Hyeontaek Oh

ORCID: 0000-0003-0722-0762
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Video Surveillance and Tracking Methods
  • Privacy-Preserving Technologies in Data
  • Wireless Networks and Protocols
  • Web Data Mining and Analysis
  • Privacy, Security, and Data Protection
  • Multimedia Communication and Technology
  • Advanced Neural Network Applications
  • Anomaly Detection Techniques and Applications
  • Smart Grid Energy Management
  • IoT and Edge/Fog Computing
  • Network Security and Intrusion Detection
  • Peer-to-Peer Network Technologies
  • Caching and Content Delivery
  • Context-Aware Activity Recognition Systems
  • Blockchain Technology Applications and Security
  • Vehicle License Plate Recognition
  • Advanced MIMO Systems Optimization
  • Gait Recognition and Analysis
  • Advanced Wireless Network Optimization
  • Cloud Computing and Remote Desktop Technologies
  • Electric Vehicles and Infrastructure
  • Advanced Battery Technologies Research
  • Energy Efficient Wireless Sensor Networks
  • Non-Invasive Vital Sign Monitoring
  • Service-Oriented Architecture and Web Services

Korea Advanced Institute of Science and Technology
2014-2023

Korea Institute of Science & Technology Information
2022-2023

ORCID
2021

Inha University
2021

Korea University
2016-2017

Daejeon Institute of Science and Technology
2016

With the widespread of Internet-of-Things (IoT) environment, a big data concept has emerged to handle large number generated by IoT devices. Moreover, since data-driven approaches now become important for business, markets have emerged, and are exploited major stakeholders, such as brokers service providers. Since many services applications utilize analytic methods with collected from devices, conflict issues between privacy exploitation raised, mainly categorized protection valuation...

10.1109/jiot.2020.2973662 article EN IEEE Internet of Things Journal 2020-02-13

With the widespread use of Internet Things, data-driven services take lead both online and off-line businesses. Especially, personal data draw heavy attention service providers because usefulness in value-added services. emerging big-data technology, a broker appears, which exploits sells about individuals to other third parties. Due little transparency between brokers/consumers, people think that current ecosystem is not trustworthy, new regulations with strengthening rights were...

10.1109/access.2019.2904248 article EN cc-by-nc-nd IEEE Access 2019-01-01

With the evolutionary development of Internet Things (IoT), demand for delay-sensitive applications has increased. In this manner, mobile-edge computing (MEC) emerged as a promising technology to run these on mobile devices. Several studies have been conducted pricing schemes in MEC environment, and they focused amount offloaded data pricing. However, under previously proposed policy, server resource usage users is not properly reflected payment, so only try occupy resources much possible...

10.1109/jiot.2022.3163820 article EN IEEE Internet of Things Journal 2022-04-01

With the emergence of various Internet Things (IoT) technologies, energy-saving schemes for IoT devices have been rapidly developed. To enhance energy efficiency in crowded environments with multiple overlapping cells, selection access points (APs) should consider conservation by reducing unnecessary packet transmission activities caused collisions. Therefore, this paper, we present a novel energy-efficient AP scheme using reinforcement learning to address problem unbalanced load that arises...

10.3390/s23115197 article EN cc-by Sensors 2023-05-30

nomaly detection, or outlier refers to identifying rare abnormal instances patterns within a dataset that deviate significantly from the expected normal behaviour. Various methods have been proposed, but most assume their training datasets take full, complete integrity. However, innocent integrity of data is not easy maintain in reality. Existing anomaly detection generally see given as single class and learn features can represent it well, this approach very vulnerable contamination. This...

10.2139/ssrn.4706186 preprint EN 2024-01-01

The key challenge of unsupervised vehicle re-identification (Re-ID) is learning discriminative features from unlabelled images. Numerous methods using domain adaptation have achieved outstanding performance, but those still need a labelled dataset as source domain. This paper addresses an Re-ID method, which no any types dataset, through Self-supervised Metric Learning (SSML) based on feature dictionary. Our method initially extracts images and stores them in Thereafter, the dictionary,...

10.1109/iros51168.2021.9636545 article EN 2021 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) 2021-09-27

Detecting unusual behaviors of insiders on enterprise resource planning (ERP) systems is one the essential parts to reduce risks threatening and abusing resources by insiders. Many approaches detect based rule-based stochastic processes are currently limited empirical monitoring using manually established algorithms or probabilistic boundaries. Those need prior knowledge such as user permission guideline process data characteristics. Unfortunately, obtaining hard in practice, these not...

10.1109/tii.2021.3090362 article EN IEEE Transactions on Industrial Informatics 2021-06-17

In this paper, to balance power supplement from the solar energy's intermittent and unpredictable generation, we design a energy generation trading platform (EggBlock) using Internet of Things (IoT) systems blockchain technique. Without centralized broker, proposed EggBlock can promote between users equipped with panels, demand generation. By applying second price sealed-bid auction, which is one suitable pricing mechanisms in technique, it possible derive truthful bidding market...

10.3390/s22062410 article EN cc-by Sensors 2022-03-21

Personal data have become the key to data-driven services and applications whereas privacy requirements are now strongly imposed by regulations. Meanwhile, people find it difficult understand whether handle personal comply with their agreements Therefore, need for indicators, which summarize contents as forms of scoring, labels, etc., has increased empower users' rights providing understandable information about privacy. For firm proper criteria methods evaluating level risks compliance...

10.1016/j.jksuci.2022.12.019 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2023-01-01

With the widespread of electric vehicles (EV), necessity installing EV charging facility has rapidly increased. Since operating are costly and complex, choosing a proper power operation scheme is critical in implementing cost-effective service. Therefore, this article proposes an efficient for by jointly analyzing not only monetary issues with various rate policies battery wear-out costs energy storage system (ESS) but also uncertainty caused users' behavior under different requirements. By...

10.1109/tii.2023.3240752 article EN IEEE Transactions on Industrial Informatics 2023-01-31

In this paper, we propose Normality-Calibrated Autoencoder (NCAE), which can boost anomaly detection performance on the contaminated datasets without any prior information or explicit abnormal samples in training phase. The NCAE adversarially generates high confident normal from a latent space having low entropy and leverages them to predict dataset. is trained minimise reconstruction errors uncontaminated maximise samples. experimental results demonstrate that our method outperforms...

10.48550/arxiv.2110.14825 preprint EN cc-by-nc-sa arXiv (Cornell University) 2021-01-01

Recently, vehicle re-identification methods based on deep learning constitute remarkable achievement. However, this achievement requires large-scale and well-annotated datasets. In constructing the dataset, assigning globally available identities (Ids) to vehicles captured from a great number of cameras is labour-intensive, because it needs consider their subtle appearance differences or viewpoint variations. paper, we propose camera-tracklet-aware contrastive (CTACL) using multi-camera...

10.1109/icra46639.2022.9812007 article EN 2022 International Conference on Robotics and Automation (ICRA) 2022-05-23

Many Internet of Things applications provide methods to create mashup services with if-then-else approaches due its simplicity. When a number are increased, it may be suffered by service conflict, that is, perform opposite actions or abnormal behavior at the same time. To overcome this issue, paper proposes concept context descriptor detect conflict and visualize their situations.

10.1109/gcce.2017.8229286 article EN 2022 IEEE 11th Global Conference on Consumer Electronics (GCCE) 2017-10-01

The performance of road defect segmentation (a.k.a. pixel-level detection) has been improved alongside with remarkable achievement deep learning. Those improvements need a large-scale and well-constructed dataset. However, surface materials or designs vary from country to country, the patterns defects are hard pre-define. In this paper, we propose novel multi-source domain adaptation method boost on an unlabelled proposed generates ensembled labels using transferred information models...

10.1109/icra48891.2023.10161099 article EN 2023-05-29

Reidentification (Re-id) of vehicles in a multicamera system is an essential process for traffic control automation. Previously, there have been efforts to reidentify based on shots images with identity (id) labels, where the model training relies quality and quantity labels. However, labeling vehicle ids labor-intensive procedure. Instead relying expensive we propose exploit camera tracklet that are automatically obtainable during Re-id dataset construction. In this article, present weakly...

10.1109/tnnls.2023.3288139 article EN IEEE Transactions on Neural Networks and Learning Systems 2023-07-04

Web-based multi-screen digital signage system is designed to show a multimedia content via multiple screens which are connected by network. In this demonstration, novel method control proposed. The proposed uses standard web technologies display same contents and seamless moving each devices screen.

10.1109/gcce.2014.7031154 article EN 2014-10-01

Recently, as the number of smart devices increases, way digital broadcast contents is changed. This change leads that conventional media acceptsWeb platform and its services to provide more quality contents. Based on this change, in education field, broadcasting also follows trend. The traditional platforms, which just delivered a lecture one-way, are utilized Web technology make interaction between teacher student. however, insufficient satisfy users' demands for two-way interactions. paper...

10.1145/2749215.2749222 article EN 2015-04-17

The number of wireless access points (APs) have increased rapidly in recent years to support increasing demands local area network. However, some the research findings show that many these APs are actually idle mainly during off-peak hours, i.e., there is no active user within their coverage areas time. Nevertheless, identify availability users, all remained powered-on always regardless presence or absence any inside areas. To save energy hours APs, sleep mechanism could be applied. In this...

10.1109/noms.2016.7502830 article EN NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium 2016-04-01

We demonstrate sigAlbum, a novel photo album service. It utilizes tiny text intelligence to intelligently classify and search relevant photos inside smartphone without any image processing. sigAlbum has three key features. First, it organizes in-device into well-defined categories. Secondly, retrieves semantically related photos. Finally, works in stand-alone, privacy-protecting manner. To the best of our knowledge, this is first work that provides intelligent classification semantic...

10.1145/2968219.2971371 article EN 2016-09-12

Personal data is becoming increasingly valuable in business, as the insights that can be obtained from processing continue to improve. However, it also cause adverse effects on individuals. To improve quality while satisfying privacy compliance, companies now have focused collecting informed consent individuals directly handle personal without applying any privacy-preserving techniques. Even though obtain use data, transparency and accountability ensure deal with according consent, necessary...

10.1109/access.2023.3311823 article EN cc-by IEEE Access 2023-01-01

With the proliferation of Internet Things technologies, health care services that target a household equipped with IoT devices are widely emerging. In meantime, number global single households is expected to rapidly grow. Contactless radar-based sensors recently investigated as convenient and practical means collect biometric data subjects in households. this paper, collected by contactless installed elderly under uncontrolled environments analyzed, deep learning-based classification model...

10.1109/icaiic54071.2022.9722653 article EN 2022-02-21

For micro grids with renewable energy sources, the main goal is to optimize usage in a particular area based on prediction of consumption and production. However, error cannot be evaded it causes various problems operate microgrid system. To solve these problems, we are going propose two-stage operation model local In addition, by applying cooperative game theory Shapley-value algorithm, revenue payment determined real-time period actual contribution individual prosumer. Numerical anaylsis...

10.1109/gcce.2018.8574874 article EN 2022 IEEE 11th Global Conference on Consumer Electronics (GCCE) 2018-10-01
Coming Soon ...