Jiyong Han

According to our database1, Jiyong Han authored at least 13 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Practical In-Vehicle Security Architecture based on Trust Anchors.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

2022
Physical Simulation of Ultrasonic Imaging Logging Response.
Sensors, 2022

Hybrid neural coded modulation: Design and training methods.
ICT Express, 2022

2020
Security offloading network system for expanded security coverage in IPv6-based resource constrained data service networks.
Wirel. Networks, 2020

2018
Building a disaster rescue platform with utilizing device-to-device communication between smart devices.
Int. J. Distributed Sens. Networks, 2018

GS1 Connected Car: An Integrated Vehicle Information Platform and Its Ecosystem for Connected Car Services based on GS1 Standards.
Proceedings of the 2018 IEEE Intelligent Vehicles Symposium, 2018

Oliot-OpenCity: Open Standard Interoperable Smart City Platform.
Proceedings of the IEEE International Smart Cities Conference, 2018

2017
IsV2C: An Integrated Road Traffic-Network-Cloud Simulator for V2C Connected Car Services.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017

2016
Chaining the secret: Lightweight authentication for security in pervasive computing.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

A back-end offload architecture for security of resource-constrained networks.
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016

GS1 Connected Car Using EPCIS-ONS System.
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016

2015
Utilization-Aware Hybrid Beacon Scheduling in Cluster-Tree ZigBee Networks.
IEICE Trans. Inf. Syst., 2015

Practical security analysis for the constrained node networks: Focusing on the DTLS protocol.
Proceedings of the 5th International Conference on the Internet of Things, 2015


  Loading...