Jae‐Woo Chang

ORCID: 0000-0002-0037-6812
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Data Management and Algorithms
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Advanced Database Systems and Queries
  • Cloud Data Security Solutions
  • Advanced Image and Video Retrieval Techniques
  • Security in Wireless Sensor Networks
  • Energy Efficient Wireless Sensor Networks
  • Caching and Content Delivery
  • Cloud Computing and Resource Management
  • Image Retrieval and Classification Techniques
  • Graph Theory and Algorithms
  • Algorithms and Data Compression
  • Video Analysis and Summarization
  • Data Mining Algorithms and Applications
  • Geographic Information Systems Studies
  • Mobile Ad Hoc Networks
  • Advanced Data Storage Technologies
  • Context-Aware Activity Recognition Systems
  • Advanced Clustering Algorithms Research
  • Internet Traffic Analysis and Secure E-voting
  • Vehicular Ad Hoc Networks (VANETs)
  • Traffic Prediction and Management Techniques
  • Bluetooth and Wireless Communication Technologies
  • Distributed systems and fault tolerance

Jeonbuk National University
2013-2024

Chonbuk National University Hospital
1996-2017

Seoul National University
2015

Chungbuk National University
2002

The Jiangmen Underground Neutrino Observatory (JUNO) is proposed to determine the neutrino mass hierarchy using an underground liquid scintillator detector. It located 53 km away from both Yangjiang and Taishan Nuclear Power Plants in Guangdong, China. experimental hall, spanning more than 50 meters, under a granite mountain of over 700 m overburden. Within six years running, detection reactor antineutrinos can resolve at confidence level 3-4$\sigma$, oscillation parameters...

10.48550/arxiv.1508.07166 preprint EN other-oa arXiv (Cornell University) 2015-01-01

Recently data mining applications require a large amount of high-dimensional data. However, most clustering methods for miming do not work efficiently dealing with large, because the so-called 'curse dimensionality'[1] and limitation available memory. In this paper, we propose new cell-based method which is more efficient than existing methods. Our provides an cell creation algorithm using space-partitioning technique uses filtering-based index structure approximation technique. Finally,...

10.1145/508791.508886 article EN 2002-03-11

Many wireless sensor network (WSN) applications require privacy-preserving aggregation of data during transmission from the source nodes to sink node. In this paper, we explore several existing (PPDA) protocols for WSNs in order provide some insights on their current status. For this, evaluate PPDA basis such metrics as communication and computation costs demonstrate potential supporting WSNs. addition, based research, enumerate important future research directions field

10.3390/s100504577 article EN cc-by Sensors 2010-05-04

With the development of cloud computing, interest in database outsourcing has recently increased. However, when is outsourced, there a problem that information data owner exposed to internal and external attackers. Therefore, this paper, we propose decimal-based encryption operation protocols support privacy preservation. The proposed improve operational efficiency compared with binary-based by eliminating need for repetitive operations based on bit length. In addition, privacy-preserving...

10.3390/app14020835 article EN cc-by Applied Sciences 2024-01-18

Wireless sensor networks (WSNs) have been broadly studied with advances in ubiquitous computing environment. Because the resource of a node is limited, it important to use energy-efficient routing protocol WSNs. The cluster-based an efficient way reduce energy consumption by decreasing number transmitted messages sink node. LEACH most popular protocol, which provides adaptive cluster generation and header rotation. However, its communication range limited since assumes direct between nodes...

10.1155/2014/527928 article EN International Journal of Distributed Sensor Networks 2014-07-01

Recently, privacy-preserving association rules mining algorithms have been proposed to support data privacy. However, the an additional overhead insert fake items (or transactions) and cannot hide frequency. In this paper, we propose a rule algorithm for encrypted in cloud computing. For mining, utilize Apriori by using Elgamal cryptosystem, without transactions. Thus can guarantee both privacy query privacy, while concealing We show that achieves about 3-5 times better performance than...

10.1109/cloud.2019.00086 article EN 2019-07-01

With the prevalence of cloud computing, privacy-preserving database outsourcing has been spotlighted. To preserve both data privacy and query from adversaries, databases need to be encrypted before being outsourced cloud. However, there exists only kNN classification scheme over in Because existing suffers high computation overhead, we proposed a secure efficient algorithm that conceals resulting class label access patterns. In addition, our can support by using index Yao's garbled circuit....

10.1109/cloud.2017.110 article EN 2017-06-01

Recent development in wireless communication technology and mobile equipment like PDA, cellular phone GPS is making location-based services (LBSs) more popular day by day. However, because, the LBSs, users continuously send queries to LBS servers using their exact locations, private information could be danger. Therefore, a mechanism for users' privacy protection required safe comfortable use of LBSs. For this, this paper, we propose grid-based cloaking area creation scheme order support...

10.1145/2245276.2245379 article EN 2012-03-26

The study on spatial database outsourcing has been spotlighted with the development of cloud computing. Therefore, researches for protecting location data privacy in outsourced have studied. However, existing transformation schemes are vulnerable to naïve attack models. cryptographic scheme provides high privacy, but it causes query processing cost. To solve these problems, this paper we propose a Hilbert-curve based protect and improve efficiency databases. proposed reduces communication...

10.1109/bigcomp.2014.6741411 article EN 2014-01-01

A wireless sensor network (WSN) is composed of a large number nodes which are resource constraints, e.g., limited power. This drives research on how to design routing protocols gather data efficiently so that the life can be prolonged. usual concept collect by sink node transfer from multi-hop. However, it gives rise two problems. The first one hotspot problem, in closer run out energy sooner than other nodes. As result, loses its service ability, regardless amount residual second generates...

10.1109/cit.2009.33 article EN 2009-01-01

Location Based Services (LBSs) have recently attracted much attention due to the advancement of GPS facilitates. In LBS, private and confidential information user may disclose others since LBS need a user's location. To protect privacy users, many cloaking algorithms been proposed hide actual The existing Hilbert algorithm support location privacy, but it has drawback that extends region inefficiently dimensionality reduction. this paper, we propose new which can avoid unnecessary extension...

10.1109/socialcom.2010.162 article EN 2010-08-01

Recently, travel time prediction has become a crucial part of trip panning and dynamic route guidance for many advanced traveler information transportation management systems. Moreover, scalable system with high accuracy is critical

10.3233/ifs-2010-0431 article EN Journal of Intelligent & Fuzzy Systems 2010-01-01

Since wireless sensor networks (WSNs) are resources- constrained, it is very essential to gather data efficiently so that the life of can be prolonged. Data aggregation conserve a significant amount energy by minimizing transmission costs in terms number packets. On other hand, many applications require privacy sampled protecting their integrity while they travel from source nodes collecting device, say query server. Thus, an efficient scheme for preserving and required WSNs. Although secure...

10.1109/cit.2010.422 article EN 2010-06-01

Many applications require the privacy of sampled data while they travel from source sensor nodes to collecting device, say sink. Providing an efficient aggregation scheme with preserving is a challenging problem in research wireless networks (WSNs). Although secure WSNs has been well studied recent years, there exists little work, for instance PDA (Privacy-preserving Data Aggregation), which focuses on protecting not only adversaries but also participating trusted nodes. However, suffers one...

10.1109/dasc.2009.77 article EN 2009-12-01

Since studies on privacy-preserving database outsourcing have been spotlighted in a cloud computing, databases need to be encrypted before being outsourced the cloud. Rao et al. proposed k-Means clustering algorithm that supports protection of sensitive data by using paillier cryptosystem[1]. However, existing is inefficient due bit-array based comparison. To solve this problem, we propose an efficient algorithm. First, provide new secure comparison protocol performs fast data. Second,...

10.1109/cloud.2018.00138 article EN 2018-07-01

Because moving objects usually move on spatial networks, efficient trajectory index structures are required to achieve good retrieval performance their trajectories. However, there has been little research for like FNR-tree and MON-tree. But, because both MON-tree store the object's segment, they can not support a spatio-temporal range query similar query. In this paper, we propose an structure objects, named TMN-Tree (Trajectory of Moving Network Tree), which only but also addition, present...

10.1109/cit.2010.289 article EN 2010-06-01

Data aggregation techniques have been widely used in wireless sensor networks (WSNs) to solve the energy constraint problems of nodes. They can conserve significant amount by reducing data packet transmission costs. However, many applications require privacy and integrity protection real while transmitting from sensing nodes a sink node. The existing schemes for supporting both integrity, that is, iCDPA, iPDA, suffer high communication cost, computation propagation delay. To resolve...

10.1155/2014/272537 article EN cc-by International Journal of Distributed Sensor Networks 2014-01-01

Many wireless sensor network (WSN) applications require privacy of the sampled data during transmission from source nodes to a collecting device, say query server. Providing an efficient aggregation scheme with preserving is challenging problem in WSNs. Although secure WSNs has been well studied recent years, there exists little work, for instance PDA (Privacy-preserving Data Aggregation), which focuses on protecting not only adversaries but also participating trusted nodes. However, suffers...

10.1109/cit.2010.79 article EN 2010-06-01

The explosive growth of location-detection devices, such as GPS (Global Positioning System), continuously increasing users' privacy threat in location-based services (LBSs). However, order to enjoy services, the user must precisely disclose his/her exact location LBS. So, it is a key challenge efficiently preserve user's while accessing For this, existing method employs 2PASS cloaking framework that not only hides actual but also reduces bandwidth consumption. suffers from attack. Therefore,...

10.1109/mobserv.2012.23 article EN 2012-06-01
Coming Soon ...