Sejong Oh
Orcid: 0000-0002-9365-274X
  According to our database1,
  Sejong Oh
  authored at least 47 papers
  between 2000 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
    PeerJ Comput. Sci., 2025
    
  
  2024
An effective heuristic for developing hybrid feature selection in high dimensional and low sample size datasets.
    
  
    BMC Bioinform., December, 2024
    
  
    PeerJ Comput. Sci., 2024
    
  
  2022
Prediction of Metabolic Syndrome based on Non-invasive Measurement Features for Chronic Disease Management.
    
  
    Proceedings of the ICCTA 2022: 8th International Conference on Computer Technology Applications, Kapfenberg, Austria, May 12, 2022
    
  
Analysis of Misclassified Cases in a Metabolic Syndrome Prediction Model: Explain misclassification of a prediction model.
    
  
    Proceedings of the ICCTA 2022: 8th International Conference on Computer Technology Applications, Kapfenberg, Austria, May 12, 2022
    
  
    Proceedings of the ICCTA 2022: 8th International Conference on Computer Technology Applications, Kapfenberg, Austria, May 12, 2022
    
  
Work-in-Progress: Accuracy-Area Efficient Online Fault Detection for Robust Neural Network Software-Embedded Microcontrollers.
    
  
    Proceedings of the International Conference on Embedded Software, 2022
    
  
  2021
Energy-Efficient FPGA Accelerator With Fidelity-Controllable Sliding-Region Signal Processing Unit for Abnormal ECG Diagnosis on IoT Edge Devices.
    
  
    IEEE Access, 2021
    
  
Metamorphic Edge Processor Simulation Framework Using Flexible Runtime Partial Replacement of Software-Embedded Verilog RTL Models.
    
  
    Proceedings of the IEEE International Symposium on Circuits and Systems, 2021
    
  
    Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2021
    
  
  2020
mIoT: Metamorphic IoT Platform for On-Demand Hardware Replacement in Large-Scaled IoT Applications.
    
  
    Sensors, 2020
    
  
    Intell. Data Anal., 2020
    
  
  2019
    Comput., 2019
    
  
  2016
Injecting Subject Policy into Access Control for Strengthening the Protection of Personal Information.
    
  
    Wirel. Pers. Commun., 2016
    
  
    Int. J. Inf. Commun. Technol., 2016
    
  
Development of a library with feature selection algorithm based on microarray gene expression dataset for biomarker identification.
    
  
    Int. J. Data Min. Bioinform., 2016
    
  
    BMC Bioinform., 2016
    
  
Integrated Visualization Tool for Differentially Expressed Genes and Gene Ontology Analysis.
    
  
    Proceedings of the 7th ACM International Conference on Bioinformatics, 2016
    
  
  2014
A Machine Learning Approach for Specification of Spinal Cord Injuries Using Fractional Anisotropy Values Obtained from Diffusion Tensor Images.
    
  
    Comput. Math. Methods Medicine, 2014
    
  
  2013
    Comput. Biol. Medicine, 2013
    
  
    Comput. Biol. Chem., 2013
    
  
  2012
Derivation of an artificial gene to improve classification accuracy upon gene selection.
    
  
    Comput. Biol. Chem., 2012
    
  
  2011
    Comput. Biol. Medicine, 2011
    
  
  2010
An attention controlled multi-core architecture for energy efficient object recognition.
    
  
    Signal Process. Image Commun., 2010
    
  
    J. Intell. Manuf., 2010
    
  
  2009
Real-Time Object Recognition with Neuro-Fuzzy Controlled Workload-Aware Task Pipelining.
    
  
    IEEE Micro, 2009
    
  
A 201.4GOPS 496mW real-time multi-object recognition processor with bio-inspired neural perception engine.
    
  
    Proceedings of the IEEE International Solid-State Circuits Conference, 2009
    
  
  2008
    IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2008
    
  
Yield maximization for system-level task assignment and configuration selection of configurable multiprocessors.
    
  
    Proceedings of the 6th International Conference on Hardware/Software Codesign and System Synthesis, 2008
    
  
    Proceedings of the 13th Asia South Pacific Design Automation Conference, 2008
    
  
  2007
Segmentation of textures defined on flat vs. layered surfaces using neural networks: Comparison of 2D vs. 3D representations.
    
  
    Neurocomputing, 2007
    
  
    Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007
    
  
  2006
    ACM Trans. Inf. Syst. Secur., 2006
    
  
An Organizational Structure-Based Administration Model for Decentralized Access Control.
    
  
    J. Inf. Sci. Eng., 2006
    
  
OS-DRAM: A Delegation Administration Model in a Decentralized Enterprise Environment.
    
  
    Proceedings of the Advances in Web-Age Information Management, 2006
    
  
  2005
    Proceedings of the Information Security Applications, 6th International Workshop, 2005
    
  
  2003
    Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
    
  
    Proceedings of the 32nd International Conference on Parallel Processing (ICPP 2003), 2003
    
  
  2002
    Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002
    
  
  2001
An Improved Administration Method on Role-Based Access Control in the Enterprise Environment.
    
  
    J. Inf. Sci. Eng., 2001
    
  
    Proceedings of the Database Systems for Advanced Applications, Proceedings of the 7th International Conference on Database Systems for Advanced Applications (DASFAA 2001), 18-20 April 2001, 2001
    
  
Enterprise Model as a Basis of Administration on Role-Based Access Control.
  
    Proceedings of the Third International Symposium on Cooperative Database Systems and Applications, 2001
    
  
  2000
Task-Role Based Access Control (T-RBAC): An Improved Access Control Model for Enterprise Environment.
    
  
    Proceedings of the Database and Expert Systems Applications, 11th International Conference, 2000
    
  
An Integration Model of Role-Based Access Control and Activity Based Access Control Using Task.
    
  
    Proceedings of the Data and Application Security, 2000