- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- IoT and Edge/Fog Computing
- Vehicular Ad Hoc Networks (VANETs)
- Education and Learning Interventions
- Asian Culture and Media Studies
- Wireless Body Area Networks
- IPv6, Mobility, Handover, Networks, Security
- Psychosocial Factors Impacting Youth
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Educational Systems and Policies
- Japanese History and Culture
- RFID technology advancements
- Gender, Labor, and Family Dynamics
- Korean Peninsula Historical and Political Studies
- Social and Intergroup Psychology
- Electoral Systems and Political Participation
- UAV Applications and Optimization
- Intergenerational and Educational Inequality Studies
- Healthcare Education and Workforce Issues
- Cryptographic Implementations and Security
- Education, Safety, and Science Studies
- IoT-based Smart Home Systems
- Energy and Environmental Systems
Gyeongsang National University
2023-2024
Bryn Mawr College
2024
Pennsylvania State University
2024
Hanyang University
2022-2023
Anyang University
2023
Korea Atomic Energy Research Institute
2018-2022
Kookmin University
2022
Soonchunhyang University
2017-2021
Sookmyung Women's University
2021
Daegu University
2021
Unmanned Aerial Vehicle (UAV) plays a paramount role in various fields, such as military, aerospace, reconnaissance, agriculture, and many more. The development implementation of these devices have become vital terms usability reachability. Unfortunately, they widespread their demand grows, are becoming more vulnerable to several security attacks, including, but not limited to, jamming, information leakage, spoofing. In order cope with attacks threats, proper design robust protocols is...
The communication in the Smart Home Internet of Things (SH-IoT) comprising various electronic devices and sensors is very sensitive crucial. In addition, key requirements SH-IoT include channel security, handover support, mobility management, consistent data rates. Proxy mobile IPv6 (PMIPv6) considered as one core solutions to handle extreme mobility; however, default PMIPv6 cannot ensure performance enhancement scenarios, i.e., Route Optimization (RO). existing security protocols for...
Smart home networks have been recognized as one of its representative important applications in the forthcoming 5G era. It is also expected that networks, future smart services will be much powered by mobility management, which enables users to remotely access and control their in-home Internet Things (IoT) sensors appliances anywhere anytime any device. As a major solution, Distributed IP Mobility Management (DMM) can considered because it addresses limitation centralized approaches well...
With advances in diffusion models, image generation has shown significant performance improvements. This raises concerns about the potential abuse of generation, such as creation explicit or violent images, commonly referred to Not Safe For Work (NSFW) content. To address this, Stable Diffusion model includes several safety checkers censor initial text prompts and final output images generated from model. However, recent research that these have vulnerabilities against adversarial attacks,...
After inadvertently committing an interpersonal transgression, offender might make effortful apology (e.g. cancelling important meeting to as soon possible). Such costly apologies signal the apologiser's sincere intention restore endangered relationship. The present study investigated this signalling model of across seven countries (Chile, China, Indonesia, Japan, Netherlands, South Korea and U.S.). Participants were asked imagine that a friend had committed transgression against them then...
The development of the Internet Drones (IoD) becomes vital because a proliferation dronebasedcivilian or military applications. IoD based technological revolution upgrades currentInternet environment into more pervasive and ubiquitous world. is capable enhancing thestate-of-the-art for drones while leveraging services from existing cellular networks. Irrespectiveto vast domain range applications, vulnerable to malicious attacks over open-air radiospace. Due increasing threats attacks, there...
“Internet of Things” (IoT) bridges the communication barrier between computing entities by forming a network them. With common solution for control and management IoT devices, these networks are prone to all types threats. Such may experience threats which launched exploitation vulnerabilities that left unhandled during testing phases. These often termed as “zero-day” vulnerabilities, their conversion into attack is named attack. attacks can affect devices exploiting defense perimeter...
Smart farming is rapidly revolutionizing the agricultural sector where embedded Internet of Things (IoT) devices are integrated into field to maintain or improve quality products as well increase food production. Despite tremendous benefits, various cybersecurity threats IoT can also be inherited by sector. In this paper, we propose a lightweight specification-based distributed detection identify misbehavior heterogeneous nodes efficiently and effectively in closed-loop smart greenhouse...
Abstract Polygraphs are used in criminal interrogations to detect deception. However, polygraphs can be difficult administer under circumstances that prevent the use of biosensors. To address shortcomings biosensors, deception-detection technology without biosensors is needed. We propose a method, FacialCueNet, which multi-modal network utilizes both facial images and cues based on deep-learning technology. FacialCueNet incorporates indicate deception, such as action-unit frequency,...
The rapid involution of the mobile generation with incipient data networking capabilities and utilization has exponentially increased traffic volumes. Such drains various key issues in 5G backhaul networks. Security is utmost importance; however, there are a limited number articles, which have explored such requirement. This paper discusses potential design challenges secure architecture. comparisons existing state-of-the-art solutions for backhaul, together their major contributions been...
Advances of implantable medical devices (IMD) are transforming the traditional method providing treatment, especially those patients under most challenging condition. Accordingly, IMD-enabled artificial pancreas system (APS) has now reached global market. It helped many suffering from chronic disease, called diabetes mellitus, in monitoring and maintaining blood glucose level conveniently. However, this advancement is accompanied by various security threats that place life at risk. Hence,...
The CAN (Controller Area Network) protocol is widely adopted for in-vehicle networks due to its cost efficiency and reliable transmission. However, despite popularity, the lacks built-in security mechanisms, making it vulnerable attacks such as flooding, fuzzing, DoS. These can exploit vulnerabilities disrupt expected behavior of network. One main reasons these concerns that relies on broadcast frames communication between ECUs (Electronic Control Units) within To tackle this issue, we...
We offer the first evidence on effects of minimum wage increases labor market outcomes for people with disabilities. use a novel dataset consisting quarterly data employment, earnings, and hours workers at nonprofit firms that primarily employ disabilities, many whom are paid subminimum wages. Using recent local variation in changes, we find increasing does not affect employment precisely estimated null effects.
In the 5G era, network mobility management is recognized as a very important factor for user service availability. Especially, due to fast speed and shrinking cell coverage, frequent handover expected than before. Hence, efficient procedure essential guarantee seamless users. Distributed IP Mobility Management (DMM), major solution, flat architecture that achieves efficiency fault tolerance by excluding centralized anchor minimizing distance between mobile device its serving network....
The development of the Internet Drones (IoD) becomes vital because a proliferation drone-based civilian or military applications. IoD based technological revolution upgrades current environment into more pervasive and ubiquitous world. is capable enhancing state-of-the-art for drones while leveraging services from existing cellular networks. Irrespective to vast domain range applications, vulnerable malicious attacks over open-air radio space. Due increasing threats attacks, there has been...
Cellular technology has evolved over the decades for mobile network operators to accommodate ever-growing demands of services connecting Vehicle-to-Everything (V2X). The 5G infrastructure facilitates V2X communications, where a small-cell base station operating at ultra-high radio frequency with limited coverage becomes pervasive. These stations in 5G-V2X must be strategically deployed near consumers realize several use cases. More recently, architectural split solutions Next Generation...
Is South Korea in China's Orbit?Assessing Seoul's Perceptions and Policies Jae Ho Chung (bio) Jiyoon Kim keywords south korea, china, rok-u.s. alliance, korean peninsula [End Page 123] executive summary This article examines Korea's perceptions of policies toward China, particularly since President Park Geun-hye's inauguration 2013, assesses the thesis that Seoul is Chinese orbit. main argument Although view tilting increasingly China at expense its relations with U.S. has been gaining an...
The Medical Internet-of-Things (MIoT) has developed revolutionary ways of delivering medical care to patients. An example system, showing increasing demand, is the artificial pancreas system that offers convenience and reliable support patients with Type 1 Diabetes. Despite apparent benefits, cannot escape potential cyber threats may worsen a patient’s condition. security risks need immediate attention ensure privacy patient preserve safe functionality. Motivated by this, we proposed...