Sungjin Park

ORCID: 0000-0003-0080-217X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Security and Verification in Computing
  • Cloud Data Security Solutions
  • Technology and Data Analysis
  • Topic Modeling
  • Natural Language Processing Techniques
  • Caching and Content Delivery
  • Advanced Malware Detection Techniques
  • Blockchain Technology Applications and Security
  • Cryptography and Data Security
  • Engineering Applied Research
  • Mobile Agent-Based Network Management
  • Opportunistic and Delay-Tolerant Networks
  • Cloud Computing and Resource Management
  • Advanced Decision-Making Techniques
  • Advanced Graph Neural Networks
  • Energy Efficient Wireless Sensor Networks
  • User Authentication and Security Systems
  • Peer-to-Peer Network Technologies
  • Text Readability and Simplification
  • Geochemistry and Geochronology of Asian Mineral Deposits
  • Multimedia Communication and Technology
  • Access Control and Trust
  • Machine Learning in Healthcare
  • Power Systems and Technologies
  • Martial Arts: Techniques, Psychology, and Education

Electronics and Telecommunications Research Institute
2013-2025

Amazon (Germany)
2023

Chungbuk National University
2019-2022

Naver (South Korea)
2021

Korea Advanced Institute of Science and Technology
2012-2016

Samsung (South Korea)
2008

In real world applications, knowledge graphs (KG) are widely used in various domains (e.g. medical applications and dialogue agents). However, for fact verification, KGs have not been adequately utilized as a source. can be valuable source verification due to their reliability broad applicability. A KG consists of nodes edges which makes it clear how concepts linked together, allowing machines reason over chains topics. there many challenges understanding these machine-readable map...

10.18653/v1/2023.acl-long.895 article EN cc-by 2023-01-01

Remote attestation (RA) is a process for checking whether device's underlying Trusted Computing Base (TCB) and sensing data from the TCB are trustworthy. In IoT era, RA an important security feature because verifiers make critical decisions based on result. However, massive diverse collection of measurements devices makes managing devices' difficult complex. The cloud blockchain possible candidate addressing problem, but tailored approach essential to support scalable secure management. We...

10.1109/access.2025.3525807 article EN cc-by-nc-nd IEEE Access 2025-01-01

In-network proactive caching has been considered as an attractive approach for content-centric vehicular networks (CCVNs). The existing strategies cache all data to selected roadside units (RSUs) coming vehicles in order reduce the delay requesting from server. In networks, due high cost of deploying RSUs and their limited storage capacity, they could support only number amount contents decrease hit ratio. To solve problem, we propose a strategy distribute according movement vehicles. With...

10.23919/wmnc.2019.8881585 article EN 2019-09-01

Intel Software Guard Extensions (SGX) can address the information disclosure in cloud computing. However, existing virtual machine managers do not provide efficient management operations of SGX-enabled machines (VMs) like live migration. In this paper, we identify challenges and propose a novel approach its implementation model to migrate VMs. As future work, will design protocol new instructions for migration VMs, implement them on top OpenSGX, an open source SGX emulator.

10.1109/services.2016.23 article EN 2016-06-01

In cloud computing, geographic location of data is one major security concerns users. To resolve this problem, most previous work has been done on trusted relocation service in providers. For example, users are allowed to determine the physical their servers and ensured about requirements relocation-based restrictions. However, it also essential handle at users' devices mobile computing. As tenants use services everywhere, arises a new issue. Thus, paper, we present novel system named...

10.1109/mobilecloud.2015.17 article EN 2015-03-01

Cloud application marketplaces of modern cloud infrastructures offer a new software deployment model, integrated with the environment in its configuration and policies. However, similar to traditional distribution which has been suffering from piracy reverse engineering, face same challenges that can deter success evolving ecosystem software. We present novel system named CAFE for where sensitive logic be executed high secrecy protected any or engineering attempts virtual machine even when...

10.1109/tdsc.2018.2817545 article EN IEEE Transactions on Dependable and Secure Computing 2018-03-22

Even though Internet of things (IoT) sensing services are introduced in a wide range areas, it is not applicable to mission-critical due the lack trustworthiness IoT data. To address this problem, we propose TruSense, novel trusted framework for environment that covers end-to-end implementation from an device cloud service. The TruSense includes small board, communication protocol, and service environment. show our framework's feasibility, design ARM TrustZone-based board implement...

10.23919/jcn.2020.000035 article EN Journal of Communications and Networks 2021-02-01

Cloud application marketplaces of modern cloud infrastructures offer a new software deployment model, integrated with the environment in its configuration and policies. However, similar to traditional distribution which has been suffering from piracy reverse engineering, face same challenges that can deter success evolving ecosystem software. We present novel system named CAFE for where sensitive logic be executed high secrecy protected any or engineering attempts virtual machine even when...

10.1145/2714576.2714594 article EN 2015-04-03

Content-centric vehicular networks (CCVNs) have considered distributed proactive caching as an attractive approach for the timely provision of emerging services. The naïve schemes cache all contents to only one selected roadside unit (RSU) requested vehicles decrease data acquisition delay between source and vehicles. Due high deployment cost RSUs their limited capacity caching, could support a number amount content thus hit ratio. This paper proposes mobility-aware protocol (MDPC) in CCVNs....

10.3390/s22093346 article EN cc-by Sensors 2022-04-27

Recent success of pre-trained language models (PLMs) has stimulated interest in their ability to understand and work with numbers. Yet, the numerical reasoning over measurements not been formally studied despite importance. In this study, we show that PLMs lack capability required for measurements. Furthermore, find a model trained on measurement-rich corpus shows better performance understanding We propose simple embedding strategy distinguish between numbers units, which leads significant...

10.18653/v1/2022.findings-emnlp.128 article EN cc-by 2022-01-01

Authentication as a Service (AaaS) provides on-demand delivery of multi-factor authentication (MFA). However, current AaaS has left out consideration the trustworthiness user inputs at client evices and risk privacy exposure providers. To solve these concerns, we present TAaaS, Trustworthy Service, which offers trusted path-based MFA service to provider in cloud. TAaaS leverages hypervisor-based path ensure inputs, addresses concerns cloud by storing only irreversible account information. We...

10.1109/cloud.2016.0014 article EN 2016-06-01

Mobile cloud computing requires the efficient approach to access outsourced data in public clouds due resource scarceness of mobile devices. To this end, should be protected efficiently from being accessed plaintext by unauthorized users and clouds. User revocation appropriately managed guarantee backward secrecy, collusion resistance, key freshness. In paper, we present AKMD (Advanced Attribute-based Key Management for Devices Hybrid Clouds), an improved management hybrid using cipher...

10.1109/ares.2015.27 article EN 2015-08-01

In real world applications, knowledge graphs (KG) are widely used in various domains (e.g. medical applications and dialogue agents). However, for fact verification, KGs have not been adequately utilized as a source. can be valuable source verification due to their reliability broad applicability. A KG consists of nodes edges which makes it clear how concepts linked together, allowing machines reason over chains topics. there many challenges understanding these machine-readable map...

10.48550/arxiv.2305.06590 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Cluster-based wireless sensor network is considered in this paper. In network, every node wants to send data a certain gateway node, or command case of military network. communication enables effective power control, while the budget nodes limited. conventional clustering algorithm, there cluster header which has comparatively large capacity. However, most cases, same and all behave symmetrically. It necessary design based on equivalent condition. paper, we optimal size outage probability...

10.1109/milcom.2012.6415696 article EN 2012-10-01

본 연구는 직무 스트레스 교육 과정에서 스트레스의 이해를 돕기 위해 게이미피케이션을 활용했다. 연구의 목적은 적용한 보드게임으로 스트레스를 교육할 때, 재미경험이 학습효과, 전이효과, 교육몰입에 미치는 영향에 대한 인과관계 분석이다. 연구 진행을 게이미피케이션 개발 방법론과 Karasek의 모델을 바탕으로 보드 게임을 개발했다. 실험을 62명의 자발적 참여자를 모집했다. 설문도구는 스트레스와 관련된 선행연구의 설문도구 문항을 차용하여 결과에 따르면, 통한 교육은 긍정적인 영향을 것으로 나타났다. 결과를 소프트 스킬을 교육하기 위한 콘텐츠에 적용 활용할 것을 권장한다.

10.9728/dcs.2020.21.6.1069 article KO Journal of Digital Contents Society 2020-06-30

현장원가관리시스템은 회계적 원가와 실제 현장과의 차이를 감소시켜 ‘생산현장을 관리할 수 있는 원가정보의 체계’를 말한다. 본 연구에서는 현장원가관리시스템을 성공적으로 도입한 실제사례를 통해 현장원가관리시스템의 구축 및 설계프로세스를 살펴보았다. A사는 중점 추진과제로 성과관리체계의 개선과 생산프로세스 기준정보의 개선을 선정하였다. 성공적인 정착을 위해서는 생산부문의 성과관리개선 로드맵(road-map)을 수립하고, 실질적인 생산성을 향상시키기 위해 숨겨진 실패원가(failed cost)의 절감이 필요하며, 구축을 위하여 생산현장에 스마트 태그(RFID: radio frequency identification)의 설치가 필수적이라는 것을 사례연구를 확인할 있었다.

10.17287/kbr.2015.19.4.129 article KO Korea Business Review 2015-11-30

본 연구는 회계법인의 감사서비스에 대한 품질을 향상시키기 위해 도입된 품질관리시스템의 구성요소별 특성에 관하여 분석하였다. 품질관리시스템이란 회계법인이 제공하는 감사서비스의 회계법인 내에 구축한 감사인의 업무운영시스템을 말한다. 그런데 품질관리시스템을 구성하는 다양한 요소중 획기적으로 향상시킬 수 있는 요소간의 관계를 분석한 없었다.BR회계법인이 품질은 요소들이 서로 복잡하게 영향을 줄 있으므로 단순히 회계법인내에 구축하고 운영하고 있다는 사실만으로는 설명하기에는 한계가 있다. 따라서 구성요소 중 어떤 항목들이 주어 품질에 미치는지에 연구가 부족한 실정이다.BR 베이지안 네트워크를 활용하여 감사품질관리시스템이 감사품질과 어떠한 연관성이 있는지를 살펴본 연구이다. 즉, 기존의 선행연구에서 많이 다루었던 회귀식의 설명변수(예: 규모, 운영형태 등)와 종속변수(예: 감사시간, 감사품질 등)간의 선형성의 가정을 극복하였다. 구체적으로 감사품질관리시스템의 구성요소인 경영진의 운영책임,...

10.18032/kaaba.2016.29.1.001 article KO The Korean Academic Association of Business Administration 2016-01-31

최근 모바일 컴퓨팅 환경 변화로 사용자 단말의 분실, 도난, 악성코드에 의한 위협이 증가하여 단말기에 저장된 중요 정보가 노출될 가능성이 증가하고 있으며, 대응책으로 인증, 저장 자료 암호화 솔루션이 적용되어야 한다. 솔루션은 암호학적 안전성과 암호 연산에 따른 성능 이슈가 trade-off 관계에 있다. 파일 암호화에 많이 사용되는 CBC 모드는 IV에 대한 재사용 불가, 예측불가능, 무결성 보장 요구사항을 갖고 본 논문에서는 HSM을 사용하는 환경에서 파일시스템 레벨의 솔루션 구현 시, IV 운용에 충족하며, 효율적인 세션 관리를 통해 성능을 향상할 수 있는 방식을 제안하고, 제안된 방식의 설계 및 구현을 기존 방식에 비해 측면에서도 우수함을 증명한다. In today's mobile computing environment, there are many threats, such as device loss or theft, malware, to the sensitive...

10.13089/jkiisc.2013.23.5.849 article EN Journal of the Korea Institute of Information Security and Cryptology 2013-10-31
Coming Soon ...