Jiyoung Lim

Orcid: 0009-0003-6904-9099

According to our database1, Jiyoung Lim authored at least 39 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An Analysis of Child-Related Metaverse Perceptions through Text Mining: Focusing on comparison with news article and parent communities.
Proceedings of the 2023 8th International Conference on Intelligent Information Technology, 2023

Analyzing Diverse Issues on AI Education in South Korea: Focusing on news editorials text mining.
Proceedings of the 7th International Conference on Education and Multimedia Technology, 2023

2020
Protocol Design for Boarding Confirmation Through Arduino Sensing.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

Supporting Groups to Monitor Themselves: Does It Distribute the Interaction?
Proceedings of the Interdisciplinarity in the Learning Sciences: Proceedings of the 14th International Conference of the Learning Sciences, 2020

2018
Location Based One-Time Conference Protocol Without Personal Information.
Proceedings of the Parallel and Distributed Computing, 2018

Dynamic Group Key Management for Efficient Fog Computing.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Visual Feedback for Asynchronous Online Interaction: Exploratory Study on the Pattern of Other-regulation.
Proceedings of the Rethinking learning in the digital age: Making the Learning Sciences count, 2018

2017
Secure and structured IoT smart grid system management.
Int. J. Web Grid Serv., 2017

Lightweight Authentication for Distributed Mobile P2P Communications.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

2016
Security system architecture for data integrity based on a virtual smart meter overlay in a smart grid system.
Soft Comput., 2016

Authentication for Mobile Open IPTV Service Security.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Search result diversification using data envelopment analysis.
Proceedings of the Sixth International Conference on Emerging Databases: Technologies, 2016

2015
Utilizing a Bluetooth remote lock system for a smartphone.
Pervasive Mob. Comput., 2015

Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security.
Intell. Autom. Soft Comput., 2015

An Enhanced Java-Based Mobile Device Theft Response System.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Secure Authentication for Structured Smart Grid System.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

2014
A computer remote control system based on speech recognition technologies of mobile devices and wireless communication technologies.
Comput. Sci. Inf. Syst., 2014

Pairwise and group key setup mechanism for secure machine-to-machine communication.
Comput. Sci. Inf. Syst., 2014

A Remote Lock System Using Bluetooth Communication.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Service Security for Smart Grid System.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

2013
Code updates based on minimal backbone and group key management for secure sensor networks.
Math. Comput. Model., 2013

A real-time location-based SNS smartphone application for the disabled population.
Comput. Sci. Inf. Syst., 2013

Key management approach for secure mobile open IPTV service.
Comput. Sci. Inf. Syst., 2013

Secure Aggregation and Attack Detection for Smart Grid System.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

A Remote Computer Control System Using Speech Recognition Technologies of Mobile Devices.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Key Establishment and Management for Secure Cellular Machine-to-Machine Communication.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

2012
Anomaly Teletraffic Intrusion Detection Systems on Hadoop-Based Platforms: A Survey of Some Problems and Solutions.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

An Improved Security Approach Based on Kerberos for M2M Open IPTV System.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Group Key Management for Secure Mobile IPTV Service.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Design and Implementation of Location-Based SNS Smartphone Application for the Disabled Population.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

2011
Distributed authentication mechanism for secure channel establishment in ubiquitous medical sensor networks.
Mob. Inf. Syst., 2011

Secure Code Dissemination Using Energy-Efficient Minimal Virtual Backbone in Sensor Networks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

2010
Energy-Efficient Code Dissemination Using Minimal Virtual Backbone in Sensor Networks.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2007
Advanced Agent-Delegated Route Optimization Protocol for Efficient Multimedia Services at Low-Battery Devices.
Proceedings of the Advances in Multimedia Modeling, 2007

2006
Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks.
Proceedings of the Computational Science and Its Applications, 2006

2003
Design of Security Enforcement Engine for Active Nodes in Active Networks.
Proceedings of the Information Networking, 2003

2002
Flow Admission Control for MPLS Support of DiffServ.
Proceedings of the Information Networking, 2002

2001
Differentiated Link Based QoS Routing Algorithms for Multimedia Traffic in MPLS Networks.
Proceedings of the 15th International Conference on Information Networking, 2001

1999
Predictive and Adaptive Bandwidth Reservation Strategies in Wireless Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999


  Loading...