Tai-Myung Chung
Orcid: 0000-0002-7687-8114
According to our database1,
Tai-Myung Chung
authored at least 171 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Mood Disorder Severity and Subtype Classification Using Multimodal Deep Neural Network Models.
Sensors, January, 2024
Feature Distribution-Based Medical Data Augmentation: Enhancing Mood Disorder Classification.
IEEE Access, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
2023
Sensors, 2023
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023
Proceedings of the IEEE International Conference on Agents, 2023
Development of a Handwriting Drawings Assessment System for Early Parkinson's Disease Identification with Deep Learning Methods.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2023
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2023
A Digital Therapeutics System for the Diagnosis and Management of Depression: Work in Progress.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2023
2022
An Improved YOLO V5 Model for Pulmonary Nodule Detection with Synthetic Data Generated by GAN.
Proceedings of the IEEE Smartworld, 2022
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022
Optimal transfer-interval frequency to minimize data loss in BLE network for healthcare service.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022
Security and Privacy Issues and Solutions in Federated Learning for Digital Healthcare.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2022
2021
SN Comput. Sci., 2021
Int. J. Web Inf. Syst., 2021
Compare Where It Matters: Using Layer-Wise Regularization To Improve Federated Learning on Heterogeneous Data.
CoRR, 2021
Personalized Federated Learning with Clustering: Non-IID Heart Rate Variability Data Application.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021
Proceedings of the Future Data and Security Engineering - 8th International Conference, 2021
Innovative Way of Detecting Atrial Fibrillation Based on HRV Features Using AI-Techniques.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2021
A Novel Approach to Detect and Monitor COVID-19 Infection Using Transfer Learning Concept in AI.
Proceedings of the Advances in Human Factors and Ergonomics in Healthcare and Medical Devices, 2021
2020
Boundary-RRT* Algorithm for Drone Collision Avoidance and Interleaved Path Re-planning.
J. Inf. Process. Syst., 2020
J. Commun., 2020
Proceedings of the Future Data and Security Engineering - 7th International Conference, 2020
Malicious-Traffic Classification Using Deep Learning with Packet Bytes and Arrival Time.
Proceedings of the Future Data and Security Engineering - 7th International Conference, 2020
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2020
2019
Comprehensive Survey on Internet of Things, Architecture, Security Aspects, Applications, Related Technologies, Economic Perspective, and Future Directions.
J. Inf. Process. Syst., 2019
Mathematical Modeling of the Scalable LISP-deployed Software-Defined Wireless Network.
J. Commun., 2019
Profiling-Based Classification Algorithms for Security Applications in Internet of Things.
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019
An efficient MSD protection and authentication scheme for automotive ICT based emergency call system.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
Proceedings of the Future Data and Security Engineering - 6th International Conference, 2019
2018
A novel architecture of Proxy-LMA mobility management scheme for software-based smart factory networking.
Int. J. Commun. Syst., 2018
The Scalable LISP-Deployed Software-Defined Wireless Network (LISP-SDWN) for a Next Generation Wireless Network.
IEEE Access, 2018
2017
Design and Performance Analysis of Sensor Proxy-AAA Authentication Scheme Based on Fast Handover and Forwarding Mode for IP-based Internet of Things.
EAI Endorsed Trans. Mob. Commun. Appl., 2017
Leveraging Software-Defined Wireless Network (SDWN) by Locator/Identifier Split Scheme for Mobility Management.
J. Commun., 2017
Design of the Central LISP Management System for the Software-Defined Wireless Network (SDWN).
Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access, 2017
ProFiOt: Abnormal Behavior Profiling (ABP) of IoT devices based on a machine learning approach.
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017
Proceedings of the Information Science and Applications 2017, 2017
2016
IEICE Trans. Inf. Syst., 2016
Method of Detecting Malware Through Analysis of Opcodes Frequency with Machine Learning Technique.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016
A Study of Malicious Code Classification System Using MinHash in Network Quarantine Using SDN.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016
2015
Multim. Tools Appl., 2015
New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology.
KSII Trans. Internet Inf. Syst., 2015
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015
2014
Pers. Ubiquitous Comput., 2014
Eliminating Duplicated Paths to Reduce Computational Cost of Rule Generation by Using SDN.
Proceedings of the Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimarães, Portugal, June 30, 2014
Proceedings of the Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimarães, Portugal, June 30, 2014
Proceedings of the Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimarães, Portugal, June 30, 2014
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014
2013
IEEE Trans. Ind. Electron., 2013
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013
Proceedings of the Multimedia and Ubiquitous Engineering, 2013
Proceedings of the Information Technology Convergence, 2013
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013
Proceedings of the International Conference on Information Science and Applications, 2013
Vulnerability of the Smartphone Applications to Connect with Compromised Access Point.
Proceedings of the International Conference on Information Science and Applications, 2013
Proceedings of the International Conference on Information Science and Applications, 2013
Proceedings of the International Conference on Information Science and Applications, 2013
Proceedings of the International Conference on Information Science and Applications, 2013
Proceedings of the International Conference on Information Science and Applications, 2013
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013
Explicit Untainting to Reduce Shadow Memory Usage and Access Frequency in Taint Analysis.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013
2012
Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks.
Proceedings of the Information Security Applications - 13th International Workshop, 2012
Network-based Executable File Extraction and Analysis for Malware Detection.
Proceedings of the SECRYPT 2012, 2012
The clusterhead chaining scheme considering scalability of the wireless sensor networks.
Proceedings of the 2012 International Conference on Information Networking, 2012
Proceedings of the Convergence and Hybrid Information Technology, 2012
Proceedings of the Computational Science and Its Applications - ICCSA 2012, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
2011
Secure handover for Proxy Mobile IPv6 in next-generation communications: scenarios and performance.
Wirel. Commun. Mob. Comput., 2011
Reducing Communication Overhead for Nested NEMO Networks: Roaming Authentication and Access Control Structure.
IEEE Trans. Veh. Technol., 2011
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011
2010
IEEE Trans. Consumer Electron., 2010
J. Networks, 2010
Adaptive Authentication And Registration Key Management Scheme Based On AAA Architecture.
Intell. Autom. Soft Comput., 2010
Ann. des Télécommunications, 2010
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010
Proceedings of the International Conference on Information and Communication Technology Convergence, 2010
Proceedings of the Computational Science and Its Applications, 2010
SecDEACH: Secure and Resilient Dynamic Clustering Protocol Preserving Data Privacy in WSNs.
Proceedings of the Computational Science and Its Applications, 2010
2009
Route Optimization in Nested NEMO: Classification, Evaluation, and Analysis from NEMO Fringe Stub Perspective.
IEEE Trans. Mob. Comput., 2009
A comparative performance analysis on Hierarchical Mobile IPv6 and Proxy Mobile IPv6.
Telecommun. Syst., 2009
Optimizing Access Point Allocation Using Genetic Algorithmic Approach for Smart Home Environments.
Comput. J., 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
The Bias Routing Tree Avoiding Technique for Hierarchical Routing Protocol over 6LoWPAN.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks.
Proceedings of the Computational Science and Its Applications, 2009
Proceedings of the Computational Science and Its Applications, 2009
Proceedings of IEEE International Conference on Communications, 2009
Eperfi: Design and Implementation of End-to-End Network Performance Measurement and Diagnosis System for High-Speed Networks.
Proceedings of the Communication and Networking, 2009
Architecture of Context-Aware Workflow Authorization Management Systems for Workflow-Based Systems.
Proceedings of the Management Enabling the Future Internet for Changing Business and New Computing Services, 2009
2008
A comparative signaling cost analysis of Hierarchical Mobile IPv6 and Proxy Mobile IPv6.
Proceedings of the IEEE 19th International Symposium on Personal, 2008
A Misused Key Detection Mechanism for Hierarchical Routings in Wireless Sensor Network.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
Proceedings of the 5th International Conference on Mobile Technology, 2008
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008
Extended Concentric-Clustering Routing Scheme Adapted to Various Environments of Sensor Networks.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008
Preventing Out-of-Sequence Packets on the Route Optimization Procedure in Proxy Mobile IPv6.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Int. J. Netw. Manag., 2007
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2007
The Concentric-Cluster Routing Scheme Adapted to Large-scale Sensor Networks.
Proceedings of the MoMM'2007, 2007
Proceedings of the Advances in Multimedia Modeling, 2007
PKG-MIB: Private-Mib for Package-Based Linux Systems in a Large Scale Management Domain.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007
Design and Implementation of Context-Aware Security Management System for Ubiquitous Computing Environment.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007
Proceedings of the Computational Science and Its Applications, 2007
Energy-Efficient Distance Based Clustering Routing Scheme for Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2007
Risk Assessment Method Based on Business Process-Oriented Asset Evaluation for Information System Security.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
Proceedings of the Future Generation Communication and Networking, 2007
Proceedings of the Modeling and Using Context, 2007
Architecture of Context-Aware Integrated Security Management Systems for Smart Home Environment.
Proceedings of the Managing Next Generation Networks and Services, 2007
Energy-Efficient Distance Based Clustering Routing Scheme for Long-Term Lifetime of Multi-hop Wireless Sensor Networks.
Proceedings of the Managing Next Generation Networks and Services, 2007
2006
PKG-MIB: Design and Implementation of Private-mib for Package-based Linux Systems.
J. Convergence Inf. Technol., 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Parallel and Distributed Processing and Applications, 2006
Proceedings of the Frontiers of High Performance Computing and Networking, 2006
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006
Performance Evaluation of Public Key Based Mechanisms for Mobile IPv4 Authentication in AAA Environments.
Proceedings of the Information Networking, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
An Analysis of Policy Provisioning Complexity in Accordance with the Application Attributes of the Policy-Based Network.
Proceedings of the Computational Science and Its Applications, 2006
A Study on Agent-Based Integrated Security Management System for Managing Heterogeneous Firewall Systems.
Proceedings of the Computational Science and Its Applications, 2006
Qualitative Method-Based the Effective Risk Mitigation Method in the Risk Management.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the High Performance Computing and Communications, 2006
Proceedings of the Technologies for E-Learning and Digital Entertainment, 2006
2005
PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label.
J. Supercomput., 2005
Two-Dimensional Qualitative Asset Analysis Method based on Business Process-Oriented Asset Evaluation.
J. Inf. Process. Syst., 2005
IEICE Trans. Commun., 2005
Proceedings of the Information Networking, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
Proceedings of the High Performance Computing and Communications, 2005
2004
Future Gener. Comput. Syst., 2004
Comput. Artif. Intell., 2004
Proceedings of the Information Networking, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational Science and Its Applications, 2004
A Design of Preventive Integrated Security Management System Using Security Labels and a Brief Comparison with Existing Models.
Proceedings of the Computational Science and Its Applications, 2004
The Vulnerability Assessment for Active Networks; Model, Policy, Procedures, and Performance Evaluations.
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational Science, 2004
2003
A Policy Propagation Model Using Mobile Agents in Large-Scale Distributed Network Environments.
Proceedings of the Service-Oriented Computing, 2003
Proceedings of the Computational Science and Its Applications, 2003
Proceedings of the Computational Science - ICCS 2003, 2003
2002
Proceedings of the Information Networking, 2002
Proceedings of the Computational Science - ICCS 2002, 2002
Mobile Agent-Based Misuse Intrusion Detection Rule Propagation Model for Distributed System.
Proceedings of the EurAsia-ICT 2002: Information and Communication Technology, 2002
2001
Generation of pseudo random processes with given marginal distribution and autocorrelation function.
Int. J. Comput. Math., 2001
Proceedings of the Computational Science - ICCS 2001, 2001
2000
Proceedings of the Networked Planet: Management Beyond 2000, 2000