Ji Won Yoon

According to our database1, Ji Won Yoon authored at least 44 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Voice Presentation Attack Detection through Text-Converted Voice Command Analysis.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

I'm Listening to your Location! Inferring User Location with Acoustic Side Channels.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Logarithm Design on Encrypted Data with Bitwise Operation.
Proceedings of the Information Security Applications - 19th International Conference, 2018

A New Bayesian Approach to Exploring Damaged Assets by Monitoring Mission Failures Caused by Undetected Attack.
Proceedings of the Information Security Applications - 19th International Conference, 2018

The Vulnerability Exploitation Conveying Digital Data Over Mobile Voice Call Channels.
Wireless Personal Communications, 2017

Side channel attack on digital door lock with vibration signal analysis: Longer password does not guarantee higher security level.
Proceedings of the 2017 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2017

PD-FDS: Purchase Density based Online Credit Card Fraud Detection System.
Proceedings of the KDD 2017 Workshop on Anomaly Detection in Finance, 2017

Construction of a National Scale ENF Map using Online Multimedia Data.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

A New Bayesian Edge-Linking Algorithm Using Single-Target Tracking Techniques.
Symmetry, 2016

Bayesian interpretation to generalize adaptive mean shift algorithm.
Journal of Intelligent and Fuzzy Systems, 2016

A Practical Approach to Constructing Triple-Blind Review Process with Maximal Anonymity and Fairness.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

An efficient geometric shape coding and representation approach to obtain both skeleton and contours.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

Honey chatting: A novel instant messaging system robust to eavesdropping over communication.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

A New Approach to Building a Disguised Server Using the Honey Port Against General Scanning Attacks.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Classification of home appliance by using Probabilistic KNN with sensor data.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2016

Efficient model selection for probabilistic K nearest neighbour classification.
Neurocomputing, 2015

A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis.
IJDSN, 2015

A Novel Statistical Approach to Detect Card Frauds Using Transaction Patterns.
IEICE Transactions, 2015

Various Threat Models to Circumvent Air-Gapped Systems for Preventing Network Attack.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Passing Go with DNA Sequencing: Delivering Messages in a Covert Transgenic Channel.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

Visual Honey Encryption: Application to Steganography.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

A simple sequential outlier detection with several residuals.
Proceedings of the 23rd European Signal Processing Conference, 2015

Bayesian reconstruction of projection reconstruction NMR (PR-NMR).
Comp. in Bio. and Med., 2014

Statistical denoising scheme for single molecule fluorescence microscopic images.
Biomed. Signal Proc. and Control, 2014

Network analysis of temporal trends in scholarly research productivity.
J. Informetrics, 2012

Cityride: A Predictive Bike Sharing Journey Advisor.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012

Predicting arrival times of buses using real-time GPS measurements.
Proceedings of the 15th International IEEE Conference on Intelligent Transportation Systems, 2012

Bayesian implementation of a Lagrangian macroscopic traffic flow model.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Bayesian separation of wind power generation signals.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Mining residential household information from low-resolution smart meter data.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Bayesian inference for an adaptive Ordered Probit model: An application to Brain Computer Interfacing.
Neural Networks, 2011

A Perfect Collision-Free Pseudonym System.
IEEE Communications Letters, 2011

Effective measurement selection in truncated kernel density estimator: Voronoi mean shift algorithm for truncated kernels.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

Robust Measurement Validation in Target Tracking Using Geometric Structure.
IEEE Signal Process. Lett., 2010

A highly efficient blocked Gibbs sampler reconstruction of multidimensional NMR spectra.
Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, 2010

Hybrid spam filtering for mobile communication.
Computers & Security, 2010

Improved Mean Shift Algorithm with Heterogeneous Node Weights.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Adaptive classification for Brain Computer Interface systems using Sequential Monte Carlo sampling.
Neural Networks, 2009

A new collision-free pseudonym scheme in mobile ad hoc networks.
Proceedings of the 7th International Symposium on Modeling and Optimization in Mobile, 2009

Sequential Bayesian estimation for adaptive classification.
Proceedings of the IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2008

Adaptive Classification by Hybrid EKF with Truncated Filtering: Brain Computer Interfacing.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2008

The Stringball: a ball Interface with Strings for Collaborative Performance.
Proceedings of the 2007 International Computer Music Conference, 2007

Bayesian Inference for 2D Gel Electrophoresis Image Analysis.
Proceedings of the Bioinformatics Research and Development, First International Conference, 2007

Bayesian inference for multidimensional NMR image reconstruction.
Proceedings of the 14th European Signal Processing Conference, 2006