Search

Your search keyword '"Hwang, Seong Oun"' showing total 56 results

Search Constraints

Start Over You searched for: Author "Hwang, Seong Oun" Remove constraint Author: "Hwang, Seong Oun"
56 results on '"Hwang, Seong Oun"'

Search Results

1. Design of highly nonlinear confusion component based on entangled points of quantum spin states.

2. A Privacy-Assured Data Lifecycle for Epidemic-Handling Systems.

3. A PKI without TTP based on conditional trust in blockchain.

4. Blockchain-Based Resource Syndicate.

5. Improved histogram shifting-based data hiding method with alternative skipping method for image retrieval.

6. A study on pervasive systems to prevent forward head posture syndrome.

7. Key management and data re-encryption schemes for secure in-vehicle network.

8. A sentential cognitive system of robots for conversational human-robot interaction.

9. Automatic text summarization using string vector based K nearest neighbor.

10. Generation of random bits from Poisson processes.

11. Efficient certificate-based encryption and hierarchical certificate-based encryption schemes in the standard model.

12. Detection of malicious URLs based on word vector representation and ngram.

13. Clustering texts using feature similarity based AHC algorithm.

14. Load balancing in decentralized smart grid trade system using blockchain.

15. An efficient classification of malware behavior using deep neural network.

16. An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs.

17. Data-Driven Analytics Leveraging Artificial Intelligence in the Era of COVID-19: An Insightful Review of Recent Developments.

19. How Viable Is Digital Rights Management?

20. DPCrypto: Acceleration of Post-Quantum Cryptography Using Dot-Product Instructions on GPUs.

21. cuGimli: optimized implementation of the Gimli authenticated encryption and hash function on GPU for IoT applications.

22. Preface.

23. An efficient public key functional encryption for inner product evaluations.

24. The structure of novel active content embedding personal intention codes for digital images.

25. A research on the sintering and manufacturing condition of small cavity in mobile communication cavity filter.

26. An efficient neural network model for time series forecasting of malware.

27. Multiple target detection and tracking on urban roads with a drone.

28. Human-vehicle classification scheme using doppler spectrum distribution based on 2D range-doppler FMCW radar.

29. Strategies for detecting and mitigating DDoS attacks in SDN: A survey.

30. Fog-based file sharing scheme for efficient file management in PAN.

31. An efficient detection of TCP Syn flood attacks with spoofed IP addresses.

32. Intelligent noise prediction scheme with pattern analysis and deep learning technique.

33. Improved algorithm to configure group number in group management MAC.

34. Network Meddling Detection Using Machine Learning Empowered with Blockchain Technology.

35. IoMT-Based Osteosarcoma Cancer Detection in Histopathology Images Using Transfer Learning Empowered with Blockchain, Fog Computing, and Edge Computing.

36. Blockchain-Based Smart Home Networks Security Empowered with Fused Machine Learning.

37. Removing escrow from ciphertext policy attribute-based encryption.

38. Privacy-preserving identity-based broadcast encryption

39. A neural network approach to remove rain using reconstruction and feature losses.

40. Distance estimation for hopping-frequency-coding-based continuous wave.

41. Learning vector quantization inference classifier in breast abnormality classification.

42. Fast I-slice encoding and down-scaling from H.264/AVC bit stream1.

43. Persuasion-enabled telehealth system.

44. An end user development platform based on dataflow approach for IoT devices.

45. A twin-hyperellipsoidal support vector classifier.

46. Artificial intelligence based career matching.

47. A fuzzy convolutional neural network for text sentiment analysis.

48. Emotion collector, a wearable multi-sensor band to recognize fear.

49. Evaluation of black-marker and bilateral classification with J48 decision tree in anomaly based intrusion detection system.

50. Study of long short-term memory in flow-based network intrusion detection system.

Catalog

Books, media, physical & digital resources