Jae-Young Choi
Jae-Young Choi
Geverifieerd e-mailadres voor skku.edu
Geciteerd door
Geciteerd door
The skin cancer classification using deep convolutional neural network
UO Dorj, KK Lee, JY Choi, M Lee
Multimedia Tools and Applications 77 (8), 9909-9924, 2018
Real time MODBUS transmissions and cryptography security designs and enhancements of protocol sensitive information
A Shahzad, M Lee, YK Lee, S Kim, N Xiong, JY Choi, Y Cho
Symmetry 7 (3), 1176-1210, 2015
Vehicle detection from aerial images using local shape information
JY Choi, YK Yang
Pacific-Rim Symposium on Image and Video Technology, 227-236, 2009
Multiple vehicles detection and tracking based on scale-invariant feature transform
JY Choi, KS Sung, YK Yang
2007 IEEE Intelligent Transportation Systems Conference, 528-533, 2007
Evolutionary-based image encryption using RNA codons truth table
M Mahmud, M Lee, JY Choi
Optics & Laser Technology 121, 105818, 2020
Evaluating energy efficiency of Internet of Things software architecture based on reusable software components
D Kim, JY Choi, JE Hong
International Journal of Distributed Sensor Networks 13 (1), 1550147716682738, 2017
Performance analysis of inter-domain handoff scheme based on virtual layer in PMIPv6 networks for IP-based internet of things
C Cho, JY Choi, J Jeong, TM Chung
PloS one 12 (1), e0170566, 2017
Centralized connectivity for multiwireless edge computing and cellular platform: A smart vehicle parking system
A Shahzad, J Choi, N Xiong, YG Kim, M Lee
Wireless Communications and Mobile Computing 2018, 2018
A Bayesian multivariate probit analysis of Korean firms' information system adoption
JY Choi, Y Kim, Y Jun, Y Kim
Industrial Management & Data Systems, 2011
A secure, intelligent, and smart-sensing approach for industrial system automation and transmission over unsecured wireless networks
A Shahzad, M Lee, NN Xiong, G Jeong, YK Lee, JY Choi, AW Mahesar, ...
Sensors 16 (3), 322, 2016
An enhanced secure mobility management scheme for building IoT applications
HS Chai, JY Choi, J Jeong
Procedia Computer Science 56, 586-591, 2015
A pointer forwarding scheme for minimizing signaling costs in proxy mobile IPv6 networks
MK Yi, JY Choi, JW Choi, SC Park, YK Yang
2010 7th IEEE Consumer Communications and Networking Conference, 1-5, 2010
A novel image security technique based on nucleic acid concepts
M Yadollahi, R Enayatifar, H Nematzadeh, M Lee, JY Choi
Journal of Information Security and Applications 53, 102505, 2020
Bumblebee venom serine protease increases fungal insecticidal virulence by inducing insect melanization
JS Kim, JY Choi, JH Lee, JB Park, Z Fu, Q Liu, X Tao, BR Jin, M Skinner, ...
PloS one 8 (4), e62555, 2013
Design and performance analysis of a cost-effective proxy-LMA mobility management scheme in IP-based mobile networks with global mobility support
C Cho, JY Choi, JD Cho, J Jeong
International Journal of Ad Hoc and Ubiquitous Computing 21 (4), 273-289, 2016
Reduction of authentication cost based on key caching for inter-MME handover support
M Song, JY Choi, J Cho, J Jeong, B Song, H Lee
2014 International Conference on High Performance Computing & Simulation …, 2014
Fuzzy logic based handoff scheme for heterogeneous vehicular mobile networks
J Kim, JD Cho, J Jeong, JY Choi, B Song, H Lee
2014 International Conference on High Performance Computing & Simulation …, 2014
Security-effective fast authentication mechanism for network mobility in proxy mobile IPv6 networks
I Im, YH Cho, JY Choi, J Jeong
International Conference on Computational Science and Its Applications, 543-559, 2012
Improved tracking of multiple vehicles using invariant feature-based matching
JY Choi, JW Choi, YK Yang
International Conference on Pattern Recognition and Machine Intelligence …, 2007
Adversarial Detection with Gaussian Process Regression-based Detector
S Lee, N Kim, Y Cho, JY Choi, S Kim, JA Kim, JH Lee
KSII Transactions on Internet and Information Systems (TIIS) 13 (8), 4285-4299, 2019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20