Young-Gab Kim

Orcid: 0000-0001-9585-8808

According to our database1, Young-Gab Kim authored at least 86 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Security and Privacy Requirements for the Metaverse: A Metaverse Applications Perspective.
IEEE Commun. Mag., January, 2024

2023
Making the MetAverse A Reality: Challenges And Opportunities.
IEEE Commun. Mag., September, 2023

Visual language integration: A survey and open challenges.
Comput. Sci. Rev., May, 2023

Video Synopsis Algorithms and Framework: A Survey and Comparative Evaluation.
Syst., February, 2023

Multiview abnormal video synopsis in real-time.
Eng. Appl. Artif. Intell., 2023

Visual language navigation: a survey and open challenges.
Artif. Intell. Rev., 2023

Coding Unit-Based Region of Interest Encryption in HEVC/H.265 Video.
IEEE Access, 2023

Interoperable Access Control Framework for Services Demanding High Level Security among Heterogeneous IoT Platforms.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

2022
DVS: A Drone Video Synopsis towards Storing and Analyzing Drone Surveillance Data in Smart Cities.
Syst., 2022

Real-Time Abnormal Object Detection for Video Surveillance in Smart Cities.
Sensors, 2022

Resource identifier interoperability among heterogeneous IoT platforms.
J. King Saud Univ. Comput. Inf. Sci., 2022

Video anomaly detection using Cross U-Net and cascade sliding window.
J. King Saud Univ. Comput. Inf. Sci., 2022

Self-Adaptive Framework With Master-Slave Architecture for Internet of Things.
IEEE Internet Things J., 2022

Metaverse beyond the hype: Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy.
Int. J. Inf. Manag., 2022

A Metaverse: Taxonomy, Components, Applications, and Open Challenges.
IEEE Access, 2022

Security interoperability in heterogeneous IoT platforms: threat model of the interoperable OAuth 2.0 framework.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

2021
Survey and challenges of story generation models - A multimodal perspective with five steps: Data embedding, topic modeling, storyline generation, draft story generation, and story evaluation.
Inf. Fusion, 2021

Group recommender system based on genre preference focusing on reducing the clustering cost.
Expert Syst. Appl., 2021

A Survey on Standards for Interoperability and Security in the Internet of Things.
IEEE Commun. Surv. Tutorials, 2021

Root Cause Analysis Based on Relations Among Sentiment Words.
Cogn. Comput., 2021

Intelligent Video Data Security: A Survey and Open Challenges.
IEEE Access, 2021

Security Testing for Naval Ship Combat System Software.
IEEE Access, 2021

Interoperability requirements for a smart city.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

2020
PARBAC: Priority-Attribute-Based RBAC Model for Azure IoT Cloud.
IEEE Internet Things J., 2020

A Cache-Based Model Abstraction and Runtime Verification for the Internet-of-Things Applications.
IEEE Internet Things J., 2020

An efficient emerging network and secured hopping scheme employed over the unsecured public channels.
Int. J. Distributed Sens. Networks, 2020

AFaaS: Authorization framework as a service for Internet of Things based on interoperable OAuth.
Int. J. Distributed Sens. Networks, 2020

Video on demand recommender system for internet protocol television service based on explicit information fusion.
Expert Syst. Appl., 2020

A Survey on Security Requirements for WSNs: Focusing on the Characteristics Related to Security.
IEEE Access, 2020

2019
An Interoperable Access Control Framework for Diverse IoT Platforms Based on OAuth and Role.
Sensors, 2019

Self-Adaptive Framework Based on MAPE Loop for Internet of Things.
Sensors, 2019

Device Identification Interoperability in Heterogeneous IoT Platforms.
Sensors, 2019

2018
Centralized Connectivity for Multiwireless Edge Computing and Cellular Platform: A Smart Vehicle Parking System.
Wirel. Commun. Mob. Comput., 2018

Real-Time Cloud-Based Health Tracking and Monitoring System in Designed Boundary for Cardiology Patients.
J. Sensors, 2018

RINGA: Design and verification of finite state machine for self-adaptive software at runtime.
Inf. Softw. Technol., 2018

An enhanced aggregation method considering deviations for a group recommendation.
Expert Syst. Appl., 2018

Privacy-Preserving Attribute-Based Access Control Model for XML-Based Electronic Health Record System.
IEEE Access, 2018

Self-Adaptive Framework with Game Theoretic Decision Making for Internet of Things.
Proceedings of the TENCON 2018, 2018

Design of a smart greenhouse system based on MAPE-K and ISO/IEC-11179.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

2017
Mobile video communication based on augmented reality.
Multim. Tools Appl., 2017

An Evaluation Method for Content Analysis Based on Twitter Content Influence.
Int. J. Softw. Eng. Knowl. Eng., 2017

Personalized recommender system based on friendship strength in social network services.
Expert Syst. Appl., 2017

Runtime verification method for self-adaptive software using reachability of transition system model.
Proceedings of the Symposium on Applied Computing, 2017

2016
User-centric product recommendation on heterogeneous IoT device platform.
J. Supercomput., 2016

Sentiment Root Cause Analysis Based on Fuzzy Formal Concept Analysis and Fuzzy Cognitive Map.
J. Comput. Inf. Sci. Eng., 2016

Certificate sharing system for secure certificate distribution in mobile environment.
Expert Syst. Appl., 2016

Poster: Sentiment User Profile System based on Polarity Comparison.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Context Information-based Application Access Control Model.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

Sentiment user profile analysis based on forgetting curve in mobile environments.
Proceedings of the 15th IEEE International Conference on Cognitive Informatics & Cognitive Computing , 2016

2014
3G IP Multimedia Subsystem based framework for lawful interception.
Ann. des Télécommunications, 2014

2012
A quantitative approach to estimate a website security risk using whitelist.
Secur. Commun. Networks, 2012

Threat scenario-based security risk analysis using use case modeling in information systems.
Secur. Commun. Networks, 2012

Web robot detection based on pattern-matching technique.
J. Inf. Sci., 2012

ASA: Agent-based secure ARP cache management.
IET Commun., 2012

2011
An energy-efficient delay reduction technique for supporting WLAN-based VoIP in SmartPhone.
J. Syst. Archit., 2011

Variability Management for Software Product-Line Architecture Development.
Int. J. Softw. Eng. Knowl. Eng., 2011

Mobile user-preference-based data dissemination on mobile P2P networks.
EURASIP J. Wirel. Commun. Netw., 2011

Testing of Safety-Critical Software Embedded in an Artificial Heart.
Proceedings of the Advances in Systems Safety, 2011

2010
Power saving and delay reduction for supporting WLAN-based fixed-mobile convergence service in smartphone.
IEEE Trans. Consumer Electron., 2010

2009
Embedded system architecture for an WLAN-based dual mode mobile phone.
IEEE Trans. Consumer Electron., 2009

2008
Embedded System Architecture for an FMC Mobile Handset.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Method for Evaluating the Security Risk of a Website Against Phishing Attacks.
Proceedings of the Intelligence and Security Informatics, 2008

2007
HMM-Based Approach for Evaluating Risk Propagation.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

Quantitative Risk Analysis and Evaluation in Information Systems: A Case Study.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

2006
EAFoC: Enterprise Architecture Framework Based on Commonality.
J. Comput. Sci. Technol., 2006

Formal Verification of Bundle Authentication Mechanism in Osgi Service Platform: Ban Logic.
Int. J. Softw. Eng. Knowl. Eng., 2006

An Integrity Checking Mechanism of Mobile Agents under a Closed Environment with Trusted Hosts.
Int. J. Softw. Eng. Knowl. Eng., 2006

Managing Variability for Software Product-Line.
Proceedings of the Fourth International Conference on Software Engineering, 2006

Password-Based User Authentication Protocol for Mobile Environment.
Proceedings of the Information Networking, 2006

Modeling and Simulation for Security Risk Propagation in Critical Information Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
A message conversion system, XML-based metadata semantics description language and metadata repository.
J. Inf. Sci., 2005

An enterprise architecture framework based on a common information technology domain (EAFIT) for improving interoperability among heterogeneous information systems.
Proceedings of the Third ACIS International Conference on Software Engineering, 2005

A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks.
Proceedings of the Information Security and Cryptology, 2005

The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

Context-Aware Access Control Mechanism for Ubiquitous Applications.
Proceedings of the Advances in Web Intelligence Third International Atlantic Web IntelligenceConference, 2005

Bundle Authentication and Authorization Using XML Security in the OSGi Service Platform.
Proceedings of the 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 2005

2004
Verifying a MAC-Based Service Bundle Authentication Mechanism for the OSGi Service Platform.
Proceedings of the Advances in Web-Age Information Management: 5th International Conference, 2004

SQL/MDR: Query Language for Consistent Access of Metadata Registries Based on SQL3.
Proceedings of the Advances in Web-Age Information Management: 5th International Conference, 2004

Uniformly Handling Metadata Registries.
Proceedings of the Software Engineering Research, 2004

A Secure Migration Mechanism of Mobile Agents Under Mobile Agent Environments.
Proceedings of the Applied Parallel Computing, 2004

A MAC-Based Service Bundle Authentication Mechanism in the OSGi Service Platform.
Proceedings of the Database Systems for Advances Applications, 2004

Analyzing Web Interfaces of Databases for Retrieving Web Information.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

A Security Risk Analysis Model for Information Systems.
Proceedings of the Systems Modeling and Simulation: Theory and Applications, 2004

Design and Implementation of an SSL Component Based on CBD.
Proceedings of the Systems Modeling and Simulation: Theory and Applications, 2004

SA-RFID: Situation-Aware RFID Architecture Analysis in Ubiquitous Computing.
Proceedings of the 11th Asia-Pacific Software Engineering Conference (APSEC 2004), 30 November, 2004

A Service Bundle Authentication Mechanism in the OSGi Service Platform.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004


  Loading...