- RFID technology advancements
- Innovation in Digital Healthcare Systems
- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- Internet of Things and Social Network Interactions
- Advanced Malware Detection Techniques
- IoT and Edge/Fog Computing
- Cloud Data Security Solutions
- QR Code Applications and Technologies
- Network Security and Intrusion Detection
- Information and Cyber Security
- Technology and Data Analysis
- Digital Rights Management and Security
- Cryptography and Data Security
- Mobile Ad Hoc Networks
- Chaos-based Image/Signal Encryption
- Energy Harvesting in Wireless Networks
- Distributed and Parallel Computing Systems
- Video Surveillance and Tracking Methods
- Cloud Computing and Resource Management
- Advanced Steganography and Watermarking Techniques
- Access Control and Trust
- IPv6, Mobility, Handover, Networks, Security
- Context-Aware Activity Recognition Systems
- Anomaly Detection Techniques and Applications
Mokwon University
2012-2024
Shanghai Jiao Tong University
2018-2023
Tunghai University
2018
Sun Moon University
2015
Korea Air Force Academy
2015
Pai Chai University
2015
Korea Institute for Curriculum and Evaluation
2015
National Taipei University of Technology
2015
Jeonju University
2015
St. Francis Xavier University
2010
This context-aware middleware system facilitates diverse multimedia services in heterogeneous network environments by combining an adaptive service provisioning framework with a framework.
The RFID system is a contactless automatic identification that identifies tags attached on goods through radio frequency communication. This expected to supplant barcode systems, the contact reading technique most widely used at present. can be applied in variety of areas. Among those, Ari Juels proposed an environment prove pair has been scanned simultaneously. And he presented "yoking proof" protocol for this. But yoking-proof vulnerable replay attack. Although modified protocols...
Gait identification based on Deep Learning (DL) techniques has recently emerged as biometric technology for surveillance. We leveraged the vulnerabilities and decision-making abilities of DL model in gait-based autonomous surveillance systems when attackers have no access to underlying gradients/structures using a patch-based black-box adversarial attack with Reinforcement (RL). These automated are secured, blocking attacker's access. Therefore, can be conducted an RL framework where agent's...
Concurrent access among multiple mobile readers brings about a new problem called reader collision that reader’s transmission is interfered by the others. There have been several works to solve problem. While they employ time division, frequency space or centralized scheduling approach, in this paper, we introduce cooperative, distributed avoidance algorithm. In particular, it suitable for energy-efficient wireless network environment cooperated with RFID, since proposed DiCa (Distributed...
In recent years, different variants of the botnet are targeting government, private organizations and there is a crucial need to develop robust framework for securing IoT (Internet Things) network. this paper, Hadoop based proposed identify malicious traffic using modified Tomek-link under-sampling integrated with automated Hyper-parameter tuning machine learning classifiers. The novelty paper utilize big data platform benchmark datasets minimize computational time. loaded in Distributed...
Supervisory control and data acquisition (SCADA) networks for the remote operation of various industrial infrastructures are currently being used as main metropolitan infrastructures, especially smart grid power plants. Most existing SCADA have fortified securities because their powerful access based on closed private networks. However, recent frequently connected to IT-based systems also other conventional networks, in order achieve operational convenience systems, well execution...
In the next-generation intelligent power grid, known as smart various objects can access systems in several network environments, and, accordingly, control security becomes critical. Thus, to provide users with secure services a new model is needed. This paper proposes dynamic for user grid environment. The proposed analyzes user's contexts and chooses an appropriate context type among predefined types. And then it applies context-based policy allow dynamically. Therefore, provides stronger...