Seokjoo Shin

Orcid: 0000-0003-2092-1336

According to our database1, Seokjoo Shin authored at least 111 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Deep Learning in Physical Layer: Review on Data Driven End-to-End Communication Systems and their Enabling Semantic Applications.
CoRR, 2024

Convolution Driven Vision Transformer for the Prediction of Mild Cognitive Impairment to Alzheimer's disease Progression.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024

Impact of Source Coding on Downstream AI Applications.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication , 2024

2023
Comprehensive Analysis of Compressible Perceptual Encryption Methods - Compression and Encryption Perspectives.
Sensors, 2023

Review of Deep Learning-based Malware Detection for Android and Windows System.
CoRR, 2023

Deep Learning-based Image Quality Assessment Metric for Quantifying Perceptual Distortions in Transmitted Images.
Proceedings of the 22nd International Symposium on Communications and Information Technologies, 2023

Evaluation of Neural Demappers for Trainable Constellation in an End-to-End Communication System.
Proceedings of the Fourteenth International Conference on Ubiquitous and Future Networks, 2023

The Performance of Graph Neural Network in Detecting Fake News from Social Media Feeds.
Proceedings of the International Conference on Information Networking, 2023

Perceptual Encryption-based Privacy-Preserving Deep Learning for Medical Image Analysis.
Proceedings of the International Conference on Information Networking, 2023

Robustness of Deep Learning enabled IoT Applications Utilizing Higher Order QAM in OFDM Image Communication System.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2023

Noise-cuts-Noise Approach for Mitigating the JPEG Distortions in Deep Learning.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2023

2022
IIB-CPE: Inter and Intra Block Processing-Based Compressible Perceptual Encryption Method for Privacy-Preserving Deep Learning.
Sensors, 2022

Channel model for end-to-end learning of communications systems: A survey.
CoRR, 2022

Just-Noticeable-Difference Based Edge Map Quality Measure.
CoRR, 2022

A Pixel-based Encryption Method for Privacy-Preserving Deep Learning Models.
CoRR, 2022

Beamspace based AIC and MDL Algorithm for Counting the Number of Signals in Specific Range.
Proceedings of the Thirteenth International Conference on Ubiquitous and Future Networks, 2022

Privacy-Preserving Surveillance for Smart Cities.
Proceedings of the Thirteenth International Conference on Ubiquitous and Future Networks, 2022

Perceptual Encryption-based Privacy-Preserving Deep Learning in Internet of Things Applications.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

Encryption-then-Compression System for Cloud-based Medical Image Services.
Proceedings of the International Conference on Information Networking, 2022

Comparative analysis of solar power generation prediction system using deep learning.
Proceedings of the 2022 International Conference on Artificial Intelligence in Information and Communication, 2022

Determining Jigsaw Puzzle State from an Image based on Deep Learning.
Proceedings of the 2022 International Conference on Artificial Intelligence in Information and Communication, 2022

Performance Analysis of Cloud-based Deep Learning Models on Images Recovered without Channel Correction in OFDM System.
Proceedings of the 27th Asia Pacific Conference on Communications, 2022

2021
A novel hybrid image encryption-compression scheme by combining chaos theory and number theory.
Signal Process. Image Commun., 2021

Novel Approaches to Realize the Reliability of Location Privacy Protocols in Monitoring Wireless Networks.
IEEE Access, 2021

The Impact of Energy-Inefficient Communications on Location Privacy Protection in Monitoring Wireless Networks.
Proceedings of the Twelfth International Conference on Ubiquitous and Future Networks, 2021

On the Performance of Source Location Privacy Protocols under Varied Sensor Node Residual Energy.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021

Energy Balancing and Source Node Privacy Protection in Event Monitoring Wireless Networks.
Proceedings of the International Conference on Information Networking, 2021

An Approach to Run Pre-Trained Deep Learning Models on Grayscale Images.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2021

2020
Traffic Offloading in Multicast Device-to-Device Cellular Networks: A Combinatorial Auction-Based Matching Algorithm.
Sensors, 2020

A Classification of the Enabling Techniques for Low Latency and Reliable Communications in 5G and Beyond: AI-Enabled Edge Caching.
IEEE Access, 2020

Comprehensive Performance Analysis of Privacy Protection Protocols Utilizing Fake Packet Injection Techniques.
IEEE Access, 2020

A Survey on Deep Learning for Cloud Radio Access Networks.
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020

Experimental Comparison of Traffic Analysis Adversaries in Event Monitoring Wireless Networks.
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020

LoRa Mesh Network for Smart Metering in Rural Electrification.
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020

Region-based Selective Compression and Selective Encryption of Medical Images.
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020

Efficient User Clustering and Reinforcement Learning Based Power Allocation for NOMA Systems.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

Improving the Packet Delivery Reliability and Privacy Protection in Monitoring Wireless Networks.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

Analysis of Chinese Remainder Theorem for Data Compression.
Proceedings of the 2020 International Conference on Information Networking, 2020

Controlling the Communication Overhead of Source Location Privacy Protocols in Multi-hop Communication Wireless Networks.
Proceedings of the 2020 International Conference on Artificial Intelligence in Information and Communication, 2020

2019
Fuzzy-Logic Dijkstra-Based Energy-Efficient Algorithm for Data Transmission in WSNs.
Sensors, 2019

Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing.
Sensors, 2019

Optimal Resource Management and Binary Power Control in Network-Assisted D2D Communications for Higher Frequency Reuse Factor.
Sensors, 2019

An efficient image-based verification scheme by fusion of double random phase encoding and dynamic chaotic map.
Multim. Tools Appl., 2019

Regulating the Packet Transmission Cost of Source Location Privacy Routing Schemes in Event Monitoring Wireless Networks.
IEEE Access, 2019

Resource-sharing optimization for multicast D2D communications underlaying LTE-A uplink cellular networks.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Experimental Evaluation of Source Location Privacy Routing Schemes and Energy Consumption Performance.
Proceedings of the 19th International Symposium on Communications and Information Technologies, 2019

Decentralized Resource Allocation for Multicast D2D Communications Using Stochastic Geometry.
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019

Investigating the Influence of Routing Scheme Algorithms on the Source Location Privacy Protection and Network Lifetime.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

Interference Mitigation for Multicast D2D Communications Underlay Cellular Networks.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2019

Bipartite Matching Mechanism for Fractional Frequency Reuse-Based D2D Multicast Communications.
Proceedings of the 53rd Asilomar Conference on Signals, Systems, and Computers, 2019

2018
Strategic Location-Based Random Routing for Source Location Privacy in Wireless Sensor Networks.
Sensors, 2018

Distance-Constrained Outage Probability Analysis for Device-to-Device Communications Underlaying Cellular Networks with Frequency Reuse Factor of 2.
Comput., 2018

A Novel Resource Sharing Mechanism for Device-to-Device Communications Underlaying LTE-A Uplink Cellular Networks.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

Realizing Source Location Privacy in Wireless Sensor Networks Through Agent Node Routing.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

Energy efficient K-means clustering-based routing protocol for WSN using optimal packet size.
Proceedings of the 2018 International Conference on Information Networking, 2018

Outage probability analysis of device-to-device communications with frequency reuse-2 in fractional frequency reuse method.
Proceedings of the 2018 International Conference on Information Networking, 2018

Energy efficient Dijkstra-based weighted sum minimization routing protocol for WSN.
Proceedings of the Third International Conference on Fog and Mobile Edge Computing, 2018

AOA Estimation Algorithm Based on Composite and Null Despreaders for Multiple GPS Signals.
Proceedings of the 52nd Asilomar Conference on Signals, Systems, and Computers, 2018

2017
A Fast Channel Assignment Scheme for Emergency Handling in Wireless Body Area Networks.
Sensors, 2017

A counting-based broadcast model of emergency message dissemination in VANETs.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

Directional random routing for enhancing source location privacy in wireless sensor networks.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

Radio resource allocation and power control scheme to mitigate interference in device-to-device communications underlaying LTE-A uplink cellular networks.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017

Fractional frequency reuse scheme for interference mitigation in device-to-device communication underlying LTE-A networks.
Proceedings of the 51st Asilomar Conference on Signals, Systems, and Computers, 2017

2016
Limited area broadcast for warning message delivery over vehicular ad-hoc networks.
EURASIP J. Wirel. Commun. Netw., 2016

Beacon based indoor positioning system using weighted centroid localization approach.
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016

A New MAC Protocol for emergency handling in wireless body area networks.
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016

Interpolation using wavelet transform and discrete cosine transform for high resolution display.
Proceedings of the IEEE International Conference on Consumer Electronics, 2016

The advanced TOA trilateration algorithms with performance analysis.
Proceedings of the 50th Asilomar Conference on Signals, Systems and Computers, 2016

2015
On maximising tag reading efficiency of a multi-packet reception capable radio frequency identification reader.
IET Commun., 2015

A proposal antenna polarization diversity for LTE 2 × 2 MIMO in indoor testbed.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

Deanonymizing schemes of hidden services in tor network: A survey.
Proceedings of the 2015 International Conference on Information Networking, 2015

Analysis on end-to-end node selection probability in Tor network.
Proceedings of the 2015 International Conference on Information Networking, 2015

2014
Efficient Transmission Mode Selection Scheme for MIMO-based WLANs.
KSII Trans. Internet Inf. Syst., 2014

A New Emergency Handling Mechanism based on IEEE 802.15.4 for Health Monitoring Applications.
KSII Trans. Internet Inf. Syst., 2014

Precise-Optimal Frame Length Based Collision Reduction Schemes for Frame Slotted Aloha RFID Systems.
KSII Trans. Internet Inf. Syst., 2014

Robust Modulation Technique for Diffusion-based Molecular Communication in Nanonetworks.
CoRR, 2014

Run-length aware hybrid modulation scheme for diffusion-based molecular communication.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

Survey on MAC protocols in Underwater Acoustic Sensor Networks.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

MAC protocol designs for OFDMA-PONs.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

Enhanced location detection algorithms based on time of arrival trilateration.
Proceedings of the 48th Asilomar Conference on Signals, Systems and Computers, 2014

Improving IEEE 1588v2 time synchronization performance with phase locked loop.
Proceedings of the 48th Asilomar Conference on Signals, Systems and Computers, 2014

2013
A Modified IEEE 802.15.4 Superframe Structure for Guaranteed Emergency Handling in Wireless Body Area Network.
Netw. Protoc. Algorithms, 2013

Precise Time System Efficiency of a Frame Slotted Aloha based Anti-Collision Algorithm in a RFID System.
Netw. Protoc. Algorithms, 2013

Optimum Tag Reading Efficiency of Multi-Packet Reception Capable RFID Readers.
CoRR, 2013

Initial Ranging for Prioritized Network Entry in IEEE 802.16 Network.
CoRR, 2013

Characterizing hidden nodes with experimental evaluation in noisy MANETs.
Proceedings of IEEE International Conference on Communications, 2013

AOA selection algorithm for multiple GPS signals.
Proceedings of the 2013 Asilomar Conference on Signals, 2013

2012
Cross-Layer Performance Analysis of CSMA/iCA Based Wireless Local Area Network.
Wirel. Pers. Commun., 2012

Carrier sense multiple access with improvised collision avoidance and short-term fairness.
Wirel. Networks, 2012

QoS Provisioning in Wireless Body Area Networks: A Review on MAC Aspects.
KSII Trans. Internet Inf. Syst., 2012

Throughput and Reliability Analysis of a Scalable Broadcast MAC for Distributed Wireless Networks.
EURASIP J. Wirel. Commun. Netw., 2012

TPMS switching beamformer based on duplex wireless communications for interference suppression.
Proceedings of the IEEE International Conference on Vehicular Electronics and Safety, 2012

QoS provisioning in CSMA/iCA based medium access control protocol for WLAN.
Proceedings of the Fourth International Conference on Ubiquitous and Future Networks, 2012

2011
Performance characterization of CSMA/CA adapted multi-user MIMO aware MAC in WLANs.
EURASIP J. Wirel. Commun. Netw., 2011

Adaptive best-M feedback scheduling in multiuser OFDMA systems.
Proceedings of the Research in Applied Computation Symposium, 2011

Fast broadcast at the intersection in VANET.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
A Reactive Cross Collision Exclusionary Backoff Algorithm in IEEE.
KSII Trans. Internet Inf. Syst., 2010

COMIC: Intelligent Contention Window Control for Distributed Medium Access.
IEEE Commun. Lett., 2010

An Intelligent Contention Window Control Scheme for Distributed Medium Access.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

2009
Utility Based Backoff (UBB) Algorithm for Initial Ranging Procedure in WiBro.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009

2007
ML Approaching MIMO Detection Based on Orthogonal Projection.
IEEE Commun. Lett., 2007

Scheduled Uplink Packet Transmission Schemes for Voice Traffic in OFDMA-Based Wireless Communication Systems.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

2006
Block Iterative CM-Based Blind Multiuser Detector.
IEICE Trans. Commun., 2006

2005
Uplink Performance of WCDMA with Mixed Traffics of Voice/WWW over DCH/CPCH.
IEICE Trans. Commun., 2005

Improvement of Blind/Group-Blind Multiuser Detectors Based on CM Iteration.
IEICE Trans. Commun., 2005

Performance Analysis of Random Access Channel in OFDMA Systems.
Proceedings of the Systems Communications 2005 (ICW / ICHSN / ICMCS / SENET 2005), 2005

QoS-Oriented Packet Scheduling Schemes for Multimedia Traffics in OFDMA Systems.
Proceedings of the Networking, 2005

2004
The Performance and the Computational Complexity of the Digital Demultiplexers.
Proceedings of the High Speed Networks and Multimedia Communications, 2004

A Heuristic Scheduling Algorithm for 1xEV-DO-Like Systems.
Proceedings of the High Speed Networks and Multimedia Communications, 2004

2003
Performance of the packet scheduling schemes in DS/CDMA systems.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

2002
Performance of the packet data transmission using the other-cell-interference factor in DS/CDMA downlink.
Proceedings of the 2002 IEEE Wireless Communications and Networking Conference Record, 2002


  Loading...