JooYoung Lee

According to our database1, JooYoung Lee authored at least 42 papers between 2006 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Development and Validation of Pneumatic Muscle based Back Assistance Exoskeleton<sup>*</sup>.
Proceedings of the 16th International Conference on Ubiquitous Robots, 2019

A Comparative Analysis of Distributed Ledger Technologies for Smart Contract Development.
Proceedings of the 30th IEEE Annual International Symposium on Personal, 2019

Probabilistic Estimation of Honeypot Detection in Internet of Things Environment.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Spatial Community Search Using PageRank Vector.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Expressing Trust with Temporal Frequency of User Interaction in Online Communities.
Proceedings of the Advanced Information Networking and Applications, 2019

An Architecture for Distributed Ledger-Based M2M Auditing for Electric Autonomous Vehicles.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019

Multilingual Entity Matching.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
Agent Perspective Social Networks: Distributed Second Degree Estimation.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Second-level degree-based entity resolution in online social networks.
Soc. Netw. Anal. Min., 2018

Autonomous Cars: Social and Economic Implications.
IT Prof., 2018

Software architectural patterns in practice: an empirical study.
Innov. Syst. Softw. Eng., 2018

Reputation in M2M Economy.
CoRR, 2018

Towards dynamic interaction-based model.
CoRR, 2018

Realization of VANET-Based Cloud Services through Named Data Networking.
IEEE Commun. Mag., 2018

A New Machine Learning-based Collaborative DDoS Mitigation Mechanism in Software-Defined Network.
Proceedings of the 14th International Conference on Wireless and Mobile Computing, 2018

Multi-label Class-imbalanced Action Recognition in Hockey Videos via 3D Convolutional Neural Networks.
Proceedings of the 19th IEEE/ACIS International Conference on Software Engineering, 2018

Analysis of Android Camera Spoofing Techniques.
Proceedings of the 19th IEEE/ACIS International Conference on Software Engineering, 2018

Mapping Event-B Machines into Eiffel Programming Language.
Proceedings of 6th International Conference in Software Engineering for Defence Applications, 2018

Game Theoretic Framework to Mutation Testing.
Proceedings of 6th International Conference in Software Engineering for Defence Applications, 2018

A Conjoint Application of Data Mining Techniques for Analysis of Global Terrorist Attacks - Prevention and Prediction for Combating Terrorism.
Proceedings of 6th International Conference in Software Engineering for Defence Applications, 2018

Bi-lingual Intent Classification of Twitter Posts: A Roadmap.
Proceedings of 6th International Conference in Software Engineering for Defence Applications, 2018

Towards Multi-metric Cache Replacement Policies in Vehicular Named Data Networks.
Proceedings of the 29th IEEE Annual International Symposium on Personal, 2018

On M2M Micropayments: A Case Study of Electric Autonomous Vehicles.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Towards Dynamic Interaction-Based Reputation Models.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Teaching Programming and Design-by-Contract.
CoRR, 2017

Translating Event-B machines to Eiffel programs.
CoRR, 2017

Social-Aware Bootstrapping and Trust Establishing Mechanism for Vehicular Social Networks.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Introducing ADegree: Anonymisation of Social Networks Through Constraint Programming.
Proceedings of the Mobility Analytics for Spatio-Temporal and Social Data, 2017

Evolution of Friendship: a case study of MobiClique.
Proceedings of the Computing Frontiers Conference, 2017

Link Prediction Using Top-k Shortest Distances.
Proceedings of the Data Analytics - 31st British International Conference on Databases, 2017

2016
An Effective Cluster Assignment Strategy for Large Time Series Data.
Proceedings of the Web-Age Information Management - 17th International Conference, 2016

Self-adaptive Node-Based PCA Encodings.
Proceedings of 5th International Conference in Software Engineering for Defence Applications, 2016

Quality Attributes in Practice: Contemporary Data.
Proceedings of the Agent and Multi-Agent Systems: Technology and Applications, 2016

A Hybrid Trust Management Framework for Vehicular Social Networks.
Proceedings of the Computational Social Networks - 5th International Conference, 2016

2015
A Node-Centric Reputation Computation Algorithm on Online Social Networks.
Proceedings of the Applications of Social Media and Social Network Analysis, 2015

Location Prediction via Social Contents and Behaviors: Location-Aware Behavioral LDA.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015

2014
Convergence of True Cooperations in Bayesian Reputation Game.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Estimating the Degrees of Neighboring Nodes in Online Social Networks.
Proceedings of the PRIMA 2014: Principles and Practice of Multi-Agent Systems, 2014

2013
A model for recursive propagations of reputations in social networks.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Social Network Based Reputation Computation and Document Classification.
J. Univers. Comput. Sci., 2012

2011
Automatic Reputation Computation through Document Analysis: A Social Network Approach.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011

2006
A Framework for Ensuring Security in Ubiquitous Computing Environment Based on Security Engineering Approach.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006


  Loading...