Skip to main navigation
Skip to search
Skip to main content
Korea University Home
Home
Profiles
Research Units
Research output
Press / Media
Search by expertise, name or affiliation
View Scopus Profile
Hoh In
Professor
Department of Computer Science and Engineering
Email
hoh_inkorea.ackr
1217
Citations
Source: Scopus
19
h-Index
Calculated based on no. of publications stored in Pure and citations from Scopus
1996 …
2022
Research activity per year
Overview
Fingerprint
Network
Research output
(137)
Similar Profiles
(6)
If you made any changes in Pure these will be visible here soon.
Fingerprint
Dive into the research topics where Hoh In is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Engineering & Materials Science
Ubiquitous computing
100%
Software engineering
99%
Mobile computing
79%
Costs
78%
Wireless networks
77%
Requirements engineering
75%
Life cycle
75%
Defects
70%
Video streaming
70%
Middleware
69%
Markov chains
69%
Internet
61%
Radio frequency identification (RFID)
59%
Web services
50%
Blockchain
50%
Visualization
48%
Quality of service
45%
Information systems
42%
Network security
42%
Botnet
42%
Testing
40%
Risk analysis
39%
Software quality
39%
Decision making
39%
Packet loss
39%
Forward error correction
39%
Metadata
38%
Students
38%
Servers
37%
Engineering education
37%
Industry
36%
Adaptive algorithms
36%
Risk management
35%
Communication
34%
Consumer electronics
34%
Cost benefit analysis
32%
Mobile ad hoc networks
31%
Cognitive radio
30%
Routers
30%
Routing protocols
29%
Embedded systems
27%
Internet of things
26%
Graphical user interfaces
26%
Engineers
25%
Access control
24%
Hardware-software codesign
24%
Sensors
24%
Simulators
23%
Hidden Markov models
23%
Monitoring
23%
Mathematics
Smart Home
69%
Network Security
55%
Resources
50%
Risk Analysis
48%
Situation Awareness
47%
Scenarios
42%
Ubiquitous Computing
41%
Model
39%
Information Systems
37%
Architecture
37%
Attack
37%
Video Streaming
34%
Requirements Elicitation
34%
Extreme Programming
34%
Methodology
34%
Hardware/software Co-design
33%
Mobile Computing
30%
Peer-to-peer Systems
30%
Service Management
29%
System Architecture
29%
Middleware
29%
Radio Frequency Identification
28%
Simulator
28%
Personalization
28%
Authorization
27%
Peer to Peer
26%
Vulnerability
26%
Packet Loss
26%
Prioritization
25%
Repository
25%
Circadian Rhythm
25%
Security Analysis
24%
Quality of Service
24%
Requirements
24%
Confidentiality
23%
Infrastructure
21%
Ground Water
21%
Risk Assessment
21%
Damage
21%
Transport Processes
21%
Wireless Networks
21%
Software
20%
Probabilistic Approach
19%
Robot
19%
Multi-criteria
19%
Policy
19%
Inconsistency
17%
Risk Management
17%
Model Checking
17%
Dynamic Environment
16%