Ji Won Yoon

Orcid: 0000-0003-2123-9849

According to our database1, Ji Won Yoon authored at least 90 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Analysis of GPS Spoofing Attack and Efficient Approach to Spoofing Detection in PX4.
IEEE Access, 2024

2023
Clock Offset Estimation for Systems With Asymmetric Packet Delays.
IEEE/ACM Trans. Netw., August, 2023

CASPER: Covert Channel Using Internal Speakers.
Sensors, March, 2023

Oracle Teacher: Leveraging Target Information for Better Knowledge Distillation of CTC Models.
IEEE ACM Trans. Audio Speech Lang. Process., 2023

Discretization Error Reduction for Torus Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023

Development of deep biological ages aware of morbidity and mortality based on unsupervised and semi-supervised deep learning approaches.
CoRR, 2023

Voice Spoofing Detection Through Residual Network, Max Feature Map, and Depthwise Separable Convolution.
IEEE Access, 2023

BAN: Predicting APT Attack Based on Bayesian Network With MITRE ATT&CK Framework.
IEEE Access, 2023

Principal Component Analysis over the Boolean Circuit Within TFHE Scheme.
Proceedings of the Information Security Applications - 24th International Conference, 2023

Differential privacy using Gamma distribution.
Proceedings of the IEEE Statistical Signal Processing Workshop, 2023

Discretization Error Reduction for High Precision Torus Fully Homomorphic Encryption.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Secure Dimensionality Reduction: Applying Linear Discriminant Analysis over the TFHE Homomorphic Encryption Scheme.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

EM-Network: Oracle Guided Self-distillation for Sequence Learning.
Proceedings of the International Conference on Machine Learning, 2023

Cheap and Fast Iterative Matrix Inverse in Encrypted Domain.
Proceedings of the Computer Security - ESORICS 2023, 2023

Invasion of location privacy using online map services and smartphone sensors.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Neurally Optimized Decoder for Low Bitrate Speech Codec.
IEEE Signal Process. Lett., 2022

A Phase-Based Approach for ENF Signal Extraction From Rolling Shutter Videos.
IEEE Signal Process. Lett., 2022

HuBERT-EE: Early Exiting HuBERT for Efficient Speech Recognition.
CoRR, 2022

Inter-KD: Intermediate Knowledge Distillation for CTC-Based Automatic Speech Recognition.
Proceedings of the IEEE Spoken Language Technology Workshop, 2022

Manifold Learning-based Frequency Estimation for extracting ENF signal from digital video.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Community Privacy using the Sparse Vector Technique for Graph Statistics.
Proceedings of the 3rd European Symposium on Software Engineering, 2022

2021
TutorNet: Towards Flexible Knowledge Distillation for End-to-End Speech Recognition.
IEEE ACM Trans. Audio Speech Lang. Process., 2021

A new approach to training more interpretable model with additional segmentation.
Pattern Recognit. Lett., 2021

Oracle Teacher: Towards Better Knowledge Distillation.
CoRR, 2021

Efficient Correlation Power Analysis (CPA) Focusing on Byte-Wise Calculation Points.
IEEE Access, 2021

Efficient Adaptation of TFHE for High End-to-End Throughput.
Proceedings of the Information Security Applications - 22nd International Conference, 2021

2020
Filtering-Based Correlation Power Analysis (CPA) with Signal Envelopes Against Shuffling Methods.
Proceedings of the Information Security Applications - 21st International Conference, 2020

Speech to Text Adaptation: Towards an Efficient Cross-Modal Distillation.
Proceedings of the Interspeech 2020, 2020

Location tracking technique for Regional ENF Classification Using ARIMA.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

Comparison of various interpolation techniques to infer localization of audio files using ENF signals.
Proceedings of the International Conference on Software Security and Assurance, 2020

ResMax: Detecting Voice Spoofing Attacks with Residual Network and Max Feature Map.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

2019
A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms.
Secur. Commun. Networks, 2019

Power Grid Estimation Using Electric Network Frequency Signals.
Secur. Commun. Networks, 2019

Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression.
Proceedings of the Information Security Applications - 20th International Conference, 2019

A Bitwise Logistic Regression Using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme.
Proceedings of the Information Security Practice and Experience, 2019

Static Malware Analysis in Encrypted Domain.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

Forecasting the Electric Network Frequency Signals on Power Grid.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

Voice Presentation Attack Detection through Text-Converted Voice Command Analysis.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Speech Intention Understanding in a Head-final Language: A Disambiguation Utilizing Intonation-dependency.
CoRR, 2018

I'm Listening to your Location! Inferring User Location with Acoustic Side Channels.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Logarithm Design on Encrypted Data with Bitwise Operation.
Proceedings of the Information Security Applications - 19th International Conference, 2018

A New Bayesian Approach to Exploring Damaged Assets by Monitoring Mission Failures Caused by Undetected Attack.
Proceedings of the Information Security Applications - 19th International Conference, 2018

A Study on the Audiovisual Art of Nam June Paik in the Context of Multimodality and Synesthesia.
Proceedings of the 2018 International Computer Music Conference, 2018

2017
The Vulnerability Exploitation Conveying Digital Data Over Mobile Voice Call Channels.
Wirel. Pers. Commun., 2017

Visual Honey Encryption: Application to Steganography.
IACR Cryptol. ePrint Arch., 2017

Honey Chatting: A novel instant messaging system robust to eavesdropping over communication.
IACR Cryptol. ePrint Arch., 2017

Side channel attack on digital door lock with vibration signal analysis: Longer password does not guarantee higher security level.
Proceedings of the 2017 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2017

PD-FDS: Purchase Density based Online Credit Card Fraud Detection System.
Proceedings of the KDD 2017 Workshop on Anomaly Detection in Finance, 2017

An Efficient Method for Securely Storing and Handling of Genomic Data.
Proceedings of the International Conference on Software Security and Assurance, 2017

Construction of a National Scale ENF Map using Online Multimedia Data.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

2016
A New Bayesian Edge-Linking Algorithm Using Single-Target Tracking Techniques.
Symmetry, 2016

Bayesian interpretation to generalize adaptive mean shift algorithm.
J. Intell. Fuzzy Syst., 2016

A Practical Approach to Constructing Triple-Blind Review Process with Maximal Anonymity and Fairness.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

An efficient geometric shape coding and representation approach to obtain both skeleton and contours.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

A New Approach to Building a Disguised Server Using the Honey Port Against General Scanning Attacks.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Classification of home appliance by using Probabilistic KNN with sensor data.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2016

2015
Efficient model selection for probabilistic K nearest neighbour classification.
Neurocomputing, 2015

A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis.
Int. J. Distributed Sens. Networks, 2015

A Novel Statistical Approach to Detect Card Frauds Using Transaction Patterns.
IEICE Trans. Inf. Syst., 2015

Various Threat Models to Circumvent Air-Gapped Systems for Preventing Network Attack.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Passing Go with DNA Sequencing: Delivering Messages in a Covert Transgenic Channel.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers.
Proceedings of the 1st International Conference on Software Security and Assurance, 2015

A simple sequential outlier detection with several residuals.
Proceedings of the 23rd European Signal Processing Conference, 2015

2014
Bayesian reconstruction of projection reconstruction NMR (PR-NMR).
Comput. Biol. Medicine, 2014

Statistical denoising scheme for single molecule fluorescence microscopic images.
Biomed. Signal Process. Control., 2014

2013
Efficient Estimation of the number of neighbours in Probabilistic K Nearest Neighbour Classification
CoRR, 2013

An Efficient Model Selection for Gaussian Mixture Model in a Bayesian Framework.
CoRR, 2013

Statistical Denoising for single molecule fluorescence microscopic images.
CoRR, 2013

A data mining approach using transaction patterns for card fraud detection.
CoRR, 2013

2012
Network analysis of temporal trends in scholarly research productivity.
J. Informetrics, 2012

Cityride: A Predictive Bike Sharing Journey Advisor.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012

Predicting arrival times of buses using real-time GPS measurements.
Proceedings of the 15th International IEEE Conference on Intelligent Transportation Systems, 2012

Bayesian implementation of a Lagrangian macroscopic traffic flow model.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Bayesian separation of wind power generation signals.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Mining residential household information from low-resolution smart meter data.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

2011
Bayesian inference for an adaptive Ordered Probit model: An application to Brain Computer Interfacing.
Neural Networks, 2011

A Perfect Collision-Free Pseudonym System.
IEEE Commun. Lett., 2011

Effective measurement selection in truncated kernel density estimator: Voronoi mean shift algorithm for truncated kernels.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

2010
Robust Measurement Validation in Target Tracking Using Geometric Structure.
IEEE Signal Process. Lett., 2010

A highly efficient blocked Gibbs sampler reconstruction of multidimensional NMR spectra.
Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, 2010

Hybrid spam filtering for mobile communication.
Comput. Secur., 2010

Improved Mean Shift Algorithm with Heterogeneous Node Weights.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

2009
Adaptive classification for Brain Computer Interface systems using Sequential Monte Carlo sampling.
Neural Networks, 2009

How to Compare the Scientific Contributions between Research Groups
CoRR, 2009

A new collision-free pseudonym scheme in mobile ad hoc networks.
Proceedings of the 7th International Symposium on Modeling and Optimization in Mobile, 2009

2008
Sequential Bayesian estimation for adaptive classification.
Proceedings of the IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2008

Adaptive Classification by Hybrid EKF with Truncated Filtering: Brain Computer Interfacing.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2008

2007
The Stringball: a ball Interface with Strings for Collaborative Performance.
Proceedings of the 2007 International Computer Music Conference, 2007

Bayesian Inference for 2D Gel Electrophoresis Image Analysis.
Proceedings of the Bioinformatics Research and Development, First International Conference, 2007

2006
Bayesian inference for multidimensional NMR image reconstruction.
Proceedings of the 14th European Signal Processing Conference, 2006


  Loading...