ByungRae Cha

Orcid: 0000-0001-6686-5400

According to our database1, ByungRae Cha authored at least 44 papers between 2005 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Experimental Design for Multi-task Deep Learning toward Intelligence Augmented Visual AI.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021

2020
Survey and Performance Test of Python-based Libraries for Parallel Processing.
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020

Prototype of Strawberry Maturity-level Classification to Determine Harvesting Time of Strawberry.
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020

Draft Design of Fruit Object Recognition using Transfer Learning in Smart Farm.
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020

2019
Draft Design of Li-Fi Based Acquisition Layer of DataLake Framework for IIoT and Smart Factory.
Proceedings of the Advances in Networked-based Information Systems, 2019

Enhancing Red Tide Image Recognition using Hierarchical Learning Approach based on Semantic Feature.
Proceedings of the 2nd International Conference on Electronics, 2019

2018
International Network Performance and Security Testing Based on Distributed Abyss Storage Cluster and Draft of Data Lake Framework.
Secur. Commun. Networks, 2018

Design of Connected Data Lake System based on Micro Cloud Storage.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

Design and Interface Testing of Connected Data Architecture of DataLake.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

Design of marine environment monitoring system based on open source softwares.
Proceedings of the 2018 International Conference on Information Networking, 2018

Draft Design of Distributed Ledger Based Peer-to-Peer Business Platform.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

2017
Global experimental verification of Docker-based secured mVoIP to protect against eavesdropping and DoS attacks.
EURASIP J. Wirel. Commun. Netw., 2017

Performance Testing of Mass Distributed Abyss Storage Prototype for SMB.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

2016
Availability analysis and case study of mobile-OTP key generation using skip sampling of voice.
Clust. Comput., 2016

Document Summarization Using NMF and Pseudo Relevance Feedback Based on K-Means Clustering.
Comput. Informatics, 2016

Design and Verification of Software-Defined RAID for Hybrid Cloud Storage.
Proceedings of the International Conference on Cloud Computing Research and Innovations, 2016

A Study of Determining Abnormal Behaviors by Using System for Preventing Agricultural Product Theft.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

Experimental Verification of Docker-Based Distributed Cloud Applications for Secured Mobile VoIP.
Proceedings of the 10th International Conference on Complex, 2016

2015
Preparing and Inter-Connecting Hyper-Converged SmartX Boxes for IoT-Cloud Testbed.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

Secured mVoIP Service over Cloud and Container-Based Improvement.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Concept and prototype design of NFC-based micro-payment ecosystem.
Int. J. Space Based Situated Comput., 2014

Agile and economic media-centric service realization over Software-Defined Infrastructure.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2014

2013
Design of new P2P-enabled Mobile-OTP system using fingerprint features.
Telecommun. Syst., 2013

Handling and analysis of fake multimedia contents threats with collective intelligence in P2P file sharing environments.
Int. J. Grid Util. Comput., 2013

Security tactics for secured cloud computing resources.
Proceedings of the International Conference on Information Networking 2013, 2013

Design of NFC Based Micro-payment to Support MD Authentication and Privacy for Trade Safety in NFC Applications.
Proceedings of the Seventh International Conference on Complex, 2013

2011
Design of Attribute-Based Access Control in Cloud Computing Environment.
Proceedings of the International Conference on IT Convergence and Security, 2011

Idea Sketch of Application Service of e-Business Card and NFC Based on Mobile.
Proceedings of the U- and E-Service, Science and Technology, 2011

Study of Multistage Anomaly Detection for Secured Cloud Computing Resources in Future Internet.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

2010
Handling Fake Multimedia Contents Threat with Collective Intelligence in P2P File Sharing Environments.
Proceedings of the 3PGCIC 2010, 2010

2009
CRYPTEX Model for E-Commercial Contract of Software Source Code Using Secrete Sharing Scheme.
Proceedings of the Advances in Information Security and Assurance, 2009

2008
Query-Based Multi-Document Summarization Using Non-Negative Semantic Feature and NMF Clustering.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Copyrights Expression and Secure Container of Software Source Code.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Access Control of Software Source Code by CRYPTEX Model.
Proceedings of the Selected Papers of the Sixth International Conference on Computational Sciences and Its Applications, 2008

Energy Efficient Location-Based Clustering for Skewed-Topology Wireless Sensor Networks.
Proceedings of the Workshops at the Grid and Pervasive Computing Conference, 2008

Random password generation of OTP system using changed location and angle of fingerprint features.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

2007
Business Model and Comparasion of S/W Source Code vs. Digital License for IPRs.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

Network-Based Anomaly Intrusion Detection Improvement by Bayesian Network and Indirect Relation.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Improvement of Anomaly Intrusion Detection Performance by Indirect Relation for FTP Service.
Proceedings of the Computational and Ambient Intelligence, 2007

A Topology Control Scheme for Avoiding Sensing Hole in Wireless Sensor Networks.
Proceedings of the Selected Papers of the Fifth International Conference on, 2007

Study of Digital License Search for Intellectual Property Rights of S/W Source Code.
Proceedings of the Computational Science and Its Applications, 2007

2005
Anomaly Intrusion Detection for System Call Using the Soundex Algorithm and Neural Networks.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

Host Anomaly Detection Performance Analysis Based on System Call of Neuro-Fuzzy Using Soundex Algorithm and N-gram Technique.
Proceedings of the Systems Communications 2005 (ICW / ICHSN / ICMCS / SENET 2005), 2005

Neural Network Techniques for Host Anomaly Intrusion Detection Using Fixed Pattern Transformation.
Proceedings of the Computational Science and Its Applications, 2005


  Loading...