Jong Hyuk Park

Affiliations:
  • Seoul National University of Science and Technology (Seoultech), Department of Computer Science and Engineering, South Korea
  • Kyungnam University, Department of Computer Science and Engineering, Changwon, South Korea (former)
  • Hanwha S&C Co. Ltd., Seoul, South Korea (former)
  • Waseda University, Graduate School of Human Sciences, Japan (former, PhD 2012)
  • Korea University, Graduate School of Information Security, Seoul, South Korea (former, PhD 2007)


According to our database1, Jong Hyuk Park authored at least 510 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions.
J. Ambient Intell. Humaniz. Comput., February, 2024

FL-CTIF: A federated learning based CTI framework based on information fusion for secure IIoT.
Inf. Fusion, February, 2024

Energy-efficient resource allocation in blockchain-based Cybertwin-driven 6G.
J. Ambient Intell. Humaniz. Comput., January, 2024

Digital twin-assisted resource allocation framework based on edge collaboration for vehicular edge computing.
Future Gener. Comput. Syst., January, 2024

2023
Machine Learning-Based Reversible Chaotic Masking Method for User Privacy Protection in CCTV Environment.
J. Inf. Process. Syst., December, 2023

A digital twin-based edge intelligence framework for decentralized decision in IoV system.
Inf. Sci., November, 2023

A Novel Smart Contract based Optimized Cloud Selection Framework for Efficient Multi-Party Computation.
J. Inf. Process. Syst., April, 2023

Federated Learning-Based Secure Electronic Health Record Sharing Scheme in Medical Informatics.
IEEE J. Biomed. Health Informatics, February, 2023

Recent Trends on Smart City Security: A Comprehensive Overview.
J. Inf. Process. Syst., February, 2023

Data-Driven Design of Electrically Conductive Nanocomposite Materials: A Case Study of Acrylonitrile-Butadiene-Styrene/Carbon Nanotube Binary Composites.
Adv. Intell. Syst., February, 2023

TaLWaR: Blockchain-Based Trust Management Scheme for Smart Enterprises With Augmented Intelligence.
IEEE Trans. Ind. Informatics, 2023

Secure and Reliable Big-Data-Based Decision Making Using Quantum Approach in IIoT Systems.
Sensors, 2023

FusionFedBlock: Fusion of blockchain and federated learning to preserve privacy in industry 5.0.
Inf. Fusion, 2023

Graph Sampling based Fairness-aware Recommendation over Sensitive Attribute Removal.
Proceedings of the IEEE International Conference on Data Mining, 2023

2022
SecureIIoT Environment: Federated Learning Empowered Approach for Securing IIoT From Data Breach.
IEEE Trans. Ind. Informatics, 2022

A Blockchain-Enabled Secure Digital Twin Framework for Early Botnet Detection in IIoT Environment.
Sensors, 2022

Blockchain-Based Distributed Information Hiding Framework for Data Privacy Preserving in Medical Supply Chain Systems.
Sensors, 2022

Blockchain-based delegated Quantum Cloud architecture for medical big data security.
J. Netw. Comput. Appl., 2022

Special issue on ambient intelligence, IoT, and Smart City.
J. Ambient Intell. Humaniz. Comput., 2022

SecureCPS: Cognitive inspired framework for detection of cyber attacks in cyber-physical systems.
Inf. Process. Manag., 2022

Editorial: Blockchain based sustainable, secure healthcare systems.
Comput. Networks, 2022

BIIoVT: Blockchain-Based Secure Storage Architecture for Intelligent Internet of Vehicular Things.
IEEE Consumer Electron. Mag., 2022

CoVAC: A P2P smart contract-based intelligent smart city architecture for vaccine manufacturing.
Comput. Ind. Eng., 2022

A Machine Learning based Scalable Blockchain architecture for a secure Healthcare system.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

Blockchain-based Federated Approach for Privacy-Preserved IoT-enabled Smart Vehicular Networks.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

2021
Blockchain-Based Secure Mist Computing Network Architecture for Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2021

A Blockchain-Based Deep Learning Approach for Cyber Security in Next Generation Industrial Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021

Ensemble learning-based prediction of contentment score using social multimedia in education.
Multim. Tools Appl., 2021

The Future of Quantum Information: Challenges and Vision.
J. Inf. Process. Syst., 2021

Blockchain-empowered cloud architecture based on secret sharing for smart city.
J. Inf. Secur. Appl., 2021

Emerging ICT applications and services - Big data, IoT, and cloud computing.
Int. J. Commun. Syst., 2021

Emerging ICT UAV applications and services: Design of surveillance UAVs.
Int. J. Commun. Syst., 2021

Machine learning based distributed big data analysis framework for next generation web in IoT.
Comput. Sci. Inf. Syst., 2021

Enhanced image preprocessing method for an autonomous vehicle agent system.
Comput. Sci. Inf. Syst., 2021

Securing Smart Cities using LSTM algorithm and lightweight containers against botnet attacks.
Appl. Soft Comput., 2021

Deep Learning and Blockchain-Empowered Security Framework for Intelligent 5G-Enabled IoT.
IEEE Access, 2021

2020
Distributed denial of service attacks and its defenses in IoT: a survey.
J. Supercomput., 2020

Symmetry-Adapted Machine Learning for Information Security.
Symmetry, 2020

Blockchain Technology Toward Green IoT: Opportunities and Challenges.
IEEE Netw., 2020

Quantum Communication Technology for Future ICT - Review.
J. Inf. Process. Syst., 2020

A Comprehensive Analyses of Intrusion Detection System for IoT Environment.
J. Inf. Process. Syst., 2020

Enhanced Machine Learning Algorithms: Deep Learning, Reinforcement learning and Q-learning.
J. Inf. Process. Syst., 2020

Future Trends of IoT, 5G Mobile Networks, and AI: Challenges, Opportunities, and Solutions.
J. Inf. Process. Syst., 2020

Advances in Algorithms, Security, and Systems for ICT Convergence.
J. Inf. Process. Syst., 2020

Advanced Technologies in Blockchain, Machine Learning, and Big Data.
J. Inf. Process. Syst., 2020

Algorithms, Processes, and Services for Future ICT.
J. Inf. Process. Syst., 2020

Security, Privacy, and Efficiency of Sustainable Computing for Future Smart Cities.
J. Inf. Process. Syst., 2020

Video transcoding scheme of multimedia data-hiding for multiform resources based on intra-cloud.
J. Ambient Intell. Humaniz. Comput., 2020

Waiting Time Minimized Charging and Discharging Strategy Based on Mobile Edge Computing Supported by Software-Defined Network.
IEEE Internet Things J., 2020

Parameterized algorithms of fundamental NP-hard problems: a survey.
Hum. centric Comput. Inf. Sci., 2020

A blockchain-based smart home gateway architecture for preventing data forgery.
Hum. centric Comput. Inf. Sci., 2020

BlockIoTIntelligence: A Blockchain-enabled Intelligent IoT Architecture with Artificial Intelligence.
Future Gener. Comput. Syst., 2020

Adaptive resource management using many-core processing for fault tolerance based on cyber-physical cloud systems.
Future Gener. Comput. Syst., 2020

Cognitive scenario generation computing in the Internet of things for enterprise information systems.
Enterp. Inf. Syst., 2020

Neural Polysynthetic Language Modelling.
CoRR, 2020

A combined network control approach for the edge cloud and LPWAN-based IoT services.
Concurr. Comput. Pract. Exp., 2020

Malware classification algorithm using advanced Word2vec-based Bi-LSTM for ground control stations.
Comput. Commun., 2020

Cognitive Science-Based Security Framework in Consumer Electronics.
IEEE Consumer Electron. Mag., 2020

Introduction to the Special Section on Artificial Intelligence-based Information Security.
Comput. Electr. Eng., 2020

Wearable Computing for Defence Automation: Opportunities and Challenges in 5G Network.
IEEE Access, 2020

A Study on the Digital Forensic Investigation Method of Clever Malware in IoT Devices.
IEEE Access, 2020

Dynamic Analysis for IoT Malware Detection With Convolution Neural Network Model.
IEEE Access, 2020

Block5GIntell: Blockchain for AI-Enabled 5G Networks.
IEEE Access, 2020

2019
A Unified Framework for Behaviour Monitoring and Abnormality Detection for Smart Home.
Wirel. Commun. Mob. Comput., 2019

A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions.
J. Supercomput., 2019

A blockchain-based decentralized efficient investigation framework for IoT digital forensics.
J. Supercomput., 2019

Blockchain-Based Distributed Framework for Automotive Industry in a Smart City.
IEEE Trans. Ind. Informatics, 2019

Smart Contract-Based Pool Hopping Attack Prevention for Blockchain Networks.
Symmetry, 2019

Advances in Future Internet and the Industrial Internet of Things.
Symmetry, 2019

DeepCachNet: A Proactive Caching Framework Based on Deep Learning in Cellular Networks.
IEEE Netw., 2019

Affective social big data generation algorithm for autonomous controls by CRNN-based end-to-end controls.
Multim. Tools Appl., 2019

SHSec: SDN based Secure Smart Home Network Architecture for Internet of Things.
Mob. Networks Appl., 2019

BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network.
J. Netw. Comput. Appl., 2019

Future Trends of Blockchain and Crypto Currency: Challenges, Opportunities, and Solutions.
J. Inf. Process. Syst., 2019

Future Trends of AI-based Smart Systems and Services: Challenges, Opportunities, and Solutions.
J. Inf. Process. Syst., 2019

CCTV-Based Multi-Factor Authentication System.
J. Inf. Process. Syst., 2019

Integration of Cloud and Big Data Analytics for Future Smart Cities.
J. Inf. Process. Syst., 2019

Emerging Technologies for Sustainable Smart City Network Security: Issues, Challenges, and Countermeasures.
J. Inf. Process. Syst., 2019

Learning Algorithms in AI System and Services.
J. Inf. Process. Syst., 2019

IoT and Smart City Technology: Challenges, Opportunities, and Solutions.
J. Inf. Process. Syst., 2019

Advanced Big Data Analysis, Artificial Intelligence & Communication Systems.
J. Inf. Process. Syst., 2019

Guest Editorial Special Issue on Advanced Computational Technologies in Mobile Edge Computing for the Internet of Things.
IEEE Internet Things J., 2019

CIoT-Net: a scalable cognitive IoT based smart city network architecture.
Hum. centric Comput. Inf. Sci., 2019

Multilevel learning based modeling for link prediction and users' consumption preference in Online Social Networks.
Future Gener. Comput. Syst., 2019

A user experience environment model for human activity simulation.
Future Gener. Comput. Syst., 2019

Adaptive job allocation scheduler based on usage pattern for computing offloading of IoT.
Future Gener. Comput. Syst., 2019

A blockchain-based trusted security zone architecture.
Electron. Libr., 2019

A parallel team formation approach using crowd intelligence from social network.
Comput. Hum. Behav., 2019

Hi-LASSO: High-Dimensional LASSO.
IEEE Access, 2019

2018
An improved ant colony optimization-based approach with mobile sink for wireless sensor networks.
J. Supercomput., 2018

Fusion algorithms and high-performance applications for vehicular cloud computing.
J. Supercomput., 2018

CF-CloudOrch: container fog node-based cloud orchestration for IoT networks.
J. Supercomput., 2018

Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities.
IEEE Trans. Ind. Informatics, 2018

MTD-Spamguard: a moving target defense-based spammer detection system in social network.
Soft Comput., 2018

Advances in intelligence and internet of things for human-centric computing.
Soft Comput., 2018

An efficient approach to understanding social evolution of location-focused online communities in location-based services.
Soft Comput., 2018

Advanced algorithms and applications for IoT cloud computing convergence.
J. Parallel Distributed Comput., 2018

A novel framework for internet of knowledge protection in social networking services.
J. Comput. Sci., 2018

Development of A Textile Capacitive Proximity Sensor and Gait Monitoring System for Smart Healthcare.
J. Medical Syst., 2018

Analysis of a Third-Party Application for Mobile Forensic Investigation.
J. Inf. Process. Syst., 2018

Enhanced Integrated Algorithm & Software Architecture.
J. Inf. Process. Syst., 2018

Practical Approaches Based on Deep Learning and Social Computing.
J. Inf. Process. Syst., 2018

A Survey on Cyber Physical System Security for IoT: Issues, Challenges, Threats, Solutions.
J. Inf. Process. Syst., 2018

Artificial Intelligence for the Fourth Industrial Revolution.
J. Inf. Process. Syst., 2018

Advanced Data Processing, Optimization & Software Engineering.
J. Inf. Process. Syst., 2018

Algorithms, Processes, and Frameworks for User-oriented Applications.
J. Inf. Process. Syst., 2018

Novel Solutions and Approaches to Effective Data Processing.
J. Inf. Process. Syst., 2018

Advanced algorithms and applications based on IoT for the smart devices.
J. Ambient Intell. Humaniz. Comput., 2018

EH-HL: Effective Communication Model by Integrated EH-WSN and Hybrid LiFi/WiFi for IoT.
IEEE Internet Things J., 2018

Human-intelligence workflow management for the big data of augmented reality on cloud infrastructure.
Neurocomputing, 2018

Li-Fi based on security cloud framework for future IT environment.
Hum. centric Comput. Inf. Sci., 2018

Blockchain based hybrid network architecture for the smart city.
Future Gener. Comput. Syst., 2018

OpCloudSec: Open cloud software defined wireless network security for the Internet of Things.
Comput. Commun., 2018

Traffic management in the mobile edge cloud to improve the quality of experience of mobile video.
Comput. Commun., 2018

SoftEdgeNet: SDN Based Energy-Efficient Distributed Network Architecture for Edge Computing.
IEEE Commun. Mag., 2018

SLP-MCAF: Multiple Clusters of Connected Vehicles Authentication Framework in a Smart Life Platform.
IEEE Commun. Mag., 2018

DistArch-SCNet: Blockchain-Based Distributed Architecture with Li-Fi Communication for a Scalable Smart City Network.
IEEE Consumer Electron. Mag., 2018

IoT application protection against power analysis attack.
Comput. Electr. Eng., 2018

Semi-supervised learning based distributed attack detection framework for IoT.
Appl. Soft Comput., 2018

SpamSpotter: An efficient spammer detection framework based on intelligent decision support system on Facebook.
Appl. Soft Comput., 2018

An effective handling of secure data stream in IoT.
Appl. Soft Comput., 2018

Job Allocation Mechanism for Battery Consumption Minimization of Cyber-Physical-Social Big Data Processing Based on Mobile Cloud Computing.
IEEE Access, 2018

A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT.
IEEE Access, 2018

A Hesitant Fuzzy Based Security Approach for Fog and Mobile-Edge Computing.
IEEE Access, 2018

Remote Software Update in Trusted Connection of Long Range IoT Networking Integrated With Mobile Edge Cloud.
IEEE Access, 2018

A Fog Computing-Based Automotive Data Overload Protection System with Real-Time Analysis.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

2017
Automatic Generation of Ortho-Photo Texture from Digital Elevation Model.
J. Signal Process. Syst., 2017

Energy-efficient cluster-based dynamic routes adjustment approach for wireless sensor networks with mobile sinks.
J. Supercomput., 2017

Novel assessment method for accessing private data in social network security services.
J. Supercomput., 2017

DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks.
J. Supercomput., 2017

A shortest path planning algorithm for cloud computing environment based on multi-access point topology analysis for complex indoor spaces.
J. Supercomput., 2017

CloudRPS: a cloud analysis based enhanced ransomware prevention system.
J. Supercomput., 2017

S-Detector: an enhanced security model for detecting Smishing attack for mobile computing.
Telecommun. Syst., 2017

Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions.
Symmetry, 2017

Unmanned Aerial Vehicle Flight Point Classification Algorithm Based on Symmetric Big Data.
Symmetry, 2017

DIaaS: Resource Management System for the Intra-Cloud with On-Premise Desktops.
Symmetry, 2017

A light-weight secure information transmission and device control scheme in integration of CPS and cloud computing.
Microprocess. Microsystems, 2017

Adaptive power management scheme using many-core for maximizing network topology lifetime based on ubiquitous computing.
J. Syst. Archit., 2017

Adaptive data rate control in low power wide area networks for long range IoT services.
J. Comput. Sci., 2017

Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City.
J. Inf. Process. Syst., 2017

XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs.
J. Inf. Process. Syst., 2017

Efficient Approaches to Computer Vision and Pattern Recognition.
J. Inf. Process. Syst., 2017

Novel Approaches for Applying Linguistic Processing Techniques Based on Pattern Recognition and Machine Learning.
J. Inf. Process. Syst., 2017

New Approaches to Advanced Network and Image Processing.
J. Inf. Process. Syst., 2017

Advances in Algorithm, Multimedia, and Network for Future IT.
J. Inf. Process. Syst., 2017

Advanced Communications and Artificial Intelligence, and Introduction of the JIPS AWARD 2016.
J. Inf. Process. Syst., 2017

Feasibility and Performance Analysis of RDMA Transfer through PCI Express.
J. Inf. Process. Syst., 2017

Social network security: Issues, challenges, threats, and solutions.
Inf. Sci., 2017

An improved recommendation algorithm for big data cloud service based on the trust in sociology.
Neurocomputing, 2017

A secure-coding and vulnerability check system based on smart-fuzzing and exploit.
Neurocomputing, 2017

Iceberg Clique queries in large graphs.
Neurocomputing, 2017

Magnetically-coupled boost-forward converter for high efficiency differential power processing systems.
IEICE Electron. Express, 2017

Crowdsensing Multimedia Data: Security and Privacy Issues.
IEEE Multim., 2017

An enhanced security framework for home appliances in smart home.
Hum. centric Comput. Inf. Sci., 2017

DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks.
IEEE Commun. Mag., 2017

DFA-AD: a distributed framework architecture for the detection of advanced persistent threats.
Clust. Comput., 2017

Radio resource management for data transmission in low power wide area networks integrated with large scale cyber physical systems.
Clust. Comput., 2017

Telling Computer and Human Apart: Image-Sound Based CAPTCHA System.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

Safe-Driving Aid System Using Bi-directional Cameras.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

i-SHSS: An IoT Based Smart Home Security System.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

DSS-SL: Dynamic Signage System Based on SDN with LiFi Communication for Smart Buildings.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

The Study on Data of Smart Home System as Digital Evidence.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

EEG Based Smart Driving for Intelligent Accident Management.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

DOTP-AaaS: Dynamic One Time Password Matching-Based Authentication as a Service.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

Bootstrapping Distantly Supervised IE Using Joint Learning and Small Well-Structured Corpora.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
User Experience and Quality-of-Service in Internet of Things: Practice and Trends.
Wirel. Pers. Commun., 2016

Intelligent Security Model of Smart Phone Based on Human Behavior in Mobile Cloud Computing.
Wirel. Pers. Commun., 2016

Efficient Resource Management Scheme for Storage Processing in Cloud Infrastructure with Internet of Things.
Wirel. Pers. Commun., 2016

RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks.
J. Supercomput., 2016

Human-centric storage resource mechanism for big data on cloud service architecture.
J. Supercomput., 2016

Design of secure authentication scheme between devices based on zero-knowledge proofs in home automation service environments.
J. Supercomput., 2016

A rhythm-based access control system for secure wellness services.
J. Supercomput., 2016

Relative weight comparison between virtual key factors of cloud computing with analytic network process.
J. Supercomput., 2016

A service composition model based on user experience in Ubi-cloud comp.
Telecommun. Syst., 2016

Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World.
Symmetry, 2016

Scenario-Based Digital Forensics Challenges in Cloud Computing.
Symmetry, 2016

The Design and Analysis of a Secure Personal Healthcare System Based on Certificates.
Symmetry, 2016

Optional Frame Selection Algorithm for Adaptive Symmetric Service of Augmented Reality Big Data on Smart Devices.
Symmetry, 2016

Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments.
Sensors, 2016

A Reliable TTP-Based Infrastructure with Low Sensor Resource Consumption for the Smart Home Multi-Platform.
Sensors, 2016

Minimum Interference Channel Assignment Algorithm for Multicast in a Wireless Mesh Network.
Sensors, 2016

An enhanced security framework for reliable Android operating system.
Secur. Commun. Networks, 2016

Challenges and opportunities in next-generation cyberspace security.
Secur. Commun. Networks, 2016

Guest Editorial: Technologies and Applications for Interactive NUX/NUI.
Multim. Tools Appl., 2016

All-in-focus and multi-focus color image reconstruction from a database of color and depth image pairs.
Multim. Tools Appl., 2016

An effective locking scheme of smart multimedia devices with convenience and enhanced security.
Multim. Tools Appl., 2016

The disclosure of evaporating digital trails respecting the combinations of Gmail and IE for pervasive multimedia.
Multim. Tools Appl., 2016

An efficient route scheduling mechanism for WiMAX network - ERRATUM.
Knowl. Eng. Rev., 2016

A survey on cloud computing security: Issues, threats, and solutions.
J. Netw. Comput. Appl., 2016

[EDITORIAL] Advances in Multimedia Computing and Security and the Introduction of New Senior Editors.
J. Inf. Process. Syst., 2016

[Editorial] Advanced Technologies and Applications for Security and Multimedia Computing.
J. Inf. Process. Syst., 2016

HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet.
J. Inf. Process. Syst., 2016

k-Cliques mining in dynamic social networks based on triadic formal concept analysis.
Neurocomputing, 2016

Location based authentication scheme using BLE for high performance digital content management system.
Neurocomputing, 2016

Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing.
Entropy, 2016

Beacon-based active media control interface in indoor ubiquitous computing environment.
Clust. Comput., 2016

Introduction to the special section on parallel architectures, algorithms and programming.
Comput. Electr. Eng., 2016

Energy-Efficient Distributed Topology Control Algorithm for Low-Power IoT Communication Networks.
IEEE Access, 2016

Memory ECC architecutre utilizing memory column spares.
Proceedings of the International SoC Design Conference, 2016

Solving Standard Cell Placement Problem Using Discrete Firefly Algorithm: A Nature Inspired Approach.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

Security Requirements and Countermeasures for Secure Home Network in Internet of Things.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

Data Mining Techniques to Facilitate Digital Forensics Investigations.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

A Security Model for Protecting Virtualization in Cloud Computing.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

Active Learning Algorithms for Graphical Model Selection.
Proceedings of the 19th International Conference on Artificial Intelligence and Statistics, 2016

2015
Output Effect Evaluation Based on Input Features in Neural Incremental Attribute Learning for Better Classification Performance.
Symmetry, 2015

Live Mobile Distance Learning System for Smart Devices.
Symmetry, 2015

Design of a Distributed Personal Information Access Control Scheme for Secure Integrated Payment in NFC.
Symmetry, 2015

Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key.
Symmetry, 2015

The Digital Fingerprinting Analysis Concerning <i>Google Calendar</i> under Ubiquitous Mobile Computing Era.
Symmetry, 2015

Online Social Snapshots of a Generic Facebook Session Based on Digital Insight Data for a Secure Future IT Environment.
Symmetry, 2015

Social Media Services and Technologies Towards Web 3.0.
Multim. Tools Appl., 2015

Intelligent state machine for social ad hoc data management and reuse.
Multim. Tools Appl., 2015

User tailored cloud-learning system using SNS and learning resources.
Multim. Tools Appl., 2015

Relative weight evaluation of the factors inducing social media service use.
Multim. Tools Appl., 2015

Real-time smartphone sensing and recommendations towards context-awareness shopping.
Multim. Syst., 2015

Service based AEHS for human centric learning environments.
J. Ambient Intell. Smart Environ., 2015

CIMS: A Context-Based Intelligent Multimedia System for Ubiquitous Cloud Computing.
Inf., 2015

Multi-WSN Simulator with Log Data for Efficient Sensing on Internet of Things.
Int. J. Distributed Sens. Networks, 2015

Attendance Check System and Implementation for Wi-Fi Networks Supporting Unlimited Number of Concurrent Connections.
Int. J. Distributed Sens. Networks, 2015

An efficient authentication system of smart device using multi factors in mobile cloud service architecture.
Int. J. Commun. Syst., 2015

Graph-based motor primitive generation framework.
Hum. centric Comput. Inf. Sci., 2015

s-ITSF: a service based intelligent transportation system framework for smart accident management.
Hum. centric Comput. Inf. Sci., 2015

An efficient character input scheme with a gyro sensor of smartphone on ubiquitous cluster computing.
Clust. Comput., 2015

Mining Social Media for Knowledge Discovery.
Comput. J., 2015

Bayesian Probability-Based Motion Estimation Method in Ubiquitous Computing Environments.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

Design of Secure Protocol for Session Key Exchange in Vehicular Cloud Computing.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

Parallel Processing Simulator for Separate Sensor of WSN Simulator with GPU.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Computational awareness towards green environments.
J. Supercomput., 2014

Cloud computing-based jam management for a manufacturing system in a Green IT environment.
J. Supercomput., 2014

An enhanced integrity of web contents through mobile cloud environments.
J. Supercomput., 2014

Posted price model based on GRS and its optimization for improving grid resource sharing efficiency.
Telecommun. Syst., 2014

Navigation-based self-optimization handover mechanism for mobile relay stations in WiMAX networks.
Telecommun. Syst., 2014

MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats.
Symmetry, 2014

An Interactive IPTV System With Community Participation in Cloud Computing Environments.
IEEE Syst. J., 2014

An on-site digital investigation methodology for data leak case.
Secur. Commun. Networks, 2014

A smart assistant toward product-awareness shopping.
Pers. Ubiquitous Comput., 2014

Digital evidence discovery of networked multimedia smart devices based on social networking activities.
Multim. Tools Appl., 2014

An efficient route scheduling mechanism for WiMAX network.
Knowl. Eng. Rev., 2014

Smart devices and spaces for pervasive computing.
J. Syst. Archit., 2014

Multimedia contents adaptation by modality conversion with user preference in wireless network.
J. Netw. Comput. Appl., 2014

Test-driven forensic analysis of satellite automotive navigation systems.
J. Intell. Manuf., 2014

IT convergence security.
J. Intell. Manuf., 2014

REST-MapReduce: An Integrated Interface but Differentiated Service.
J. Appl. Math., 2014

An Efficient and Secure <i>m</i>-IPS Scheme of Mobile Devices for Human-Centric Computing.
J. Appl. Math., 2014

Introduction to the thematic issue on Ambient and Smart Component Technologies for Human Centric Computing.
J. Ambient Intell. Smart Environ., 2014

Personlized English reading sequencing based on learning portfolio analysis.
Inf. Sci., 2014

VBSM: VCC-Based Black Box Service Model with Enhanced Data Integrity.
Inf., 2014

Pervasive Sensing Technologies and Emerging Trends.
Int. J. Distributed Sens. Networks, 2014

An ANP-Based Practical Quality Model for a Secure Embedded System with Sensor Network.
Int. J. Distributed Sens. Networks, 2014

Visual Scheme Monitoring of Sensors for Fault Tolerance on Wireless Body Area Networks with Cloud Service Infrastructure.
Int. J. Distributed Sens. Networks, 2014

Ensuring Healthcare Services Provision: An Integrated Approach of Resident Contexts Extraction and Analysis via Smart Objects.
Int. J. Distributed Sens. Networks, 2014

Visualization of dynamic fault tolerance rerouting for data traffic in wireless sensor network.
Int. J. Commun. Syst., 2014

Content-oriented learning recommendation mechanism in MANETs.
Int. J. Ad Hoc Ubiquitous Comput., 2014

An enhanced smartphone security model based on information security management system (ISMS).
Electron. Commer. Res., 2014

A secure smart-work service model based OpenStack for Cloud computing.
Clust. Comput., 2014

A strengthening plan for enterprise information security based on cloud computing.
Clust. Comput., 2014

Rhythm-Based Authentication Scheme on Smart Devices.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

The Cloud Storage Model for Manufacturing System in Global Factory Automation.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

Faster Translated Binary Execution on Mobile System through Virtualization.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
ODSA: Chord-Based Object Discovery Service Architecture for the Internet of Things.
Wirel. Pers. Commun., 2013

An anomaly-based detection in ubiquitous network using the equilibrium state of the catastrophe theory.
J. Supercomput., 2013

Multimedia technology for pervasive computing environment.
J. Supercomput., 2013

Advances in communication networks for pervasive and ubiquitous applications.
J. Supercomput., 2013

Data center selection based on neuro-fuzzy inference systems in cloud computing environments.
J. Supercomput., 2013

Revisiting reorder buffer architecture for next generation high performance computing.
J. Supercomput., 2013

Mobile cloud computing framework for a pervasive and ubiquitous environment.
J. Supercomput., 2013

Erratum to: Effective session key distribution for secure fast handover in mobile networks.
Telecommun. Syst., 2013

Advances in security and multimodality for pervasive computing environments - TS Special Issue.
Telecommun. Syst., 2013

Design and implementation of a wireless sensor network architecture using smart mobile devices.
Telecommun. Syst., 2013

Perceptual quality based error control for scalable on-demand streaming in next-generation wireless networks.
Telecommun. Syst., 2013

A RF4CE-based remote controller with interactive graphical user interface applied to home automation system.
ACM Trans. Embed. Comput. Syst., 2013

Efficient localization scheme with ring overlapping by utilizing mobile anchors in wireless sensor networks.
ACM Trans. Embed. Comput. Syst., 2013

Modeling user-generated contents: an intelligent state machine for user-centric search support.
Pers. Ubiquitous Comput., 2013

Theme issues on U-Business service and strategy, and U-Healthcare.
Pers. Ubiquitous Comput., 2013

Top-k entities query processing on uncertainly fused multi-sensory data.
Pers. Ubiquitous Comput., 2013

ALCA: agent learning-based clustering algorithm in vehicular ad hoc networks.
Pers. Ubiquitous Comput., 2013

Encoder design for healthcare signals.
Pers. Ubiquitous Comput., 2013

Inference topology of distributed camera networks with multiple cameras.
Multim. Tools Appl., 2013

Extraction of enhanced evoked potentials using wavelet filtering.
Multim. Tools Appl., 2013

Concurrent multipath transmission with forward error correction mechanism to overcome burst packet losses for delay-sensitive video streaming in wireless home networks.
Multim. Tools Appl., 2013

An Efficient Dynamic Integration Middleware for Cyber-Physical Systems in Mobile Environments.
Mob. Networks Appl., 2013

Context-aware service roaming for heterogeneous embedded devices over cloud.
J. Syst. Archit., 2013

Structure-free message aggregation and routing in traffic information system (SMART).
J. Netw. Comput. Appl., 2013

A QoS Model for a RFID Enabled Application with Next-Generation Sensors for Manufacturing Systems.
Int. J. Distributed Sens. Networks, 2013

Visual Scheme for the Detection of Mobile Attack on WSN Simulator.
Int. J. Distributed Sens. Networks, 2013

Maximizing Network Lifetime of Directional Sensor Networks Considering Coverage Reliability.
Int. J. Distributed Sens. Networks, 2013

Improving Performance through REST Open API Grouping for Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2013

Load balancing and adaptive scheduling for data intensive prioritised traffic in multi-radio multi-channel wireless mesh networks.
Int. J. Ad Hoc Ubiquitous Comput., 2013

Efficient model of Korean graphemes based on a smartphone keyboard.
Electron. Commer. Res., 2013

Adaptive network-based fuzzy inference model on CPS for large scale intelligent and cooperative surveillance.
Computing, 2013

Privacy-preserving max/min query in two-tiered wireless sensor networks.
Comput. Math. Appl., 2013

Special Issue on Advanced Information Security for Secure and Trust Computing.
Comput. Math. Appl., 2013

Research trends in cloud, cluster and grid computing.
Clust. Comput., 2013

Advanced Security Technologies and Services for Future Computing Environments.
Comput. J., 2013

High availability and efficient energy consumption for cloud computing service with grid infrastructure.
Comput. Electr. Eng., 2013

A novel and efficient source-path discovery and maintenance method for application layer multicast.
Comput. Electr. Eng., 2013

Application for Mobile Cloud Learning.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

Service Based User Oriented Adaptive Learning System.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

Design and Simulation of Access Router Discovery Process in Mobile Environments.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

Study on Wireless Intrusion Prevention System for Mobile Office.
Proceedings of the Information Technology Convergence, 2013

A Component Model for Manufacturing System in Cloud Computing.
Proceedings of the Information Technology Convergence, 2013

Information success model for learning system in cloud computing environment.
Proceedings of the International Joint Conference on Awareness Science and Technology & Ubi-Media Computing, 2013

Security Considerations in Cloud Computing Virtualization Environment.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Network-Aware Multiway Join for MapReduce.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

CMMI Security Model for Cloud Manufacturing System's Network.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

Petri-Net Based User Profile Data Ontology for SNS.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
The weighted shortest path search based on multi-agents in mobile GIS management services.
Wirel. Commun. Mob. Comput., 2012

An interference-aware multichannel media access control protocol for wireless sensor networks.
J. Supercomput., 2012

An authentication protocol offering service anonymity of mobile device in ubiquitous environment.
J. Supercomput., 2012

Efficient scheme of verifying integrity of application binaries in embedded operating systems.
J. Supercomput., 2012

A self-adaptive K selection mechanism for re-authentication load balancing in large-scale systems.
J. Supercomput., 2012

Bio-inspired computing for hybrid information technology.
Soft Comput., 2012

Design and simulation of a hierarchical priority fairness scheduler in an uplink Worldwide Interoperability for Microwave Access system.
Simul., 2012

Improved RF4CE key agreement approach involving two-phase key distribution for smart-convergence home device.
Secur. Commun. Networks, 2012

Security technologies and applications for convergence environments.
Secur. Commun. Networks, 2012

A VoIP system for mobility voice security support using the VPN.
Secur. Commun. Networks, 2012

A partially reconstructed previous Gmail session by live digital evidences investigation through volatile data acquisition.
Secur. Commun. Networks, 2012

Guest editorial: Theme issue on smartphone applications and services for pervasive computing.
Pers. Ubiquitous Comput., 2012

Secure and efficient public key management in next generation mobile networks.
Pers. Ubiquitous Comput., 2012

Recent advances and future directions in multimedia and mobile computing.
Multim. Tools Appl., 2012

Intelligent video surveillance system: 3-tier context-aware surveillance system with metadata.
Multim. Tools Appl., 2012

Image hash generation method using hierarchical histogram.
Multim. Tools Appl., 2012

A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment.
Math. Comput. Model., 2012

Achieving reliable system performance by fast recovery of branch miss prediction.
J. Netw. Comput. Appl., 2012

A cache-based search algorithm in unstructured P2P networks.
J. Intell. Manuf., 2012

Intelligent model design of cluster supply chain with horizontal cooperation.
J. Intell. Manuf., 2012

Study on the common criteria methodology for secure ubiquitous environment construction.
J. Intell. Manuf., 2012

Ubiquitous computing for communications and broadcasting.
Int. J. Commun. Syst., 2012

Distributed Video Coding: an overview of basics, research issues and solutions.
Int. J. Ad Hoc Ubiquitous Comput., 2012

Adaptive power management system for mobile multimedia device.
IET Commun., 2012

MSNS: mobile sensor network simulator for area coverage and obstacle avoidance based on GML.
EURASIP J. Wirel. Commun. Netw., 2012

Chain-to-chain inventory transshipment model and robust switch control in CSC networks.
Concurr. Comput. Pract. Exp., 2012

MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

The Partial Digital Evidence Disclosure in Respect to the Instant Messaging Embedded in Viber Application Regarding an Android Smart Phone.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

An Efficient Cloud Storage Model for Cloud Computing Environment.
Proceedings of the Advances in Grid and Pervasive Computing - 7th International Conference, 2012

Design and Implementation of Improved Authentication System for Android Smartphone Users.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Design of QoS in Intelligent Communication Environments Based on Neural Network.
Wirel. Pers. Commun., 2011

Resilient Security Mechanism for Wireless Ad hoc Network.
Wirel. Pers. Commun., 2011

Energy Efficient Distributed Face Recognition in Wireless Sensor Network.
Wirel. Pers. Commun., 2011

Ontology Based Resource Usage Policy Matching in Computational Grid for Pervasive Computing Applications.
Wirel. Pers. Commun., 2011

Self-stabilizing flocking of a group of mobile robots with memory corruption.
Wirel. Commun. Mob. Comput., 2011

Security analysis and improvements of IEEE standard 802.16 in next generation wireless metropolitan access network.
Wirel. Commun. Mob. Comput., 2011

Network security and digital forensics in next generation communications.
Wirel. Commun. Mob. Comput., 2011

Hybrid security protocol for wireless body area networks.
Wirel. Commun. Mob. Comput., 2011

Admissible bilinear map-based key management protocol for HPCCS in heterogeneous network.
J. Supercomput., 2011

A portable UPnP-based high performance content sharing system for supporting multimedia devices.
J. Supercomput., 2011

Policy-Based Scheduling and Resource Allocation for Multimedia Communication on Grid Computing Environment.
IEEE Syst. J., 2011

An Emergency-Adaptive Routing Scheme for Wireless Sensor Networks for Building Fire Hazard Monitoring.
Sensors, 2011

Throughput Fairness Enhancement Using Differentiated Channel Access in Heterogeneous Sensor Networks.
Sensors, 2011

M-MUSICS: an intelligent mobile music retrieval system.
Multim. Syst., 2011

The effect and strategy research of the secure E-commerce by the application of P2P.
Math. Comput. Model., 2011

Live Data Mining Concerning Social Networking Forensics Based on a Facebook Session Through Aggregation of Social Data.
IEEE J. Sel. Areas Commun., 2011

Providing security vertical handoff in SARAH for heterogeneous networks.
J. Netw. Comput. Appl., 2011

Enhanced HCCA mechanism for multimedia traffics with QoS support in IEEE 802.11e networks.
J. Netw. Comput. Appl., 2011

An Environmental-Adaptive Fall Detection System on Mobile Device.
J. Medical Syst., 2011

Packet Scheduling with QoS and Fairness for Downlink Traffic in WiMAX Networks.
J. Inf. Process. Syst., 2011

A security management scheme for failure detector distributed systems based on self-tuning control theory.
J. Intell. Manuf., 2011

Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems.
Inf. Syst. Frontiers, 2011

Information fusion in future generation communication environments.
Inf. Fusion, 2011

Using Multi-Modal Semantic Association Rules to fuse keywords and visual features automatically for Web image retrieval.
Inf. Fusion, 2011

SPHINX: a scheduling middleware for data intensive applications on a grid.
Int. J. Internet Protoc. Technol., 2011

A novel low-power RF4CE-based communication framework for multimedia system control.
Int. J. Commun. Syst., 2011

A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication.
Int. J. Commun. Syst., 2011

Quantum entanglement and non-locality based secure computation for future communication.
IET Inf. Secur., 2011

Efficient sensor node authentication in third generation-wireless sensor networks integrated networks.
IET Commun., 2011

A Secure and Robust Connectivity Architecture for Smart Devices and Applications.
EURASIP J. Wirel. Commun. Netw., 2011

A Novel Approach to Detect Network Attacks Using G-HMM-Based Temporal Relations between Internet Protocol Packets.
EURASIP J. Wirel. Commun. Netw., 2011

Robust one-time password authentication scheme using smart card for home network environment.
Comput. Commun., 2011

Special issue of computer communications on information and future communication security.
Comput. Commun., 2011

DoS attacks exploiting signaling in UMTS and IMS.
Comput. Commun., 2011

Spatial Network RNN Queries in GIS.
Comput. J., 2011

Preface to Special Section on Intelligent Multimedia Systems and Data Management for UBI-COM.
Comput. Informatics, 2011

Weak Keys of the Block Cipher SEED-192 for Related-Key Differential Attacks.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

Digital Trails Discovering of a GPS Embedded Smart Phone - Take Nokia N78 Running Symbian S60 Ver 3.2 for Example.
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011

A High-Capacity CDMA Watermarking Scheme Based on Orthogonal Pseudorandom Sequence Subspace Projection.
Proceedings of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, 2011

A Study on the Performance of Wireless Localization System Based on AoA in WSN Environment.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

A Study on the Performance Improvement of Impulse-Radio System in Multiple Interference Environment.
Proceedings of the 2011 International Conference on Broadband, 2011

Design and Analysis of a MST-Based Topology Control Scheme with PSO for Wireless Sensor Networks.
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011

2010
Authentication and ID-Based Key Management Protocol in Pervasive Environment.
Wirel. Pers. Commun., 2010

Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments.
Wirel. Pers. Commun., 2010

Connectivity and coverage maintenance in wireless sensor networks.
J. Supercomput., 2010

Privacy-enhanced Key Recovery in mobile communication environments.
J. Supercomput., 2010

Design and implementation of a framework for building distributed smart object systems.
J. Supercomput., 2010

Special issue on "security for multimedia and ubiquitous applications".
Telecommun. Syst., 2010

Effective session key distribution for secure fast handover in mobile networks.
Telecommun. Syst., 2010

Subscriber authentication technology of AAA mechanism for mobile IPTV service offer.
Telecommun. Syst., 2010

Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device.
Telecommun. Syst., 2010

An effective simulation method for search strategy in unstructured P2P network.
Simul. Model. Pract. Theory, 2010

The Domain Decomposition Method for Maxwell's Equations in Time Domain Simulations with Dispersive Metallic Media.
SIAM J. Sci. Comput., 2010

Special issue on advanced intelligent multimedia applications for next generation environments.
Multim. Tools Appl., 2010

A scalable and adaptive video streaming framework over multiple paths.
Multim. Tools Appl., 2010

A portable toolkit for supporting end-user personalization and control in context-aware applications.
Multim. Tools Appl., 2010

Spatial parameters for audio coding: MDCT domain analysis and synthesis.
Multim. Tools Appl., 2010

ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Advanced Mobile Applications and Intelligent Multimedia systems for Ubi-Com".
Mob. Networks Appl., 2010

On Prolonging the Lifetime for Wireless Video Sensor Networks.
Mob. Networks Appl., 2010

A Framework for Engineering Pervasive Applications Applied to Intra-vehicular Sensor Network Applications.
Mob. Networks Appl., 2010

Multimedia Services and Applications.
J. Univers. Comput. Sci., 2010

Editorial.
J. Intell. Manuf., 2010

Power-Aware and Reliable Sensor Selection Based on Trust for Wireless Sensor Networks.
J. Commun., 2010

A sensing policy based on the statistical property of licensed channel in cognitive network.
Int. J. Internet Protoc. Technol., 2010

User authentication schemes with pseudonymity for ubiquitous sensor network in NGN.
Int. J. Commun. Syst., 2010

Multi-frame Beacon Management for constructing interference-avoided LR-WPAN.
Int. J. Ad Hoc Ubiquitous Comput., 2010

Multi-path transmission control scheme combining bandwidth aggregation and packet scheduling for real-time streaming in multi-path environment.
IET Commun., 2010

Fair incentive mechanism with pyramidal structure for peer-to-peer networks.
IET Commun., 2010

Predictive control for vehicular sensor networks based on round-trip time-delay prediction.
IET Commun., 2010

A Pervasive Secret Sharing Scheme For Embedded Visual Communication System.
Intell. Autom. Soft Comput., 2010

Device Authentication In Wireless And Pervasive Environments.
Intell. Autom. Soft Comput., 2010

Adaptive Body Posture Analysis for Elderly-Falling Detection with Multisensors.
IEEE Intell. Syst., 2010

Novel Approaches to Enhance Mobile WiMAX Security.
EURASIP J. Wirel. Commun. Netw., 2010

A proposal for automating investigations in live forensics.
Comput. Stand. Interfaces, 2010

A secure model for controlling the hubs in P2P wireless network based on trust value.
Comput. Commun., 2010

Special issue of computers and mathematics with applications on "Advances in cryptography, security and applications for future computer science".
Comput. Math. Appl., 2010

The incentive secure mechanism based on quality of service in P2P network.
Comput. Math. Appl., 2010

A Simulation Model Supporting Time and Non-time Metrics for Web Service Composition.
Comput. J., 2010

An Efficient Localization Scheme with Ring Overlapping by Utilizing Mobile Anchors in Wireless Sensor Networks.
Proceedings of the 4th International Conference on Multimedia and Ubiquitous Engineering, 2010

A Survey on Multimedia Communicating Technology Based on Spatial Audio Coding.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Global Top-k Aggregate Queries Based on X-tuple in Uncertain Database.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
Performance Optimization with Efficient Polling Mechanism in IEEE 802.16 Networks with Cross-Layer Consideration.
Wirel. Pers. Commun., 2009

Towards a Performance-Based Resource Server Access Control in Future Grid Communication Environments.
Wirel. Pers. Commun., 2009

Editorial: Special Issue on "Information Security and Data Protection in Future Generation Communication and Networking".
Wirel. Pers. Commun., 2009

RHS-US: Real-Time Hash-Chain Scheme Decreasing Pre-Calculation Mechanism for Ubiquitous Services.
Wirel. Pers. Commun., 2009

Energy efficient virtual MIMO communication for wireless sensor networks.
Telecommun. Syst., 2009

Adaptive video-on-demand broadcasting in ubiquitous computing environment.
Pers. Ubiquitous Comput., 2009

Special issue on "Intelligent systems and services for ubiquitous computing".
Pers. Ubiquitous Comput., 2009

Alleviating reader collision problem in mobile RFID networks.
Pers. Ubiquitous Comput., 2009

On modeling and evaluating multicomputer transcoding architectures for live-video streams.
Multim. Tools Appl., 2009

A Neural Network Based Vehicle Classification System for Pervasive Smart Road Security.
J. Univers. Comput. Sci., 2009

USF-PAS : Study on Core Security Technologies for Ubiquitous Security Framework.
J. Univers. Comput. Sci., 2009

U-HMS: hybrid system for secure intelligent multimedia data services in Ubi-Home.
J. Intell. Manuf., 2009

Ubiquitous software controller to prevent deadlocks for automated guided vehicle systems in a container port terminal environment.
J. Intell. Manuf., 2009

Intelligent systems and smart homes.
Inf. Syst. Frontiers, 2009

Monitoring user activities in smart home environments.
Inf. Syst. Frontiers, 2009

Privacy and fair information practices in ubiquitous environments: Research challenges and future directions.
Internet Res., 2009

An efficient collusion resistant security mechanism for heterogeneous sensor networks.
Internet Res., 2009

Secure ubiquitous connectivity in hybrid multipath wireless <i>ad hoc</i> network.
Int. J. Commun. Syst., 2009

Security analysis of mCrypton proper to low-cost ubiquitous computing devices and applications.
Int. J. Commun. Syst., 2009

Dynamic power management in new architecture of wireless sensor networks.
Int. J. Commun. Syst., 2009

Secure communications and data management in ubiquitous services.
Int. J. Commun. Syst., 2009

Job partition and allocation using the prediction model in non-dedicated heterogeneous wireless network environments.
IET Commun., 2009

Special Section On Embedded System And Software For IPC Guest Editorial - Guest Editorial.
Intell. Autom. Soft Comput., 2009

Intelligent Decision-Making System with Green Pervasive Computing for Renewable Energy Business in Electricity Markets on Smart Grid.
EURASIP J. Wirel. Commun. Netw., 2009

Design and implementation of light-weight mobile multicast for fast MIPv6.
Comput. Commun., 2009

Design and analysis of a self-tuning feedback controller for the Internet.
Comput. Networks, 2009

SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems.
Comput. J., 2009

HOTP-Based User Authentication Scheme in Home Networks.
Proceedings of the Advances in Information Security and Assurance, 2009

Signaling-Oriented DoS Attacks in UMTS Networks.
Proceedings of the Advances in Information Security and Assurance, 2009

Message from the Workshop Co-Organizers.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Analysis and Synthesis of Spatial Parameters Using MDCT.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

Adaptive Multi-channel Utilization Scheme for Coexistence of IEEE802.15.4 LR-WPAN with Other Interfering Systems.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009

The Detection and Response Mechanism against Abnormal Traffic Attack in ATN Network.
Proceedings of the 2009 International Conference on Security & Management, 2009

Implementation of Rate Control in Distributed Wireless Multicast by Neural Network Prediction.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Cross-Layer Optimized Data Gathering in Wireless Multimedia Sensor Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Decentralized Flocking Algorithms for a Swarm of Mobile Robots: Problem, Current Research and Future Directions.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

Performance Evaluation of Hybrid Multipath Mobile Ad Hoc Network.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

Modeling and Analysis of the Execution Context in WS-BPEL.
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009

2008
IEEE 802.11 handoff latency improvement using Fuzzy Logic.
Wirel. Commun. Mob. Comput., 2008

U-multimedia framework: a secure and intelligent multimedia service framework based on context information in U-home.
J. Supercomput., 2008

On improving resource utilization and system throughput of master slave job scheduling in heterogeneous systems.
J. Supercomput., 2008

Secure multimedia communication.
Secur. Commun. Networks, 2008

Trusted virtual machine monitor-based group signature architecture.
IET Commun., 2008

Intelligent Systems for Future Generation Wireless Networks.
EURASIP J. Wirel. Commun. Netw., 2008

iMuseum: A scalable context-aware intelligent museum system.
Comput. Commun., 2008

A genetic algorithm for energy-efficient based multicast routing on MANETs.
Comput. Commun., 2008

Secure multi-mode systems and their applications for pervasive computing.
Comput. Commun., 2008

A compensation scheme of fingerprint distortion using combined radial basis function model for ubiquitous services.
Comput. Commun., 2008

Predictive handoff mechanism with real-time mobility tracking in a campus wide wireless network considering ITS.
Comput. Commun., 2008

A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Time Stamp Protocol for Smart Environment Services.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Extraction of Residual Information in the Microsoft PowerPoint file from the Viewpoint of Digital Forensics considering PerCom Environment.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

IS 2008 PC Co-chairs' Message.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

Investigating Wireless Sensor Network Lifetime Using a Realistic Radio Communication Model.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

ACE: Active Emergence Call Service System for u-Lifecare.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

A study on authentication/authorization/accounting and roaming mechanism in pervasive environment.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008

Fast and efficient formation flocking for a group of autonomous mobile robots.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

A Document Based Framework for Smart Object Systems.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Large-Scale USN Middleware Based on Context-Aware.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Adaptive Scheduling Mechanisms toward Intelligent Services in Mobile and Wireless RFID Environments.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

The Security System Design in Online Game for u Entertainment.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Performance Evaluations of the FTOG Framework for Effective Object Management and Load Distribution.
Proceedings of the 15th Euromicro International Conference on Parallel, 2007

Service, Security and Its Data Management for Ubiquitous Computing - Overview.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

Intelligent Home Network Authentication: Home Device Authentication Using Device Certification.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

IS 2007 PC Co-chairs' Message.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

PIS-CC RBAC: Patient Information Service based on CC-RBAC in Next Generation Hospital considering Ubiquitous Intelligent Environment.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

User Authentication for Multi Domain in Home Network Environments.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

Asymmetric Link Dynamic Routing Algorithm for Ubiquitous Multimedia Services.
Proceedings of the Advances in Multimedia Modeling, 2007

A Centralized-Abstraction and Replicated-View Architecture Running on Ubiquitous Networks for Collaborative Multimedia Distance Education Services.
Proceedings of the Advances in Multimedia Modeling, 2007

Relay OFDMA System for Wireless Multimedia Services in Home Area Networks.
Proceedings of the Third International Conference on Natural Computation, 2007

Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems.
Proceedings of the Future Generation Communication and Networking, 2007

Dynamic Call Admission Control for QoS Provisioning in Multimedia Wireless Networks.
Proceedings of the Future Generation Communication and Networking, 2007

A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Intelligent Monitoring Using Wireless Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Key Establishment Scheme for Sensor Networks with Low Communication Cost.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Performance Analysis of Location Estimation Algorithm in ZigBee Networks Using Received Signal Strength.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
DRBAC Model Using a WSNM for Services in <i>i</i>-Home.
IEICE Trans. Inf. Syst., 2006

A DRBAC Model Based on Context for Smart and Secure Services in Intelligent Ubiquitous Home.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

<i>ui</i>H-PMAC Model Suitable for Ubi-Home Gateway in Ubiquitous Intelligent Environment.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

A Hybrid Intelligent Multimedia Service Framework in Next Generation Home Network Environment.
Proceedings of the Advances in Hybrid Information Technology, 2006

On Scheduling Transmissions for Hidden Terminal Problems in Dynamic RFID Systems.
Proceedings of the Advances in Hybrid Information Technology, 2006

User Centric Intelligent IPMPS in Ubi-Home.
Proceedings of the Computational Science and Its Applications, 2006

A Flexible DRM System Considering Ubiquitous Environment.
Proceedings of the Computational Science and Its Applications, 2006

Authentication for Ubiquitous Multi Domain in Pervasive Computing Using PMI.
Proceedings of the High Performance Computing and Communications, 2006

<i>C-i</i>UMS: Context Based Smart and Secure Multimedia Service in Intelligent Ubiquitous Home.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

2005
Intelligent Multimedia Service System Based on Context Awareness in Smart Home.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Design and Implementation of the IMS-IPMP System in Convergence Home-Network Environment.
Proceedings of the Digital Libraries: Implementing Strategies and Sharing Experiences, 2005

User-Oriented Multimedia Service Using Smart Sensor Agent Module in the Intelligent Home.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2001
Linear Time Hierarchical Capacitance Extraction without Multipole Expansion.
Proceedings of the 19th International Conference on Computer Design (ICCD 2001), 2001


  Loading...