- RFID technology advancements
- Innovation in Digital Healthcare Systems
- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- Internet of Things and Social Network Interactions
- IoT and Edge/Fog Computing
- Advanced Malware Detection Techniques
- Cloud Data Security Solutions
- Information and Cyber Security
- Network Security and Intrusion Detection
- QR Code Applications and Technologies
- Technology and Data Analysis
- Digital Rights Management and Security
- Cryptography and Data Security
- Chaos-based Image/Signal Encryption
- Mobile Ad Hoc Networks
- Distributed and Parallel Computing Systems
- Energy Harvesting in Wireless Networks
- Cloud Computing and Resource Management
- Advanced Steganography and Watermarking Techniques
- Access Control and Trust
- Video Surveillance and Tracking Methods
- IPv6, Mobility, Handover, Networks, Security
- Security in Wireless Sensor Networks
- Advanced Wireless Communication Techniques
Mokwon University
2012-2024
Shanghai Jiao Tong University
2018-2023
Tunghai University
2018
Sun Moon University
2015
Korea Air Force Academy
2015
Pai Chai University
2015
Korea Institute for Curriculum and Evaluation
2015
National Taipei University of Technology
2015
Jeonju University
2015
St. Francis Xavier University
2010
This context-aware middleware system facilitates diverse multimedia services in heterogeneous network environments by combining an adaptive service provisioning framework with a framework.
Gait identification based on Deep Learning (DL) techniques has recently emerged as biometric technology for surveillance. We leveraged the vulnerabilities and decision-making abilities of DL model in gait-based autonomous surveillance systems when attackers have no access to underlying gradients/structures using a patch-based black-box adversarial attack with Reinforcement (RL). These automated are secured, blocking attacker's access. Therefore, can be conducted an RL framework where agent's...
The RFID system is a contactless automatic identification that identifies tags attached on goods through radio frequency communication. This expected to supplant barcode systems, the contact reading technique most widely used at present. can be applied in variety of areas. Among those, Ari Juels proposed an environment prove pair has been scanned simultaneously. And he presented "yoking proof" protocol for this. But yoking-proof vulnerable replay attack. Although modified protocols...
Concurrent access among multiple mobile readers brings about a new problem called reader collision that reader’s transmission is interfered by the others. There have been several works to solve problem. While they employ time division, frequency space or centralized scheduling approach, in this paper, we introduce cooperative, distributed avoidance algorithm. In particular, it suitable for energy-efficient wireless network environment cooperated with RFID, since proposed DiCa (Distributed...
In recent years, different variants of the botnet are targeting government, private organizations and there is a crucial need to develop robust framework for securing IoT (Internet Things) network. this paper, Hadoop based proposed identify malicious traffic using modified Tomek-link under-sampling integrated with automated Hyper-parameter tuning machine learning classifiers. The novelty paper utilize big data platform benchmark datasets minimize computational time. loaded in Distributed...
Supervisory control and data acquisition (SCADA) networks for the remote operation of various industrial infrastructures are currently being used as main metropolitan infrastructures, especially smart grid power plants. Most existing SCADA have fortified securities because their powerful access based on closed private networks. However, recent frequently connected to IT-based systems also other conventional networks, in order achieve operational convenience systems, well execution...
In the next-generation intelligent power grid, known as smart various objects can access systems in several network environments, and, accordingly, control security becomes critical. Thus, to provide users with secure services a new model is needed. This paper proposes dynamic for user grid environment. The proposed analyzes user's contexts and chooses an appropriate context type among predefined types. And then it applies context-based policy allow dynamically. Therefore, provides stronger...
Due to advantages in enough number of channels and favorable bandwidth, 2.4 GHz ISM band is used as the most prevalent for IEEE802.15.4 LR-WPAN. However, there are an increasing other devices systems which may interfere with IEEE 802.15.4 communication. Therefore, coexistence issue one critical challenges 802.15.4. In this paper, we propose Adaptive Multi-Channel Utilization scheme (AMCU), enable a WPAN coexist interfering systems. By utilizing multiple dynamically, it possible that...