Tai-hoon Kim

ORCID: 0000-0003-0117-8102
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Information and Cyber Security
  • Advanced Malware Detection Techniques
  • Chaos-based Image/Signal Encryption
  • Blockchain Technology Applications and Security
  • Cryptography and Data Security
  • IoT and Edge/Fog Computing
  • Advanced Steganography and Watermarking Techniques
  • Energy Efficient Wireless Sensor Networks
  • Smart Grid Security and Resilience
  • Internet Traffic Analysis and Secure E-voting
  • Innovation in Digital Healthcare Systems
  • Mobile Ad Hoc Networks
  • Technology and Data Analysis
  • Digital Media Forensic Detection
  • Privacy-Preserving Technologies in Data
  • Security in Wireless Sensor Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • User Authentication and Security Systems
  • Advanced Authentication Protocols Security
  • Cloud Data Security Solutions
  • Opportunistic and Delay-Tolerant Networks
  • Advanced Image and Video Retrieval Techniques
  • Image Retrieval and Classification Techniques
  • Spam and Phishing Detection

Chonnam National University
2023-2025

University of Tasmania
2013-2023

Konkuk University
2013-2023

Beijing Jiaotong University
2019-2023

Innovation Cluster (Canada)
2023

Sungshin Women's University
2013-2021

Lovely Professional University
2021

Universidade Federal do Piauí
2021

Charles Darwin University
2021

Edinburgh Napier University
2021

10.1016/j.future.2017.03.034 article EN Future Generation Computer Systems 2017-07-27

Transparent electronic materials are increasingly in demand for a variety of optoelectronic applications, ranging from passive transparent conductive windows to active thin-film transistors. BaSnO${}_{3}$ is semiconducting oxide with large band gap more than 3.1 eV. Recently, we discovered that doped few percent La exhibits an unusually high electrical mobility...

10.1103/physrevb.86.165205 article EN Physical Review B 2012-10-19

An edge detection is important for its reliability and security which delivers a better understanding of object recognition in the applications computer vision, such as pedestrian detection, face video surveillance. This paper introduced two fundamental limitations encountered detection: connectivity thickness, those have been used by various developments state-of-the-art. optimal selection threshold effectual has constantly key challenge vision. Therefore, robust algorithm using multiple...

10.1109/access.2019.2902579 article EN cc-by-nc-nd IEEE Access 2019-01-01

The Shipboard Automatic Identification System (AIS) is crucial for navigation safety and maritime surveillance, data mining pattern analysis of AIS information have attracted considerable attention in terms both basic research practical applications. Clustering spatio-temporal trajectories can be used to identify abnormal patterns mine customary route transportation safety. Thus, the capacities traffic monitoring could enhanced correspondingly. However, trajectory clustering often sensitive...

10.3390/s17081792 article EN cc-by Sensors 2017-08-04

In this paper, we discussed an efficient statistical method with proof-of-work consensus approach for cloud and fog computing. With method, solution precise probability in minimal time is realized. We have used the expectation maximization algorithm polynomial matrix factorization. The advantages of are less iteration to converge easiness configure complete mathematical model as per requirement. Moreover, energy memory consumption also which make appealing experimental results show that...

10.1109/jiot.2019.2911969 article EN IEEE Internet of Things Journal 2019-05-23

This paper proposes a new deep learning method, the greedy weighted dictionary for mobile multimedia medical diseases analysis. Based on traditional methods, which neglects relationship between sample and atom, we propose mechanism to connect with atom in this paper. Meanwhile, method is prone cause over-fitting patient classification of limited training data set. Therefore, adopts l <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sub> -norm...

10.1109/access.2018.2823979 article EN cc-by-nc-nd IEEE Access 2018-01-01

In this research paper, blockchain-based trust management model is proposed to enhance relationship among beacon nodes and eradicate malicious in Wireless Sensor Networks (WSNs). This composite evaluation involves behavioral-based as well data-based trust. Various metrics such closeness, honesty, intimacy frequency of interaction are taken into account compute nodes. Further, the (behavior data) value each broadcast Base Stations (BS) generate a blockchain values. Subsequently, discards node...

10.1109/access.2019.2960609 article EN cc-by IEEE Access 2019-01-01

The increasing number of connected devices in the era Internet Thing (IoT) has also increased intrusions. Intrusion Detection System (IDS) is a secondary intelligent system to monitor, detect, and alert about malicious activities; an Prevention (IPS) extension detection that triggers relevant action when attack suspected futuristic aspect. Both IDS IPS systems are significant useful for developing security model. Several studies exist review prevention models; however, coherence...

10.1109/access.2022.3220622 article EN cc-by IEEE Access 2022-01-01

Industrial Internet of Things (IIoTs) are the extensions (IoTs) and have paved way towards industry revolution 4.0. IIoT accelerates automation internal external working process including transport, manufacturing, marketing units with a number connected devices. Being extension IoT, it inherits insecurities technology; however, this sensor-configured infrastructure needs some extra effort to customize existing security solutions. In spite reconstructions models, scope improved developments...

10.1109/access.2021.3057766 article EN cc-by IEEE Access 2021-01-01

Abstract White blood cells (WBCs) play a vital role in immune responses against infections and foreign agents. Different WBC types exist, anomalies within them can indicate diseases like leukemia. Previous research suffers from limited accuracy inflated performance due to the usage of less important features. Moreover, these studies often focus on fewer types, exaggerating accuracy. This study addresses crucial task classifying using microscopic images. introduces novel approach extensive...

10.1038/s41598-024-52880-0 article EN cc-by Scientific Reports 2024-02-12

This research explores an innovative approach to segment hyperspectral images. Aclass-aware feature-based attention is combined with enhanced attention-based network, FAttNet proposed the images semantically. It introduced address challenges associated inaccurate edge segmentation, diverse forms of target inconsistency, and suboptimal predictive efficacy encountered in traditional segmentation networks when applied semantic tasks First, class-aware feature procedure used improve extraction...

10.1371/journal.pone.0309997 article EN cc-by PLoS ONE 2025-02-04

We studied the relationship between mobility and dislocation density for recently discovered high-mobility Ba0.96La0.04SnO3 thin-films found that carrier of film, as high 4.0×1020 cm−3 70 cm2 V−1s−1, respectively, decreased increased. determined values using transmission electron microscopy atomic force after surface etching. effect dislocations on was large, when compared with GaN a similar density. The importance scattering in perovskite structure is emphasized, especially...

10.1063/1.4812642 article EN Applied Physics Letters 2013-06-24

We studied the conduction mechanism in Sb-doped BaSnO3 epitaxial films, and compared its behavior with that of counterpart, La-doped BaSnO3. found electron mobility films was reduced by almost 7 times when dopant changed from La to Sb, despite little change effective mass carriers. This indicates scattering rate electrons system is strongly affected site at which dopants are located. More importantly, we threading dislocations also depends critically on site. propose large enhancement caused...

10.1063/1.4874895 article EN cc-by APL Materials 2014-05-01

Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially recent years. In some cases, AI learns alone from scratch and performs human tasks faster better than humans. With the advances AI, it is natural to wonder whether Neural Networks will be used successfully create or break cryptographic algorithms. Bibliographic review shows main approach this problem been addressed throughout complex Networks, but without understanding proving security of...

10.3390/s18051306 article EN cc-by Sensors 2018-04-24
Coming Soon ...