Mihui Kim

Orcid: 0000-0002-4896-7400

According to our database1, Mihui Kim authored at least 57 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Mobile health platform based on user-centered design to promote exercise for patients with peripheral artery disease.
BMC Medical Informatics Decis. Mak., 2022

Risk Prediction Models for Mortality using Nursing Records in Intensive Care Patients: A Systematic Review.
Proceedings of the AMIA 2022, 2022

2021
Deepfake Detection Using the Rate of Change between Frames Based on Computer Vision.
Sensors, 2021

Factors associated with nurses' user resistance to change of electronic health record systems.
BMC Medical Informatics Decis. Mak., 2021

Development of Home-Based Exercise Mobile Application for Patients with Peripheral Artery Disease.
Proceedings of the Nurses and Midwives in the Digital Age - Selected Papers, Posters and Panels from the 15th International Congress in Nursing Informatics, Virtual Event, 23 August, 2021

2020
JLVEA: Lightweight Real-Time Video Stream Encryption Algorithm for Internet of Things.
Sensors, 2020

SybilEye: Observer-Assisted Privacy-Preserving Sybil Attack Detection on Mobile Crowdsensing.
Inf., 2020

Development of User-Participatory Crowdsensing System for Improved Privacy Preservation.
Future Internet, 2020

Multi-Blockchain Structure for a Crowdsensing-Based Smart Parking System.
Future Internet, 2020

2019
Saturation Prediction for Crowdsensing BasedSmart Parking System.
J. Inf. Process. Syst., 2019

Privacy-Preservation Using Group Signature for Incentive Mechanisms in Mobile Crowd Sensing.
J. Inf. Process. Syst., 2019

Data Reliability Enhancement Method through Data Validation in Crowdsensing System.
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019

2018
Log-Based Cloud Monitoring System for OpenStack.
Proceedings of the Fourth IEEE International Conference on Big Data Computing Service and Applications, 2018

2017
Locap: Privacy-preserving location proximity protocol.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

Path Privacy Preservation Using Threshold Secret Sharing via Distributed Obfuscators in Directions Search.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

Location Privacy for HIP Based Internet of Things.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

2016
Development of Cloud-Based UAV Monitoring and Management System.
Sensors, 2016

Developing an On-Demand Cloud-Based Sensing-as-a-Service System for Internet of Things.
J. Comput. Networks Commun., 2016

Game-Theory-Based Approach for Energy Routing in a Smart Grid Network.
J. Comput. Networks Commun., 2016

Distributed channel selection scheme based on the number of interfering stations in WLAN.
Ad Hoc Networks, 2016

2015
Teaching-Learning Activity Modeling Based on Data Analysis.
Symmetry, 2015

Scheduling Based on Maximum PF Selection with Contiguity Constraint for SC-FDMA in LTE Uplink.
J. Inf. Sci. Eng., 2015

2014
Femtocell Subband Selection Method for Managing Cross- and Co-tier Interference in a Femtocell Overlaid Cellular Network.
J. Inf. Process. Syst., 2014

Adaptive Duty-Cycling to Enhance Topology Control Schemes in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Degree-based link scheduling for collision avoidance in distributed wireless sensor networks.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

2013
Cost-efficient vertical handover between cellular networks and WLAN based on HMIPv6 and IEEE 802.21 MIH.
Int. J. Netw. Manag., 2013

Wireless Sensor Network Security.
Int. J. Distributed Sens. Networks, 2013

Secure and Lightweight Key Distribution with ZigBee Pro for Ubiquitous Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

A Delay-Aware Scheduling for Data Aggregation in Duty-Cycled Wireless Sensor Networks.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

On minimizing the broadcast redundancy in duty-cycled wireless sensor networks.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

Protecting delay-sensitive traffic transmission against flooding attacks in smart grid networks.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013

Toward Smart Microgrid with Renewable Energy: An Overview of Network Design, Security, and Standards.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

Performance Evaluation of Flooding Schemes on Duty-Cycled Sensor Networks: Conventional, 1HI, and 2HBI Floodings.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

2012
VeriEST: verification via primary user emulation signal-based test for secure distributed spectrum sensing in cognitive radio networks.
Secur. Commun. Networks, 2012

State of the Art 3GPP M2M Communications toward Smart Grid.
KSII Trans. Internet Inf. Syst., 2012

Anchor-Node-Based Distributed Localization with Error Correction in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

MrFair: Misbehavior-resistant fair scheduling in wireless mesh networks.
Ad Hoc Networks, 2012

An enhanced key management using ZigBee Pro for wireless sensor networks.
Proceedings of the 2012 International Conference on Information Networking, 2012

2011
SeCA: A framework for Secure Channel Assignment in wireless mesh networks.
Comput. Commun., 2011

Reducing Error Propagation on Anchor Node-Based Distributed Localization in Wireless Sensor Networks.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Adaptive duty-cycling based on group size for energy balance of sensor nodes in wireless sensor networks.
Proceedings of the Research in Applied Computation Symposium, 2011

An efficient code dissemination mechanism for building automation and industrial control networks.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

Adaptive hybrid medium access control scheme for traffic concentration problem in the mesh portal of IEEE 802.11s-based wireless mesh networks.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

A Hole Detour Scheme Using Virtual Position Based on Residual Energy for Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

Towards Fast and Energy-Efficient Dissemination via Opportunistic Broadcasting in Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

A Test Framework for Secure Distributed Spectrum Sensing in Cognitive Radio Networks.
Proceedings of the Intelligent Information and Database Systems, 2011

2010
DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System.
Sensors, 2010

Adaptive Data Mining Approach for Flow Redirection in Multihomed Mobile Router.
Int. J. Inf. Technol. Decis. Mak., 2010

2009
An efficient data fusion and assurance mechanism using temporal and spatial correlations for home automation networks.
IEEE Trans. Consumer Electron., 2009

2007
Integrated Notification Architecture Based on Overlay Against DDoS Attacks on Convergence Network.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2007

2006
Proactive Defense Mechanism against IP Spoofing Traffic on a NEMO Environment.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

A Key Management Based on Multiple Regression in Hierarchical Sensor Network.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Overlapped Detection Via Approximate Entropy Estimation Against Flooding Attack in Mobile Sensor Networks.
Proceedings of the Computational Science, 2006

2005
A Fast Defense Mechanism Against IP Spoofing Traffic in a NEMO Environment.
Proceedings of the Information Networking, 2005

A Scalable Mutual Authentication and Key Distribution Mechanism in a NEMO Environment.
Proceedings of the Computational Science and Its Applications, 2005

2004
A Combined Data Mining Approach for DDoS Attack Detection.
Proceedings of the Information Networking, 2004

Detection and Identification Mechanism against Spoofed Traffic Using Distributed Agents.
Proceedings of the Computational Science and Its Applications, 2004


  Loading...