Jiyoon Kim

ORCID: 0000-0003-2710-0864
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Authentication Protocols Security
  • User Authentication and Security Systems
  • IoT and Edge/Fog Computing
  • Vehicular Ad Hoc Networks (VANETs)
  • Education and Learning Interventions
  • Asian Culture and Media Studies
  • Wireless Body Area Networks
  • IPv6, Mobility, Handover, Networks, Security
  • Psychosocial Factors Impacting Youth
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Educational Systems and Policies
  • Japanese History and Culture
  • RFID technology advancements
  • Gender, Labor, and Family Dynamics
  • Korean Peninsula Historical and Political Studies
  • Social and Intergroup Psychology
  • Electoral Systems and Political Participation
  • UAV Applications and Optimization
  • Intergenerational and Educational Inequality Studies
  • Healthcare Education and Workforce Issues
  • Cryptographic Implementations and Security
  • Education, Safety, and Science Studies
  • IoT-based Smart Home Systems
  • Energy and Environmental Systems

Gyeongsang National University
2023-2024

Bryn Mawr College
2024

Pennsylvania State University
2024

Hanyang University
2022-2023

Anyang University
2023

Korea Atomic Energy Research Institute
2018-2022

Kookmin University
2022

Soonchunhyang University
2017-2021

Sookmyung Women's University
2021

Daegu University
2021

Unmanned Aerial Vehicle (UAV) plays a paramount role in various fields, such as military, aerospace, reconnaissance, agriculture, and many more. The development implementation of these devices have become vital terms usability reachability. Unfortunately, they widespread their demand grows, are becoming more vulnerable to several security attacks, including, but not limited to, jamming, information leakage, spoofing. In order cope with attacks threats, proper design robust protocols is...

10.3390/s21062057 article EN cc-by Sensors 2021-03-15

The communication in the Smart Home Internet of Things (SH-IoT) comprising various electronic devices and sensors is very sensitive crucial. In addition, key requirements SH-IoT include channel security, handover support, mobility management, consistent data rates. Proxy mobile IPv6 (PMIPv6) considered as one core solutions to handle extreme mobility; however, default PMIPv6 cannot ensure performance enhancement scenarios, i.e., Route Optimization (RO). existing security protocols for...

10.1109/access.2017.2710379 article EN cc-by-nc-nd IEEE Access 2017-01-01

Smart home networks have been recognized as one of its representative important applications in the forthcoming 5G era. It is also expected that networks, future smart services will be much powered by mobility management, which enables users to remotely access and control their in-home Internet Things (IoT) sensors appliances anywhere anytime any device. As a major solution, Distributed IP Mobility Management (DMM) can considered because it addresses limitation centralized approaches well...

10.1109/access.2019.2943929 article EN cc-by IEEE Access 2019-01-01

With advances in diffusion models, image generation has shown significant performance improvements. This raises concerns about the potential abuse of generation, such as creation explicit or violent images, commonly referred to Not Safe For Work (NSFW) content. To address this, Stable Diffusion model includes several safety checkers censor initial text prompts and final output images generated from model. However, recent research that these have vulnerabilities against adversarial attacks,...

10.48550/arxiv.2501.05359 preprint EN arXiv (Cornell University) 2025-01-09

After inadvertently committing an interpersonal transgression, offender might make effortful apology (e.g. cancelling important meeting to as soon possible). Such costly apologies signal the apologiser's sincere intention restore endangered relationship. The present study investigated this signalling model of across seven countries (Chile, China, Indonesia, Japan, Netherlands, South Korea and U.S.). Participants were asked imagine that a friend had committed transgression against them then...

10.1556/jep.10.2012.4.3 article EN Journal of Evolutionary Psychology 2012-12-01

The development of the Internet Drones (IoD) becomes vital because a proliferation dronebasedcivilian or military applications. IoD based technological revolution upgrades currentInternet environment into more pervasive and ubiquitous world. is capable enhancing thestate-of-the-art for drones while leveraging services from existing cellular networks. Irrespectiveto vast domain range applications, vulnerable to malicious attacks over open-air radiospace. Due increasing threats attacks, there...

10.56801/rebicte.v4i.67 article EN cc-by-nc Research Briefs on Information and Communication Technology Evolution 2018-08-15

“Internet of Things” (IoT) bridges the communication barrier between computing entities by forming a network them. With common solution for control and management IoT devices, these networks are prone to all types threats. Such may experience threats which launched exploitation vulnerabilities that left unhandled during testing phases. These often termed as “zero-day” vulnerabilities, their conversion into attack is named attack. attacks can affect devices exploiting defense perimeter...

10.1155/2017/4749085 article EN cc-by Security and Communication Networks 2017-01-01

Smart farming is rapidly revolutionizing the agricultural sector where embedded Internet of Things (IoT) devices are integrated into field to maintain or improve quality products as well increase food production. Despite tremendous benefits, various cybersecurity threats IoT can also be inherited by sector. In this paper, we propose a lightweight specification-based distributed detection identify misbehavior heterogeneous nodes efficiently and effectively in closed-loop smart greenhouse...

10.1109/access.2020.3034096 article EN cc-by IEEE Access 2020-01-01

Abstract Polygraphs are used in criminal interrogations to detect deception. However, polygraphs can be difficult administer under circumstances that prevent the use of biosensors. To address shortcomings biosensors, deception-detection technology without biosensors is needed. We propose a method, FacialCueNet, which multi-modal network utilizes both facial images and cues based on deep-learning technology. FacialCueNet incorporates indicate deception, such as action-unit frequency,...

10.1007/s10489-023-04968-9 article EN cc-by Applied Intelligence 2023-09-07

The rapid involution of the mobile generation with incipient data networking capabilities and utilization has exponentially increased traffic volumes. Such drains various key issues in 5G backhaul networks. Security is utmost importance; however, there are a limited number articles, which have explored such requirement. This paper discusses potential design challenges secure architecture. comparisons existing state-of-the-art solutions for backhaul, together their major contributions been...

10.48550/arxiv.1906.11427 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Advances of implantable medical devices (IMD) are transforming the traditional method providing treatment, especially those patients under most challenging condition. Accordingly, IMD-enabled artificial pancreas system (APS) has now reached global market. It helped many suffering from chronic disease, called diabetes mellitus, in monitoring and maintaining blood glucose level conveniently. However, this advancement is accompanied by various security threats that place life at risk. Hence,...

10.1109/jbhi.2021.3063173 article EN IEEE Journal of Biomedical and Health Informatics 2021-03-02

The CAN (Controller Area Network) protocol is widely adopted for in-vehicle networks due to its cost efficiency and reliable transmission. However, despite popularity, the lacks built-in security mechanisms, making it vulnerable attacks such as flooding, fuzzing, DoS. These can exploit vulnerabilities disrupt expected behavior of network. One main reasons these concerns that relies on broadcast frames communication between ECUs (Electronic Control Units) within To tackle this issue, we...

10.3390/electronics12173543 article EN Electronics 2023-08-22

We offer the first evidence on effects of minimum wage increases labor market outcomes for people with disabilities. use a novel dataset consisting quarterly data employment, earnings, and hours workers at nonprofit firms that primarily employ disabilities, many whom are paid subminimum wages. Using recent local variation in changes, we find increasing does not affect employment precisely estimated null effects.

10.2139/ssrn.4837218 preprint EN 2024-01-01

In the 5G era, network mobility management is recognized as a very important factor for user service availability. Especially, due to fast speed and shrinking cell coverage, frequent handover expected than before. Hence, efficient procedure essential guarantee seamless users. Distributed IP Mobility Management (DMM), major solution, flat architecture that achieves efficiency fault tolerance by excluding centralized anchor minimizing distance between mobile device its serving network....

10.1109/access.2020.2985448 article EN cc-by IEEE Access 2020-01-01

The development of the Internet Drones (IoD) becomes vital because a proliferation drone-based civilian or military applications. IoD based technological revolution upgrades current environment into more pervasive and ubiquitous world. is capable enhancing state-of-the-art for drones while leveraging services from existing cellular networks. Irrespective to vast domain range applications, vulnerable malicious attacks over open-air radio space. Due increasing threats attacks, there has been...

10.48550/arxiv.1808.00203 preprint EN other-oa arXiv (Cornell University) 2018-01-01

Cellular technology has evolved over the decades for mobile network operators to accommodate ever-growing demands of services connecting Vehicle-to-Everything (V2X). The 5G infrastructure facilitates V2X communications, where a small-cell base station operating at ultra-high radio frequency with limited coverage becomes pervasive. These stations in 5G-V2X must be strategically deployed near consumers realize several use cases. More recently, architectural split solutions Next Generation...

10.1109/access.2021.3107308 article EN cc-by IEEE Access 2021-01-01

Is South Korea in China's Orbit?Assessing Seoul's Perceptions and Policies Jae Ho Chung (bio) Jiyoon Kim keywords south korea, china, rok-u.s. alliance, korean peninsula [End Page 123] executive summary This article examines Korea's perceptions of policies toward China, particularly since President Park Geun-hye's inauguration 2013, assesses the thesis that Seoul is Chinese orbit. main argument Although view tilting increasingly China at expense its relations with U.S. has been gaining an...

10.1353/asp.2016.0000 article EN Asia policy 2016-01-01

The Medical Internet-of-Things (MIoT) has developed revolutionary ways of delivering medical care to patients. An example system, showing increasing demand, is the artificial pancreas system that offers convenience and reliable support patients with Type 1 Diabetes. Despite apparent benefits, cannot escape potential cyber threats may worsen a patient’s condition. security risks need immediate attention ensure privacy patient preserve safe functionality. Motivated by this, we proposed...

10.3390/s23125501 article EN cc-by Sensors 2023-06-11
Coming Soon ...