Ji Won Yoon

According to our database1, Ji Won Yoon authored at least 50 papers between 2006 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Speech Intention Understanding in a Head-final Language: A Disambiguation Utilizing Intonation-dependency.
CoRR, 2018

I'm Listening to your Location! Inferring User Location with Acoustic Side Channels.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

2017
The Vulnerability Exploitation Conveying Digital Data Over Mobile Voice Call Channels.
Wireless Personal Communications, 2017

Visual Honey Encryption: Application to Steganography.
IACR Cryptology ePrint Archive, 2017

Honey Chatting: A novel instant messaging system robust to eavesdropping over communication.
IACR Cryptology ePrint Archive, 2017

Side channel attack on digital door lock with vibration signal analysis: Longer password does not guarantee higher security level.
Proceedings of the 2017 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2017

PD-FDS: Purchase Density based Online Credit Card Fraud Detection System.
Proceedings of the KDD 2017 Workshop on Anomaly Detection in Finance, 2017

Construction of a National Scale ENF Map using Online Multimedia Data.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

2016
A New Bayesian Edge-Linking Algorithm Using Single-Target Tracking Techniques.
Symmetry, 2016

Bayesian interpretation to generalize adaptive mean shift algorithm.
Journal of Intelligent and Fuzzy Systems, 2016

A Practical Approach to Constructing Triple-Blind Review Process with Maximal Anonymity and Fairness.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

An efficient geometric shape coding and representation approach to obtain both skeleton and contours.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

Honey chatting: A novel instant messaging system robust to eavesdropping over communication.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

A New Approach to Building a Disguised Server Using the Honey Port Against General Scanning Attacks.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Classification of home appliance by using Probabilistic KNN with sensor data.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2016

2015
Efficient model selection for probabilistic K nearest neighbour classification.
Neurocomputing, 2015

A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis.
IJDSN, 2015

A Novel Statistical Approach to Detect Card Frauds Using Transaction Patterns.
IEICE Transactions, 2015

Various Threat Models to Circumvent Air-Gapped Systems for Preventing Network Attack.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Passing Go with DNA Sequencing: Delivering Messages in a Covert Transgenic Channel.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

Visual Honey Encryption: Application to Steganography.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

A simple sequential outlier detection with several residuals.
Proceedings of the 23rd European Signal Processing Conference, 2015

2014
Bayesian reconstruction of projection reconstruction NMR (PR-NMR).
Comp. in Bio. and Med., 2014

Statistical denoising scheme for single molecule fluorescence microscopic images.
Biomed. Signal Proc. and Control, 2014

2013
Efficient Estimation of the number of neighbours in Probabilistic K Nearest Neighbour Classification
CoRR, 2013

An Efficient Model Selection for Gaussian Mixture Model in a Bayesian Framework.
CoRR, 2013

Statistical Denoising for single molecule fluorescence microscopic images.
CoRR, 2013

A data mining approach using transaction patterns for card fraud detection.
CoRR, 2013

2012
Network analysis of temporal trends in scholarly research productivity.
J. Informetrics, 2012

Cityride: A Predictive Bike Sharing Journey Advisor.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012

Predicting arrival times of buses using real-time GPS measurements.
Proceedings of the 15th International IEEE Conference on Intelligent Transportation Systems, 2012

Bayesian implementation of a Lagrangian macroscopic traffic flow model.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Bayesian separation of wind power generation signals.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Mining residential household information from low-resolution smart meter data.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

2011
Bayesian inference for an adaptive Ordered Probit model: An application to Brain Computer Interfacing.
Neural Networks, 2011

A Perfect Collision-Free Pseudonym System.
IEEE Communications Letters, 2011

Effective measurement selection in truncated kernel density estimator: Voronoi mean shift algorithm for truncated kernels.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

2010
Robust Measurement Validation in Target Tracking Using Geometric Structure.
IEEE Signal Process. Lett., 2010

A highly efficient blocked Gibbs sampler reconstruction of multidimensional NMR spectra.
Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, 2010

Hybrid spam filtering for mobile communication.
Computers & Security, 2010

Improved Mean Shift Algorithm with Heterogeneous Node Weights.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

2009
Adaptive classification for Brain Computer Interface systems using Sequential Monte Carlo sampling.
Neural Networks, 2009

How to Compare the Scientific Contributions between Research Groups
CoRR, 2009

Hybrid Spam Filtering for Mobile Communication
CoRR, 2009

A new collision-free pseudonym scheme in mobile ad hoc networks.
Proceedings of the 7th International Symposium on Modeling and Optimization in Mobile, 2009

2008
Sequential Bayesian estimation for adaptive classification.
Proceedings of the IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2008

Adaptive Classification by Hybrid EKF with Truncated Filtering: Brain Computer Interfacing.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2008

2007
The Stringball: a ball Interface with Strings for Collaborative Performance.
Proceedings of the 2007 International Computer Music Conference, 2007

Bayesian Inference for 2D Gel Electrophoresis Image Analysis.
Proceedings of the Bioinformatics Research and Development, First International Conference, 2007

2006
Bayesian inference for multidimensional NMR image reconstruction.
Proceedings of the 14th European Signal Processing Conference, 2006


  Loading...