Jun-Ho Huh

Orcid: 0000-0003-2007-4018

According to our database1, Jun-Ho Huh authored at least 151 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Group signature with restrictive linkability: minimizing privacy exposure in ubiquitous environment.
J. Ambient Intell. Humaniz. Comput., February, 2024

Deep Reinforcement Learning Robots for Algorithmic Trading: Considering Stock Market Conditions and U.S. Interest Rates.
IEEE Access, 2024

2023
Mobile robot: automatic speech recognition application for automation and STEM education.
Soft Comput., August, 2023

Integration of improved YOLOv5 for face mask detector and auto-labeling to generate dataset for fighting against COVID-19.
J. Supercomput., May, 2023

New machine learning model based on the time factor for e-commerce recommendation systems.
J. Supercomput., April, 2023

Building a Lucy hybrid model for grocery sales forecasting based on time series.
J. Supercomput., March, 2023

Forecast of seasonal consumption behavior of consumers and privacy-preserving data mining with new S-Apriori algorithm.
J. Supercomput., 2023

On the Long-Term Effects of Continuous Keystroke Authentication: Keeping User Frustration Low through Behavior Adaptation.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2023

Empirical Study on the Development of ESS-Based Electric Propulsion System for a Catamaran USV.
IEEE Access, 2023

A Study on Big Data Collecting and Utilizing Smart Factory Based Grid Networking Big Data Using Apache Kafka.
IEEE Access, 2023

Voice Spoofing Detection Through Residual Network, Max Feature Map, and Depthwise Separable Convolution.
IEEE Access, 2023

CA-CMT: Coordinate Attention for Optimizing CMT Networks.
IEEE Access, 2023

Automotive Multi-Chip System with Cache Coherent Interconnect for Pipelined Parallel Applications.
Proceedings of the IEEE International Conference on Consumer Electronics, 2023

Software-driven Debug Framework for Embedded RISC-V, that Transparently Emulates the Industry Standard Debug Framework.
Proceedings of the IEEE International Conference on Consumer Electronics, 2023

A Time-Based Digital Interface for RF and Baseband IC.
Proceedings of the IEEE International Conference on Consumer Electronics, 2023

Low-Power Always-on Camera (AoC) System with Workload Offloading to CMOS Image Sensor.
Proceedings of the IEEE International Conference on Consumer Electronics, 2023

GestureMeter: Design and Evaluation of a Gesture Password Strength Meter.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Building a model to exploit association rules and analyze purchasing behavior based on rough set theory.
J. Supercomput., 2022

Optimizing patient transportation by applying cloud computing and big data analysis.
J. Supercomput., 2022

GUI-based software modularization through module clustering in edge computing based IoT environments.
J. Ambient Intell. Humaniz. Comput., 2022

WristAcoustic: Through-Wrist Acoustic Response Based Authentication for Smartwatches.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild.
CoRR, 2022

A Single-Crystal-Oscillator-Based Clock-Management IC with 18× Start-Up Time Reduction and 0.68ppm/ºC Duty-Cycled Machine-Learning-Based RCO Calibration.
Proceedings of the IEEE International Solid-State Circuits Conference, 2022

A 52MHz -158.2dBc/Hz PN @ 100kHz Digitally Controlled Crystal Oscillator Utilizing a Capacitive-Load-Dependent Dynamic Feedback Resistor in 28nm CMOS.
Proceedings of the IEEE International Solid-State Circuits Conference, 2022

2021
Land Price Forecasting Research by Macro and Micro Factors and Real Estate Market Utilization Plan Research by Landscape Factors: Big Data Analysis Approach.
Symmetry, 2021

Estimation of future power consumption level in smart grid: Application of fuzzy logic and genetic algorithm on big data platform.
Int. J. Commun. Syst., 2021

Towards Usable and Secure Location-based Smartphone Authentication.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

On Smartphone Users' Difficulty with Understanding Implicit Authentication.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2020
Reefer container monitoring system using PLC-based communication technology for maritime edge computing.
J. Supercomput., 2020

On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better?
ACM Trans. Priv. Secur., 2020

Face Recognition at a Distance for a Stand-Alone Access Control System.
Sensors, 2020

Fully Differential Touch Screen Controller with Wide Input Dynamic Range for Thin Displays.
Sensors, 2020

Impact of ITSM Military Service Quality and Value on Service Trust.
J. Multim. Inf. Syst., 2020

Improvement of ITSM IT Service Efficiency in Military Electronic Service.
J. Inf. Process. Syst., 2020

Context-aware auction solution of cooperative fish market monitoring system for intelligent user.
Hum. centric Comput. Inf. Sci., 2020

A Novel Model on Reinforce K-Means Using Location Division Model and Outlier of Initial Value for Lowering Data Cost.
Entropy, 2020

Autochain platform: expert automatic algorithm Blockchain technology for house rental dApp image application model.
EURASIP J. Image Video Process., 2020

Design of a Framework to Detect Device Spoofing Attacks Using Network Characteristics.
IEEE Consumer Electron. Mag., 2020

An RF Transceiver with Full Digital Interface Supporting 5G New Radio FR1 with 3.84Gbps DL/1.92Gbps UL and Dual-Band GNSS in 14nm FinFET CMOS.
Proceedings of the IEEE Symposium on VLSI Circuits, 2020

Void: A fast and light voice liveness detection system.
Proceedings of the 29th USENIX Security Symposium, 2020

Gesture Authentication for Smartphones: Evaluation of Gesture Password Selection Policies.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Is Implicit Authentication on Smartphones Really Popular? On Android Users' Perception of "Smart Lock for Android".
Proceedings of the MobileHCI '20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services, 2020

ResMax: Detecting Voice Spoofing Attacks with Residual Network and Max Feature Map.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

SS-DPKI: Self-Signed Certificate Based Decentralized Public Key Infrastructure for Secure Communication.
Proceedings of the 2020 IEEE International Conference on Consumer Electronics (ICCE), 2020

2019
An effective security measures for nuclear power plant using big data analysis approach.
J. Supercomput., 2019

Blockchain-based mobile fingerprint verification and automatic log-in platform for future computing.
J. Supercomput., 2019

A location-based mobile health care facility search system for senior citizens.
J. Supercomput., 2019

Automatic Pattern Setting System Reacting to Customer Design.
J. Inf. Process. Syst., 2019

Digitalization of Seafarer's Book for Authentication and e-Navigation.
J. Inf. Process. Syst., 2019

Mitigating large adversarial perturbations on X-MAS (X minus Moving Averaged Samples).
CoRR, 2019

B+-tree construction on massive data with Hadoop.
Clust. Comput., 2019

Understanding Edge Computing: Engineering Evolution With Artificial Intelligence.
IEEE Access, 2019

Proof of Phone: A Low-cost Blockchain Platform.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

Voice Presentation Attack Detection through Text-Converted Voice Command Analysis.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Big Data Analysis for Personalized Health Activities: Machine Learning Processing for Automatic Keyword Extraction Approach.
Symmetry, 2018

PLC-Integrated Sensing Technology in Mountain Regions for Drone Landing Sites: Focusing on Software Technology.
Sensors, 2018

Bi-directional education contents using VR equipments and augmented reality.
Multim. Tools Appl., 2018

A Case Study Analysis of Clothing Shopping Mall for Customer Design Participation Service and Development of Customer Editing User Interface.
Mob. Inf. Syst., 2018

A Design of Diabetes Mellitus Scheduling Program for Diabetic Patients: A Software Engineering Approach.
J. Multim. Inf. Syst., 2018

A Design of Application through Physical Therapy Big Data Analytics.
J. Multim. Inf. Syst., 2018

A Study on the Design of Humane Animal Care System and Java Implementation.
J. Inf. Process. Syst., 2018

Implementation of lightweight intrusion detection model for security of smart green house and vertical farm.
Int. J. Distributed Sens. Networks, 2018

Adaptive thermal property control technique for holistic thermal management of mobile devices.
IEICE Electron. Express, 2018

Controlling the privacy loss with the input feature maps of the layers in convolutional neural networks.
CoRR, 2018

I'm Listening to your Location! Inferring User Location with Acoustic Side Channels.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

An Optimization Theory of Home Occupants' Access Data for Determining Smart Grid Service.
Proceedings of the Parallel and Distributed Computing, 2018

A Development of Automation Position Processing Process and Pattern Grouping Technology Per Size for Automation Printing Pattern Image Generation.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

Definition of Digital Printing Type Cloth Pattern Drawing for Mass Customizing.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

Development of Customer Design Responsive Automation Design Pattern Setting System.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

A Case Study Analysis of Clothing Shopping Mall for Customer Design Participation Service and Development of Customer Editing User Interface with Solutions for Picture Works Copyright.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

Cloth Size Coding and Size Recommendation System Applicable for Personal Size Automatic Extraction and Cloth Shopping Mall.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

Developing Participatory Clothing Shopping Platform for Customer's Participation in Design.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

A Study on the Harmony of Music and TV Lighting Through Music Analysis.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

A Study on the Bumps at the Leading Edge of the Wing Used by Hovering Birds.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

Designing 3D Propeller by Applying Bird's Wing and Making a Test Product.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

A Method of Propelling with Many Whirlpools Used by Inland Birds.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

A Study on the Method of Propelling by Analyzing the Form of Bird's Movement.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

A Study on the Rainbowchain Certificate in Order to Overcome Existing Certification System.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

A Study on the Security Performance Improvement in BoT Perspective in Order to Overcome Security Weaknesses of IoT Devices.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

A Study on the LMS Platform Performance and Performance Improvement of K-MOOCs Platform from Learner's Perspective.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

A Study on the RFID and 2D Barcode, and NFC and Performance Improvement.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

Demand Response Resource Energy Optimization System for Residential Buildings: Smart Grid Approach.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

A Design of Demand Response Energy Optimization System for Micro Grid.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

Artificial Intelligence Shoe Cabinet Using Deep Learning for Smart Home.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

Nash Equilibrium Solution for Communication in Strategic Competition Adopted by Zigbee Network for Micro Grid.
Proceedings of the Information Science and Applications 2018, 2018

The Personal Identification Chord: A Four ButtonAuthentication System for Smartwatches.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
An Indoor Location-Based Control System Using Bluetooth Beacons for IoT Systems.
Sensors, 2017

A System Algorithm for Recommending User-Customized Games.
J. Multim. Inf. Syst., 2017

Algorithm for Youth Soccer Players Management System: Software Engineering Approach.
J. Multim. Inf. Syst., 2017

A Design of Promotion Management System for Webtoon.
J. Multim. Inf. Syst., 2017

PLC-based design of monitoring system for ICT-integrated vertical fish farm.
Hum. centric Comput. Inf. Sci., 2017

SysPal: System-Guided Pattern Locks for Android.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

A study of enhancement of ranging performance of beacons through improvement of the smart phone's gyroscope: focusing on the Bluetooth low energy.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Improving the B+-Tree Construction for Transaction Log Data in Bank System Using Hadoop.
Proceedings of the Information Science and Applications 2017, 2017

A Method of Modeling of Basic Big Data Analysis for Korean Medical Tourism: A Machine Learning Approach Using Apriori Algorithm.
Proceedings of the Information Science and Applications 2017, 2017

A Keyword-Based Big Data Analysis for Individualized Health Activity Using Keyword Analysis Technique: A Methodological Approach Using National Health Data.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

A Design of Portable Continuous Passive Joint Mobilization Equipment System.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

Group Signature with Signer-Controlled Opening Capability: Separate Token Generator.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

Anonymous Signature with Signer-Controlled Opening Capability.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

A Design of Scheduling Program for Diabetic Patients: A Software Engineering Approach.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

I'm too Busy to Reset my LinkedIn Password: On the Effectiveness of Password Reset Emails.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Advanced metering infrastructure design and test bed experiment using intelligent agents: focusing on the PLC network base technology for Smart Grid system.
J. Supercomput., 2016

A Design of Base Technology for Airbag Actuation Checking Application Based on Mechanical Calculations for Old Container Vehicle.
J. Multim. Inf. Syst., 2016

Shipboard Secret Electronic Voting System for Information and Communication Technology-isolated Ocean Crews.
J. Multim. Inf. Syst., 2016

Information Communication Ethical Study on the Protection of Digital Copyrights and Alternatives: Focusing on the Secondary School Students.
J. Multim. Inf. Syst., 2016

Next-Generation Access Control for Distributed Control Systems.
IEEE Internet Comput., 2016

Design and test bed experiments of server operation system using virtualization technology.
Hum. centric Comput. Inf. Sci., 2016

Hive oversight for network intrusion early warning using DIAMoND: a bee-inspired method for fully distributed cyber defense.
IEEE Commun. Mag., 2016

Smart Grid Framework Test Bed Using OPNET and Power Line Communication.
Proceedings of the 2016 Joint 8th International Conference on Soft Computing and Intelligent Systems (SCIS) and 17th International Symposium on Advanced Intelligent Systems (ISIS), 2016

Design of a Shipboard Outside Communication Network and the Test Bed Using PLC: for the Workers' Safety Management During Ship-Building process.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

A Framework for Detecting MAC and IP Spoofing Attacks with Network Characteristics.
Proceedings of the International Conference on Software Security and Assurance, 2016

A Study on Digitalization of Seafarer's Book Republic of Korea for e-Navigation: Focusing on Wireless Network.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

On the Guessability of Resident Registration Numbers in South Korea.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Stopping Amplified DNS DDoS Attacks through Distributed Query Rate Sharing.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
On the Memorability of System-generated PINs: Can Chunking Help?
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Visualizing Privacy Risks of Mobile Applications through a Privacy Meter.
Proceedings of the Information Security Practice and Experience, 2015

DIAMoND: Distributed Intrusion/Anomaly Monitoring for Nonparametric Detection.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

Design of the Real-Time Mobile Push System for Implementation of the Shipboard Smart Working.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

Design and Implementation of the Basic Technology for Realtime Smart Metering System Using Power Line Communication for Smart Grid.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

A Shipboard Secret Ballot System for the ICT-Isolated Ocean Crews.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

On the Effectiveness of Pattern Lock Strength Meters: Measuring the Strength of Real World Pattern Locks.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

Surpass: System-initiated User-replaceable Passwords.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures.
IEEE Trans. Smart Grid, 2014

Replacing Cryptographic Keys in AMI Mesh Networks with Small Latency.
Mob. Networks Appl., 2014

Development of Competency-oriented Social Multimedia Computer Network Curriculum.
J. Multim. Inf. Syst., 2014

PLC-Based Smart grid Home Network System Design and Implementation using OPNET Simulation.
J. Multim. Inf. Syst., 2014

Power Aware Routing Protocol in Multimedia Ad-hoc Network Considering Hop Lifetime of Node.
J. Multim. Inf. Syst., 2014

Low-power shared memory architecture power mode for mobile system-on-chip.
IEICE Electron. Express, 2014

Analyzing Unnecessary Permissions Requested by Android Apps Based on Users' Opinions.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

On the practicality of detecting anomalies with encrypted traffic in AMI.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

2013
Limiting Data Exposure in Monitoring Multi-domain Policy Conformance.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Reconciling security protection and monitoring requirements in Advanced Metering Infrastructures.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Assessing software integrity of virtual appliances through software whitelists.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Towards SDN enabled network control delegation in clouds.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

A distributed monitoring architecture for AMIs: minimizing the number of monitoring nodes and enabling collided packet recovery.
Proceedings of the SEGS'13, 2013

An empirical study on the software integrity of virtual appliances: are you really getting what you paid for?
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
PIN selection policies: Are they really effective?
Comput. Secur., 2012

AMI threats, intrusion detection requirements and deployment recommendations.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

A framework integrating attribute-based policies into role-based access control.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Evidence of log integrity in policy-based security monitoring.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

2011
Trustworthy Distributed Systems Through Integrity-Reporting.
Proceedings of the Guide to e-Science, Next Generation Scientific Research and Discovery, 2011

Managing application whitelists in trusted distributed systems.
Future Gener. Comput. Syst., 2011

Verifying Trustworthiness of Virtual Appliances in Collaborative Environments.
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Phishing Detection with Popular Search Engines: Simple and Effective.
Proceedings of the Foundations and Practice of Security, 2011

Achieving attestation with less effort: an indirect and configurable approach to integrity reporting.
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011

2010
Hybrid spam filtering for mobile communication.
Comput. Secur., 2010

2009
Trustworthy Log Reconciliation for Distributed Virtual Organisations.
Proceedings of the Trusted Computing, 2009

Towards a Trustable Virtual Organisation.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

2001
A low power digital servo architecture for optical disc.
IEEE Trans. Consumer Electron., 2001


  Loading...