Ho-Jin Choi

ORCID: 0000-0002-7298-3689
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Engineering Techniques and Practices
  • Software Engineering Research
  • Service-Oriented Architecture and Web Services
  • Semantic Web and Ontologies
  • Advanced Software Engineering Methodologies
  • Software Reliability and Analysis Research
  • Business Process Modeling and Analysis
  • Topic Modeling
  • Cryptographic Implementations and Security
  • Software Testing and Debugging Techniques
  • Speech and dialogue systems
  • Natural Language Processing Techniques
  • Chaos-based Image/Signal Encryption
  • Software System Performance and Reliability
  • AI-based Problem Solving and Planning
  • Coding theory and cryptography
  • Machine Learning in Bioinformatics
  • AI in Service Interactions
  • Web Data Mining and Analysis
  • Speech and Audio Processing
  • Social Robot Interaction and HRI
  • Context-Aware Activity Recognition Systems
  • Surface Modification and Superhydrophobicity
  • Law, AI, and Intellectual Property
  • Technology and Data Analysis

Kookmin University
2020-2024

Hanyang University
2019-2023

Hanyang University Guri Hospital
2019-2023

Korea University
2023

Dongguk University Ilsan Hospital
2022

Korea Advanced Institute of Science and Technology
2010-2022

Kootenay Association for Science & Technology
2022

eBay (Ireland)
2022

Chungnam National University
2018

Kyung Hee University
2012

SPHINCS <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$+$</tex-math> </inline-formula> was selected as one of NIST Post-Quantum Cryptography Digital Signature Algorithms (PQC-DSA). However, processes are slower compared to other PQC-DSA. When integrating it into protocols ( notation="LaTeX">$e.g.$</tex-math> , TLS and IPSec), optimization research from the server perspective becomes crucial. Therefore, we...

10.1109/tcsi.2024.3370802 article EN IEEE Transactions on Circuits and Systems I Regular Papers 2024-03-06

Fingerprinting is an approach that assigns a unique and invisible ID to each sold instance of the intellectual property (IP). One key advantages fingerprinting-based protection (IPP) has over watermarking-based IPP enabling tracing stolen hardware or software. schemes have been widely effectively used achieve this goal; however, their application domain restricted only static artifacts, such as image audio, where distinct copies can be obtained easily. In paper, we propose first generic...

10.1109/tcad.2003.822126 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2004-02-01

In this work, we use recurrent neural network (RNN) to predict the medical examination data with missing parts. There often exist parts in due various human factors, for instance, because subjects occasionally miss their annual examinations. Such make it hard future by machines. Thus, imputation of information is needed accurate prediction data. Among types RNNs, choose simple (SRN) and long short-term memory (LSTM) as well data, they show good performance many relevant applications. our...

10.1109/bigcomp.2017.7881685 article EN 2017-02-01

Password-Based Key Derivation Function 2 (PBKDF2) is widely used cryptographic algorithm in order to generate secure keys a password various occasions. For example, it for file encryption and implementation of authentication systems, so on. However, the generated derived key has lower entropy than general cryptography key, its use limited. To compensate this number iteration counts PBKDF2 should be increased. As repetitive tasks increases, but takes more time key. We present optimization...

10.1109/access.2021.3065082 article EN cc-by IEEE Access 2021-01-01

Recently, Graphic Processing Units (GPUs) have been widely used for general purpose applications such as machine learning applications, acceleration of cryptographic (especially, blockchains), etc. The development CUDA makes this General-Purpose computing on GPU possible. In particular, currently technology has server-side so to provide fast and efficient service a number clients. other words, servers need process large amount user data execute authentication process. Verifying the integrity...

10.1109/access.2021.3122466 article EN cc-by IEEE Access 2021-01-01

Six Sigma has been adopted by many software development organizations to identify problems in projects and processes, find optimal solutions for the identified problems, quantitatively improve processes so as achieve organizations' business goals. A framework process improvements is needed provide a standard analysis tools project executions, also platform collaborations with other improvement approaches, such PSP/TSP CMM/CMMI. However, few frameworks have proposed support executions. Most...

10.1109/apsec.2007.13 article EN Proceedings - Asia Pacific Software Engineering Conference/Proceedings 2007-12-01

Although synthesis was considered an important and challenging approach to construction of a program or model in software development, most research on has been devoted the state machine models variations them. Recently, as process modeling through languages like UML Activity Diagram BPMN appears new paradigm ability synthesize such from requirements would tremendously increase scope automatic development. This paper presents transformation rules for Diagrams scenario-based specifications...

10.1109/compsac.2010.51 article EN 2010-07-01

Six Sigma has been adopted by many software development organizations to identify problems in projects and processes, find optimal solutions for the identified problems, quantitatively improve processes so as achieve organizations' business goals. A framework process improvements is needed provide a standard analysis tools project executions, also platform collaborations with other improvement approaches, such PSP/TSP CMM/CMMI. However, few frameworks have proposed support executions. Most...

10.1109/aspec.2007.43 article EN 2007-12-01

The atomic force microscope (AFM) is used for imaging, measuring, and manipulating matter at the nanoscale. It well-known that water condenses between an AFM tip a solid surface, thereby generating pull-off acting on tip. We investigated behavior of meniscus surface using molecular dynamics simulation. considered ideally smooth surfaces rough are regularly structured randomly generated with standard deviation 2 Å. characteristic energy values in study 0.1, 0.5, 1.0, 1.5, 2.0, 2.5 kcal/mol,...

10.1021/la100452m article EN Langmuir 2010-05-12

Currently, cryptographic hash functions are widely used in various applications, including message authentication codes, random generators, digital signatures, key derivation functions, and post-quantum algorithms. Notably, they play a vital role establishing secure communication between servers clients. Specifically, often need to compute large number of simultaneously provide smooth services connected In this paper, we present highly optimized parallel implementations Lightweight Secure...

10.3390/electronics13050896 article EN Electronics 2024-02-26

The advent of software process models such as CMM/CMMI (Capability Maturity Model/Capability Model Integration) has helped engineers understand principles and approaches improvement. There, however, been difficulty increasing productivity from applying those since "how " is not within the scope CMM/CMMI. For this reason, SEI (Software Engineering Institute) introduced PSP/TSP (Personal Software Process/Team Process); they still lack statistical analysis tools systematic control techniques...

10.1109/sera.2007.15 article EN 2007-08-01

As people have interests in their health recently, development of medical domain application has been one the most active research areas. One example is detection system for heart disease based on electrocardiogram (ECG) which records electrical activity over time as wave form. However, detecting by using only ECG some disadvantages, so other resources better way. In order to support uses several resources, knowledge each resource should be defined. This constructs base and semantic web...

10.1109/cit.2007.172 article EN 2007-10-01

Service oriented architecture (SOA) has become a new software development paradigm because it provides flexible framework that can help reduce cost and time. SOA also promises loosely coupled, interoperable, composable services. In order to maximize these benefits, many researchers have focused on service composition techniques, especially in terms of providing quality services (QoS) consumers dynamic environment. current literature, approaches, such as the genetic algorithm, integer...

10.1109/icis.2008.8 article EN 2008-05-01

Mining interesting patterns from DNA sequences is one of the most challenging tasks in bioinformatics and computational biology. Maximal contiguous frequent are preferable for expressing function structure hence can capture common data characteristics among related sequences. Biologists interested finding orderly arrangements motifs that responsible similar expression a group genes. In order to reduce mining time complexity, however, existing sequence algorithms either focus on short or...

10.5808/gi.2012.10.1.51 article EN cc-by-nc Genomics & Informatics 2012-01-01

Effective representation of DNA sequences is one the important tasks in study genome sequences. In this paper, we propose a graphical based on nucleotide ring structure. proposed representation, convert into 16 dinucleotides surface hexagon so that it can preserve nucleotide's chemical property and positional information. Our approach provide capability efficient similarity comparison between also high accuracy. Furthermore, our satisfies uniqueness no degeneracy experimental study, use...

10.4137/ebo.s12160 article EN cc-by-nc Evolutionary Bioinformatics 2013-01-01

With the proliferation of mobile devices, many users now take advantage location-based services that use their current position. However, careful consideration should be made when sending one's location to another as often includes personal attributes such home address and reveals private information health or religion. To resolve this issue, a dummy generation technique is widely used. This protects privacy user by generating false position data (dummy) along with true obfuscate an...

10.1109/bigcomp.2016.7425987 article EN 2016-01-01

The advent of software process models such as CMM/CMMI has helped engineers understand principles and approaches improvement. There, however, been difficulty increasing productivity from applying these since "how" is not within the scope CMM/CMMI. For this reason, SEI introduced PSP/TSP, but those still lack analysis tools systematic control techniques for analyzing metrics collected in PSP/TSP. Six Sigma, on other hand, provides quantitative necessary to performance. Deploying PSP/TSP...

10.1109/icis-comsar.2006.13 article EN 2006-08-03

ATAM helps stakeholders determine where the risks and tradeoffs exist in elicited architectural strategies. But it provides no guidance for understanding economic benefits, thus needs to be complemented by some quantitative approach. CBAM software architects consider return-on-investment of any decision on involved. This paper presents our experience applying a small-scale studio project analyzes how properly was adjusted situation, what done well could have better. also evaluation same that...

10.1109/icis.2005.62 article EN 2005-01-01

Deep web refers to the hidden portion of WWW (World Wide Web) which cannot be accessed directly. One important issues in is how search Web. Several techniques have been proposed order address this issue. In paper, we surveyed current problems retrieving information from Web and a solution solve these using probability, iterative deepening graph theory.

10.1109/cit.2008.workshops.81 article EN 2008-07-01
Coming Soon ...