Junho Jeong

According to our database1, Junho Jeong authored at least 14 papers between 2007 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Secure Cloud Storage Service Using Bloom Filters for the Internet of Things.
IEEE Access, 2019

2018
A Type Information Reconstruction Scheme Based on Long Short-Term Memory for Weakness Analysis in Binary File.
International Journal of Software Engineering and Knowledge Engineering, 2018

IoT-Based Smart Mat System for Remote Monitoring Systm of User.
Proceedings of the 2018 Joint 10th International Conference on Soft Computing and Intelligent Systems (SCIS) and 19th International Symposium on Advanced Intelligent Systems (ISIS), 2018

NB-IoT Optimization on Paging MCS and Coverage Level.
Proceedings of the 15th International Symposium on Wireless Communication Systems, 2018

A Methodology of NB-IoT Mobility Optimization.
Proceedings of the 2018 Global Internet of Things Summit, 2018

A Novel Solution for NB-IoT Cell Coverage Expansion.
Proceedings of the 2018 Global Internet of Things Summit, 2018

2017
Cyber Physical Systems for User Reliability Measurements in a Sharing Economy Environment.
Sensors, 2017

Automatic Optimizer Generation Method Based on Location and Context Information to Improve Mobile Services.
Mobile Information Systems, 2017

Design and implementation of the secure compiler and virtual machine for developing secure IoT services.
Future Generation Comp. Syst., 2017

LTE maritime coverage solution and ocean propagation loss model.
Proceedings of the International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks, 2017

A novel cell design approach for LTE underground tunnels coverage.
Proceedings of the International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks, 2017

Ultra long range LTE ocean coverage solution.
Proceedings of the 24th International Conference on Telecommunications, 2017

2015
Automatic Fortified Password Generator System Using Special Characters.
Int. J. Fuzzy Logic and Intelligent Systems, 2015

2007
Reusable SW Requirements Development Process: Embedded SW Industry Experiences.
Proceedings of the 18th Australian Software Engineering Conference (ASWEC 2007), 2007


  Loading...