Sang-Soo Yeo

ORCID: 0000-0002-0224-0150
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • RFID technology advancements
  • Innovation in Digital Healthcare Systems
  • Advanced Authentication Protocols Security
  • User Authentication and Security Systems
  • Internet of Things and Social Network Interactions
  • Advanced Malware Detection Techniques
  • IoT and Edge/Fog Computing
  • Cloud Data Security Solutions
  • QR Code Applications and Technologies
  • Network Security and Intrusion Detection
  • Information and Cyber Security
  • Technology and Data Analysis
  • Digital Rights Management and Security
  • Cryptography and Data Security
  • Mobile Ad Hoc Networks
  • Chaos-based Image/Signal Encryption
  • Energy Harvesting in Wireless Networks
  • Distributed and Parallel Computing Systems
  • Video Surveillance and Tracking Methods
  • Cloud Computing and Resource Management
  • Advanced Steganography and Watermarking Techniques
  • Access Control and Trust
  • IPv6, Mobility, Handover, Networks, Security
  • Context-Aware Activity Recognition Systems
  • Anomaly Detection Techniques and Applications

Mokwon University
2012-2024

Shanghai Jiao Tong University
2018-2023

Tunghai University
2018

Sun Moon University
2015

Korea Air Force Academy
2015

Pai Chai University
2015

Korea Institute for Curriculum and Evaluation
2015

National Taipei University of Technology
2015

Jeonju University
2015

St. Francis Xavier University
2010

This context-aware middleware system facilitates diverse multimedia services in heterogeneous network environments by combining an adaptive service provisioning framework with a framework.

10.1109/mis.2010.48 article EN IEEE Intelligent Systems 2010-03-01

The RFID system is a contactless automatic identification that identifies tags attached on goods through radio frequency communication. This expected to supplant barcode systems, the contact reading technique most widely used at present. can be applied in variety of areas. Among those, Ari Juels proposed an environment prove pair has been scanned simultaneously. And he presented "yoking proof" protocol for this. But yoking-proof vulnerable replay attack. Although modified protocols...

10.1109/waina.2008.204 article EN 2008-01-01

Gait identification based on Deep Learning (DL) techniques has recently emerged as biometric technology for surveillance. We leveraged the vulnerabilities and decision-making abilities of DL model in gait-based autonomous surveillance systems when attackers have no access to underlying gradients/structures using a patch-based black-box adversarial attack with Reinforcement (RL). These automated are secured, blocking attacker's access. Therefore, can be conducted an RL framework where agent's...

10.1016/j.isatra.2022.11.016 article EN cc-by-nc-nd ISA Transactions 2022-11-24

Concurrent access among multiple mobile readers brings about a new problem called reader collision that reader’s transmission is interfered by the others. There have been several works to solve problem. While they employ time division, frequency space or centralized scheduling approach, in this paper, we introduce cooperative, distributed avoidance algorithm. In particular, it suitable for energy-efficient wireless network environment cooperated with RFID, since proposed DiCa (Distributed...

10.1109/cse.2009.342 article EN 2009-01-01

In recent years, different variants of the botnet are targeting government, private organizations and there is a crucial need to develop robust framework for securing IoT (Internet Things) network. this paper, Hadoop based proposed identify malicious traffic using modified Tomek-link under-sampling integrated with automated Hyper-parameter tuning machine learning classifiers. The novelty paper utilize big data platform benchmark datasets minimize computational time. loaded in Distributed...

10.3390/electronics10161955 article EN Electronics 2021-08-13

Supervisory control and data acquisition (SCADA) networks for the remote operation of various industrial infrastructures are currently being used as main metropolitan infrastructures, especially smart grid power plants. Most existing SCADA have fortified securities because their powerful access based on closed private networks. However, recent frequently connected to IT-based systems also other conventional networks, in order achieve operational convenience systems, well execution...

10.1155/2014/594652 article EN cc-by International Journal of Distributed Sensor Networks 2014-06-01

In the next-generation intelligent power grid, known as smart various objects can access systems in several network environments, and, accordingly, control security becomes critical. Thus, to provide users with secure services a new model is needed. This paper proposes dynamic for user grid environment. The proposed analyzes user's contexts and chooses an appropriate context type among predefined types. And then it applies context-based policy allow dynamically. Therefore, provides stronger...

10.1155/2014/181760 article EN cc-by International Journal of Distributed Sensor Networks 2014-06-01
Coming Soon ...