Deokjai Choi

According to our database1, Deokjai Choi authored at least 69 papers between 1996 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Data Augmentation for Inertial Sensor-Based Gait Deep Neural Network.
IEEE Access, 2020

Latency-Optimal Network Intelligence Services in SDN/NFV-Based Energy Internet Cyberinfrastructure.
IEEE Access, 2020

2019
A decision tree-based NLOS detection method for the UWB indoor location tracking accuracy improvement.
Int. J. Communication Systems, 2019

Latency Minimization for Energy Internet Communications with SDN Virtualization Infrastructure.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Significant Motion-Based Adaptive Sampling Module for Mobile Sensing Framework.
JIPS, 2018

A Binarization Method for Extracting High Entropy String in Gait Biometric Cryptosystem.
Proceedings of the Ninth International Symposium on Information and Communication Technology, 2018

A design of data-driven energy-use profiling in residential buildings: poster abstract.
Proceedings of the 5th Conference on Systems for Built Environments, 2018

2017
Improving Gait Cryptosystem Security Using Gray Code Quantization and Linear Discriminant Analysis.
Proceedings of the Information Security - 20th International Conference, 2017

multiFIA Multi-dimensional future Internet architecture.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

Location-aware dynamic network provisioning.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

2016
RSA-type Algebra Structures.
TIIS, 2016

Design of service abstraction model for enhancing network provision in future network.
Proceedings of the 18th Asia-Pacific Network Operations and Management Symposium, 2016

2015
Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme.
Int. J. Inf. Sec., 2015

Modeling and discovering human behavior from smartphone sensing life-log data for identification purpose.
HCIS, 2015

On the Instability of Sensor Orientation in Gait Verification on Mobile Phone.
Proceedings of the SECRYPT 2015, 2015

Concept, design and implementation of sensing as a service framework.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015

Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomerative Clustering Algorithm Based on Browsing History.
Proceedings of the Information and Communication Technology, 2015

A Generalized Authentication Scheme for Mobile Phones Using Gait Signals.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015

Mobile application access design for user-defined network infrastructure.
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015

Time-based DDoS detection and mitigation for SDN controller.
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015

2014
Aggregation management design for user-defined network infrastructure.
Proceedings of the 16th Asia-Pacific Network Operations and Management Symposium, 2014

2013
6LoWPAN-based Wireless Home Automation: From Secure System Development to Building Energy Management.
Smart CR, 2013

Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer.
JIPS, 2013

Energy Saving in Forward Fall Detection using Mobile Accelerometer.
IJDST, 2013

Personalization in Mobile Activity Recognition System Using K-Medoids Clustering Algorithm.
IJDSN, 2013

Battery-Less 6LoWPAN-Based Wireless Home Automation by Use of Energy Harvesting.
IJDSN, 2013

A Lightweight Gait Authentication on Mobile Phone Regardless of Installation Error.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Robust real time face tracking in mobile devices.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

3D-to-2D Projection Algorithm for Remote Control Using Smartphone: Enhancing Smartphone Capability for Costless Wireless Audio Visual Consumer Appliance Control.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Simple SMS spam filtering on independent mobile phone.
Security and Communication Networks, 2012

Efficiently Preserving Data Privacy Range Queries in Two-Tiered Wireless Sensor Networks.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

Implicit authentication based on ear shape biometrics using smartphone camera during a call.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

Fall Detection Based on Movement and Smart Phone Technology.
Proceedings of the 2012 IEEE RIVF International Conference on Computing & Communication Technologies, Research, Innovation, and Vision for the Future (RIVF), Ho Chi Minh City, Vietnam, February 27, 2012

Adaptive energy-saving strategy for activity recognition on mobile phone.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2012

Semi-supervised fall detection algorithm using fall indicators in smartphone.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

Balancing Precision and Battery Drain in Activity Recognition on Mobile Phone.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

2011
Wireless LAN Access Point Placement Based on User Mobility.
Wireless Personal Communications, 2011

Erratum to: Wireless LAN Access Point Placement Based on User Mobility.
Wireless Personal Communications, 2011

Distributed IDS for efficient resource management in wireless sensor network.
Proceedings of the 13th Asia-Pacific Network Operations and Management Symposium, 2011

Independent and Personal SMS Spam Filtering.
Proceedings of the 11th IEEE International Conference on Computer and Information Technology, 2011

2010
Lightweight Key Renewals for Clustered Sensor Networks.
JNW, 2010

Implementation of Pastry-based P2P system to share sensor data.
IJSNet, 2010

Development of a Context Aware Virtual Smart Home Simulator
CoRR, 2010

Context Ontology Implementation for Smart Home
CoRR, 2010

Network Anomaly Detection: Flow-based or Packet-based Approach?
CoRR, 2010

Context Awareness Framework Based on Contextual Graph
CoRR, 2010

Network Traffic Anomalies Detection and Identification with Flow Monitoring
CoRR, 2010

2009
Reference node placement and selection algorithm based on trilateration for indoor sensor networks.
Wireless Communications and Mobile Computing, 2009

Challenges for Next Generation Network Operations and Service Management: a Report on APNOMS 2008.
J. Network Syst. Manage., 2009

A Status Monitoring System Design/Implementation for Home Appliances Controlled by Home Server.
Proceedings of the First International Conference on Networks and Communications, 2009

A lightweight key renewal scheme for clustered sensor networks.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

Pastry Based Sensor Data Sharing.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

An Implementation of P2P System for Sharing Sensory Information.
Proceedings of the Management Enabling the Future Internet for Changing Business and New Computing Services, 2009

CCBR: Chaining Case Based Reasoning in Context-Aware Smart Home.
Proceedings of the First Asian Conference on Intelligent Information and Database Systems, 2009

How to Maximize User Satisfaction Degree in Multi-service IP Networks.
Proceedings of the First Asian Conference on Intelligent Information and Database Systems, 2009

2008
Securing Wireless Sensor Networks Using Cluster Reformations.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Application of Data Mining to Network Intrusion Detection: Classifier Selection Model.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

2007
FECP Protocol for Energy Balanced Data Propagation in Smart Home Sensor Networks.
Proceedings of the Managing Next Generation Networks and Services, 2007

A Two Base Stations Algorithm for Energy Balanced Data Propagation in Smart Home Sensor Networks.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

A Novel Reference Node Selection Algorithm Based on Trilateration for Indoor Sensor Networks.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

2006
A Middleware Architecture Determining Application Context Using Shared Ontology.
Proceedings of the Computational Science and Its Applications, 2006

Text Image Spotting Using Local Crowdedness and Hausdorff Distance.
Proceedings of the Digital Libraries: Achievements, 2006

Context Communication for Providing Context-Aware Application's Independency.
Proceedings of the High Performance Computing and Communications, 2006

Delivery and Storage Architecture for Sensed Information Using SNMP.
Proceedings of the Management of Convergence Networks and Services, 2006

2005
A Performance Improvement Scheme of Stream Control Transmission Protocol over Wireless Networks.
Proceedings of the Computational Science and Its Applications, 2005

2004
Fast Half Pixel Motion Estimation Based on Spatio-temporal Correlations.
Proceedings of the Neural Information Processing, 11th International Conference, 2004

2003
A Constrained Multi-path Finding Mechanism Considering Available Bandwidth and Delay of MPLS LSP.
Proceedings of the Information Networking, 2003

1996
A Customer-to-Carrier Gateway for Trouble Administration.
J. Network Syst. Manage., 1996

A generic service ordering interface for the customer-to-service provider environment.
Proceedings of the 1996 Network Operations and Management Symposium, 1996


  Loading...