supercomput., 2018

A general compiler for password-authenticated group key exchange protocol in the standard model.
Discret. Appl. Math., 2018

2017
Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices.
Multim. Tools Appl., 2017

DBN wavelet transform denoising method in soybean straw composition based on near-infrared rapid detection.
J. Real Time Image Process., 2017

2016
Unsupervised noise reduction scheme for voice-based information retrieval in mobile environments.
Multim. Tools Appl., 2016

2015
Cloud, grid, P2P and internet computing: Recent trends and future directions.
Peer-to-Peer Netw. Appl., 2015

Pattern recognition technologies for multimedia information processing.
Multim. Tools Appl., 2015

Advanced Service Technology and Application in Smart Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

A Study on Hash Chain-Based Hadoop Security Scheme.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

2014
Editorial of special section on Hybrid Information Security Technologies: part II.
J. Supercomput., 2014

The quality model for e-learning system with multimedia contents: a pairwise comparison approach.
Multim. Tools Appl., 2014

Enhanced ID-Based Authentication Scheme Using OTP in Smart Grid AMI Environment.
J. Appl. Math., 2014

Authentication Method for Privacy Protection in Smart Grid Environment.
J. Appl. Math., 2014

Dynamic Access Control Model for Security Client Services in Smart Grid.
Int. J. Distributed Sens. Networks, 2014

Secure Model against APT in m-Connected SCADA Network.
Int. J. Distributed Sens. Networks, 2014

2013
Editorial of special section on hybrid information security technologies - part I.
J. Supercomput., 2013

Bridging the semantic gap in multimedia emotion/mood recognition for ubiquitous computing environment.
J. Supercomput., 2013

Secure D-CAS system for digital contents downloading services.
J. Supercomput., 2013

Advances in wireless sensor communications and applications for smart space.
Telecommun. Syst., 2013

Generating knowledge for the identification of device failure causes and the prediction of the times-to-failure in u-Healthcare environments.
Pers. Ubiquitous Comput., 2013

Genetic algorithm for effective open port selection for a web filter.
Pers. Ubiquitous Comput., 2013

Editorial: advances in multimedia and ubiquitous technologies for the new era.
Multim. Tools Appl., 2013

A hybrid user authentication protocol for mobile IPTV service.
Multim. Tools Appl., 2013

Advanced processing technologies and applications for mobile communication systems.
Int. J. Commun. Syst., 2013

Serial Dictatorial Rule-Based Games for Camera Selection.
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013

An Adaptive Intelligent Recommendation Scheme for Smart Learning Contents Management Systems.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

Security Considerations in Cloud Computing Virtualization Environment.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Network Anomaly Detection for M-Connected SCADA Networks.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

Known-Key Attack-Resilient Cluster Key Management.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

2012
FSH scheme for high-speed handover and anti-MITM on mobile computing.
J. Supercomput., 2012

A novel method for SQL injection attack detection based on removing SQL query attribute values.
Math. Comput. Model., 2012

Integrated inventory and transportation decision for ubiquitous supply chain management.
J. Intell. Manuf., 2012

Software process certification system based on K-model for high-performance software engineering.
Concurr. Comput. Pract. Exp., 2012

A Study on the Design of Digital Narrowband Communication System for Next Generation Group Communication.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Automated Security Level Conversion on Security Documents in Different Domains.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Related-Key Attack on the MD-64 Block Cipher Suitable for Pervasive Computing Environments.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Resilient Security Mechanism for Wireless Ad hoc Network.
Wirel. Pers. Commun., 2011

A GHS-Based Intelligent Management Platform with IP-Camera Security System.
Wirel. Pers. Commun., 2011

A novel design of variable-rate RS encoder for ubiquitous high performance multimedia service in Gbps transmission system.
J. Supercomput., 2011

Robust one-time password authentication scheme using smart card for home network environment.
Comput. Commun., 2011

Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value.
Comput. Commun., 2011

A Study on Automated Security Level Conversion Scheme for Multi-level Secure Documents.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

IPTV and Secure Digital Contents Downloading.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

A Study on the Performance of Wireless Localization System Based on AoA in WSN Environment.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

A Study on the Performance Improvement of Impulse-Radio System in Multiple Interference Environment.
Proceedings of the 2011 International Conference on Broadband, 2011

2010
Robust Deniable Authentication Protocol.
Wirel. Pers. Commun., 2010

Design and implementation of a framework for building distributed smart object systems.
J. Supercomput., 2010

Performance evaluation with DEVS formalism and implementation of active emergency call system for realtime location and monitoring.
Simul. Model. Pract. Theory, 2010

A portable toolkit for supporting end-user personalization and control in context-aware applications.
Multim. Tools Appl., 2010

A Fast Formation Flocking Scheme for a Group of Interactive Distributed Mobile Nodes in Autonomous Networks.
Mob. Networks Appl., 2010

Multi-frame Beacon Management for constructing interference-avoided LR-WPAN.
Int. J. Ad Hoc Ubiquitous Comput., 2010

A Pervasive Secret Sharing Scheme For Embedded Visual Communication System.
Intell. Autom. Soft Comput., 2010

Context-Aware Middleware for Multimedia Services in Heterogeneous Networks.
IEEE Intell. Syst., 2010

An integrated parallel GNFS algorithm for integer factorization based on Linbox Montgomery block Lanczos method over GF(2).
Comput. Math. Appl., 2010

Global Top-k Aggregate Queries Based on X-tuple in Uncertain Database.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
Protecting Your Privacy with a Mobile Agent Device in RFID Environment.
Wirel. Pers. Commun., 2009

Robust and secure routing scheme for wireless multihop network.
Pers. Ubiquitous Comput., 2009

Modeling of an Intelligent e-Consent System in a Healthcare Domain.
J. Univers. Comput. Sci., 2009

Job partition and allocation using the prediction model in non-dedicated heterogeneous wireless network environments.
IET Commun., 2009

Intelligent Decision-Making System with Green Pervasive Computing for Renewable Energy Business in Electricity Markets on Smart Grid.
EURASIP J. Wirel. Commun. Netw., 2009

Analysis and Synthesis of Spatial Parameters Using MDCT.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

Adaptive Multi-channel Utilization Scheme for Coexistence of IEEE802.15.4 LR-WPAN with Other Interfering Systems.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009

Security and Efficiency Analyses of Security Mechanisms in e-Passport Systems.
Proceedings of the 2009 International Conference on Security & Management, 2009

A Resource Management System for Fault Tolerance in Grid Computing.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Performance Evaluation of Hybrid Multipath Mobile Ad Hoc Network.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
A robust and secure time-domain ICI canceller for OFDM based ubiquitous systems in time-varying multipath channels.
J. Supercomput., 2008

Time Stamp Protocol for Smart Environment Services.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Online Games and Security Issues.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Enhanced Yoking Proof Protocols for RFID Tags and Tag Groups.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
eMARP: Enhanced Mobile Agent for RFID Privacy Protection and Forgery Detection.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

Hybrid Tag Anti-collision Algorithms in RFID Systems.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

An Analysis of RFID Tag Authentication Protocols Using Secret Value.
Proceedings of the Future Generation Communication and Networking, 2007

MarSelHR: A Haplotype Reconstruction System Using Linkage Disequilibrium.
Proceedings of the Frontiers in the Convergence of Bioscience and Information Technologies 2007, 2007

A Practical Proxy Device for Protecting RFID Tag's Identifier.
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007

2006
MARP: Mobile Agent for RFID Privacy Protection.
Proceedings of the Smart Card Research and Advanced Applications, 2006

2005
A New Scheme for the Location Information Protection in Mobile Communication Environments.
Proceedings of the Computer Network Security, 2005

Scalable and Flexible Privacy Protection Scheme for RFID Systems.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005


  Loading...