Hyotaek Lim

Orcid: 0000-0002-5866-0007

According to our database1, Hyotaek Lim authored at least 48 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Multichannel One-Dimensional Data Augmentation with Generative Adversarial Network.
Sensors, September, 2023

2022
Synchronizing UAV Teams for Timely Data Collection and Energy Transfer by Deep Reinforcement Learning.
IEEE Trans. Veh. Technol., 2022

Neural Network and Cloud Computing for Predicting ECG Waves from PPG Readings.
J. Multim. Inf. Syst., 2022

2021
An Unsupervised Learning-Based Spatial Co-Location Detection System from Low-Power Consumption Sensor.
Sensors, 2021

2020
Adaptive Margin Based Liveness Detection for Face Recognition.
Proceedings of the Intelligent Human Computer Interaction - 12th International Conference, 2020

Co-location Detection System Using Mobile Magnetometer Data.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

Performance of Packet Analysis between Observer and WireShark.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

2019
Software-Defined Networking Application with Deep Deterministic Policy Gradient.
Proceedings of the 11th International Conference on Computer Modeling and Simulation, 2019

2018
Smart government framework with geo-crowdsourcing and social media analysis.
Future Gener. Comput. Syst., 2018

Adaptive selection of dynamic VM consolidation algorithm using neural network for cloud resource management.
Future Gener. Comput. Syst., 2018

2017
A new content-defined chunking algorithm for data deduplication in cloud storage.
Future Gener. Comput. Syst., 2017

SDM: Smart deduplication for mobile cloud storage.
Future Gener. Comput. Syst., 2017

RDM: Rapid Deduplication for Mobile Cloud Storage.
Proceedings of the 8th International Conference on Computer Modeling and Simulation, 2017

2015
Hand tracking and gesture recognition system for human-computer interaction using low-cost hardware.
Multim. Tools Appl., 2015

The Design of an Efficient Proxy-Based Framework for Mobile Cloud Computing.
J. Inform. and Commun. Convergence Engineering, 2015

Homomorphic encryption in mobile multi cloud computing.
Proceedings of the 2015 International Conference on Information Networking, 2015

2014
Leveraging client-side storage techniques for enhanced use of multiple consumer cloud storage services on resource-constrained mobile devices.
J. Netw. Comput. Appl., 2014

An effective framework of behavior detection-advanced static analysis for malware detection.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

2012
An efficient model for dimensioning an ATA-based virtual storage system.
Comput. Electr. Eng., 2012

An Efficient FPGA Design of PingPong-128 Stream Cipher for Secure Computing.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

2011
Performance of two-stage shared fiber delay line optical packet switch under bursty traffic.
Photonic Netw. Commun., 2011

Dynamic Load Balancing and Network Adaptive Virtual Storage Service for Mobile Appliances.
J. Inf. Process. Syst., 2011

Comparative Performance Study of WDM Packet Switch for Different Traffic Arrival Approach.
J. Inform. and Commun. Convergence Engineering, 2011

Unicode Canonical Decomposition for Hangeul Syllables in Regular Expression.
IEICE Trans. Inf. Syst., 2011

Throughput and delay performance analysis of feed-forward and feedback shared fiber delay line based hybrid buffering optical packet switch.
Proceedings of the 2011 International Conference on Information Networking, 2011

An Efficient Online Signature Verification Scheme Using Dynamic Programming of String Matching.
Proceedings of the Convergence and Hybrid Information Technology, 2011

An Efficient Hardware Countermeasure against Differential Power Analysis Attack.
Proceedings of the Convergence and Hybrid Information Technology, 2011

A Strong User Authentication Framework for Cloud Computing.
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011

Performance and Optical Cost Analysis of Shared Fiber Delay Line Based Two-Stage Optical Packet Switch.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
Mutual Authentication and Secure Session Termination Scheme in iATA Protocol.
J. Inform. and Commun. Convergence Engineering, 2010

Practical Attacks on Hybrid Group Key Management for SOHAN.
J. Inform. and Commun. Convergence Engineering, 2010

Two Factor Authentication for Cloud Computing.
J. Inform. and Commun. Convergence Engineering, 2010

Dynamic Load Balancing and Network Monitoring in iATA Protocol for Mobile Appliances.
Proceedings of the 4th International Conference on Multimedia and Ubiquitous Engineering, 2010

2009
A Ping Pong Based One-Time-Passwords Authentication System.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

2008
Multicasting Support for NEMO based on ODMRP.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008

Design and Implementation of ATA-Based Virtual Storage System for Mobile Device.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

2007
Indoor Passive Location Tracking and Activity Monitoring using WSN for Ubiquitous Healthcare.
J. Inform. and Commun. Convergence Engineering, 2007

Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2007

2006
Passive and Cost Effective People Indoor Location Tracking System for Ubiquitous Healthcare.
Proceedings of the Sixth IASTED International Multi-Conference on Wireless and Optical Communications: Conference on Communication Systems and Applications, 2006

Distributed Certificate Authority Under the GRID-Location Aided Routing Protocol.
Proceedings of the Computational Science and Its Applications, 2006

Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
Design of Healthcare System for Disabled Person Using Eye Blinking.
Proceedings of the 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 2005

Implementation and Performance Analysis of iSCSI-based Virtual Storage System with Wireless Networks.
Proceedings of the New Trends in Computer Networks, 2005

2004
An Efficient Video Prefix-Caching Scheme in Wide Area Networks.
Proceedings of the Information Networking, 2004

2003
Design Considerations for Hierarchical Web Proxy Server Using iSCS.
Proceedings of the 2003 Symposium on Applications and the Internet (SAINT 2003), 27-31 January 2003, 2003

A New Cell Loss Recovery Scheme for Data Services in B-ISDN.
Proceedings of the Information Networking, 2003

2001
TCP Pre-Connection for Prefix-Caching Video Proxy in Wide Area Networks.
Proceedings of the International Conference on Internet Computing, 2001


  Loading...