If you made any changes in Pure these will be visible here soon.

Research Output 2006 2019

  • 574 Citations
  • 10 h-Index
  • 29 Conference contribution
  • 24 Article
2019

A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms

Song, B. K., Yoo, J. S., Hong, M. & Yoon, J. W., 2019 Jan 1, In : Security and Communication Networks. 2019, 3648671.

Research output: Contribution to journalArticle

Open Access
Cryptography
Data mining
Logic design
Cloud computing

A Bitwise Logistic Regression Using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme

Yoo, J. S., Hwang, J. H., Song, B. K. & Yoon, J. W., 2019 Jan 1, Information Security Practice and Experience - 15th International Conference, ISPEC 2019, Proceedings. Heng, S-H. & Lopez, J. (eds.). Springer, p. 20-40 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11879 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Homomorphic Encryption
Logistic Regression
Cryptography
Logistics
Division

A new bayesian approach to exploring damaged assets by monitoring mission failures caused by undetected attack

Shim, S. & Yoon, J. W., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 185-196 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bayesian networks
Bayesian Approach
Computer systems
Attack
Monitoring
1 Citation (Scopus)

Logarithm design on encrypted data with bitwise operation

Yoo, J. S., Song, B. K. & Yoon, J. W., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 105-116 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Logarithm
Cryptography
Homomorphic Encryption
Privacy Preserving
Taylor Expansion

Power grid estimation using electric network frequency signals

Bang, W. & Yoon, J. W., 2019 Jan 1, In : Security and Communication Networks. 2019, 1982168.

Research output: Contribution to journalArticle

Open Access
Circuit theory
Feature extraction
Microphones
Electromagnetic fields
2018

An Efficient Method for Securely Storing and Handling of Genomic Data

Ki, Y. & Yoon, J. W., 2018 Jun 21, Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017. Institute of Electrical and Electronics Engineers Inc., p. 121-125 5 p. (Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing

Model Parameter Estimation and Inference on Encrypted Domain: Application to Noise Reduction in Encrypted Images

Lee, S. & Yoon, J. W., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 115-126 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Homomorphic Encryption
Noise Reduction
Noise abatement
Parameter estimation
Cryptography
2017
1 Citation (Scopus)

A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers

Kim, H., Kim, H. & Yoon, J. W., 2017 Jan 10, Proceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015. Institute of Electrical and Electronics Engineers Inc., p. 7-12 6 p. 7812939

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry

A practical approach to constructing triple-blind review process with maximal anonymity and fairness

Jung, J., Kim, J. I. & Yoon, J. W., 2017, Information Security Applications - 17th International Workshop, WISA 2016, Revised Selected Papers. Springer Verlag, Vol. 10144 LNCS. p. 198-209 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10144 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Anonymity
Fairness
Disclosure
Learning systems
Machine Learning
4 Citations (Scopus)

Classification of home appliance by using Probabilistic KNN with sensor data

Kang, S. & Yoon, J. W., 2017 Jan 17, 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2016. Institute of Electrical and Electronics Engineers Inc., 7820745

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Domestic appliances
Monitoring
Sensors
Atmospheric humidity
Temperature
1 Citation (Scopus)

Construction of a national scale ENF map using online multimedia data

Kim, H., Jeon, Y. & Yoon, J. W., 2017 Nov 6, CIKM 2017 - Proceedings of the 2017 ACM Conference on Information and Knowledge Management. Association for Computing Machinery, Vol. Part F131841. p. 19-28 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Multimedia
Grid
Uncertainty
Build-to-order
Evaluation
1 Citation (Scopus)

Side channel attack on digital door lock with vibration signal analysis: Longer password does not guarantee higher security level

Ha, Y., Jang, S. H., Kim, K. W. & Yoon, J. W., 2017 Dec 7, MFI 2017 - 2017 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-November. p. 103-110 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Signal analysis
Security systems
Experiments
Side channel attack

The Vulnerability Exploitation Conveying Digital Data Over Mobile Voice Call Channels

Lee, S., Ha, Y., Yoon, S., Jo, H., Jang, S., Lee, J., Kim, Y. & Yoon, J. W., 2017 May 25, (Accepted/In press) In : Wireless Personal Communications. p. 1-28 28 p.

Research output: Contribution to journalArticle

Conveying
Loss prevention
Leakage (fluid)
Industry
Image reconstruction
2016

An adaptive approximation for Gaussian wavelet kernel

Ha, Y. M. & Yoon, J. W., 2016 Mar 1, International Conference on Advanced Communication Technology, ICACT. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-March. p. 576-580 5 p. 7423478

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electricity
Big data

An efficient geometric shape coding and representation approach to obtain both skeleton and contours

Yoon, J. W., 2016 Jan 4, ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. Association for Computing Machinery, Inc, a4

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data structures

A new Bayesian edge-linking algorithm using single-target tracking techniques

Yoon, J. W., 2016, In : Symmetry. 8, 12, 143.

Research output: Contribution to journalArticle

Target Tracking
Target tracking
Linking
Edge detection
Object Tracking

Bayesian interpretation to generalize adaptive mean shift algorithm

Yoon, J. W., 2016 Apr 30, In : Journal of Intelligent and Fuzzy Systems. 30, 6, p. 3583-3592 10 p.

Research output: Contribution to journalArticle

Mean Shift
Generalise
Kernel Density Estimation
Posterior distribution
Bandwidth
4 Citations (Scopus)

Honey chatting: A novel instant messaging system robust to eavesdropping over communication

Kim, J. I. & Yoon, J. W., 2016 May 18, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-May. p. 2184-2188 5 p. 7472064

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Communication
Entropy
Experiments
10 Citations (Scopus)

Various threat models to circumvent air-gapped systems for preventing network attack

Lee, E., Kim, H. & Yoon, J. W., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9503. p. 187-199 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Covert Channel
Attack
Microphones
Air
Acoustics
2015
7 Citations (Scopus)
Cryptography
Distributed computer systems
Parallel processing systems
Big data
Costs

A novel statistical approach to detect card frauds using transaction patterns

Lee, C. C. & Yoon, J. W., 2015 Mar 1, In : IEICE Transactions on Information and Systems. E98D, 3, p. 649-660 12 p.

Research output: Contribution to journalArticle

A simple sequential outlier detection with several residuals

Yoon, J. W., 2015 Dec 22, 2015 23rd European Signal Processing Conference, EUSIPCO 2015. Institute of Electrical and Electronics Engineers Inc., p. 2351-2355 5 p. 7362805

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Signal systems
Time series
8 Citations (Scopus)

Efficient model selection for probabilistic K nearest neighbour classification

Yoon, J. W. & Friel, N., 2015 Feb 3, In : Neurocomputing. 149, PB, p. 1098-1108 11 p.

Research output: Contribution to journalArticle

Statistical Models
Uncertainty
Approximation algorithms
Learning systems
Decision Making

Erratum: A novel statistical approach to detect card frauds using transaction patterns

Lee, C. C. & Yoon, J. W., 2015 Apr 1, In : IEICE Transactions on Information and Systems. E98D, 4, p. 999 1 p.

Research output: Contribution to journalArticle

Model selection for mixture model via integrated nested Laplace approximation

Yoon, J. W., 2015 Mar 19, In : Electronics Letters. 51, 6, p. 484-486 3 p.

Research output: Contribution to journalArticle

Heuristic algorithms
Probability density function
Monte Carlo simulation

Passing go with DNA sequencing: Delivering messages in a covert transgenic channel

Chun, J. Y., Lee, H. L. & Yoon, J. W., 2015 Jul 17, Proceedings - 2015 IEEE Security and Privacy Workshops, SPW 2015. Institute of Electrical and Electronics Engineers Inc., p. 17-26 10 p. 7163204

Research output: Chapter in Book/Report/Conference proceedingConference contribution

DNA
Genetic engineering
Steganography
Screening
Control systems
4 Citations (Scopus)

Visual honey encryption: Application to steganography

Yoon, J. W., Kim, H., Jo, H. J., Lee, H. & Lee, K., 2015 Jun 17, IH and MMSec 2015 - Proceedings of the 2015 ACM Workshop on Information Hiding and Multimedia Security. Association for Computing Machinery, Inc, p. 65-74 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Cryptography
2014

Bayesian reconstruction of projection reconstruction NMR (PR-NMR)

Yoon, J. W., 2014 Nov 1, In : Computers in Biology and Medicine. 54, p. 89-99 11 p.

Research output: Contribution to journalArticle

Markov Chains
Nuclear magnetic resonance
Linear Models
Markov processes
Magnetic Resonance Spectroscopy
5 Citations (Scopus)

Statistical denoising scheme for single molecule fluorescence microscopic images

Yoon, J. W., 2014 Mar 1, In : Biomedical Signal Processing and Control. 10, 1, p. 11-20 10 p.

Research output: Contribution to journalArticle

Noise
Fluorescence
Molecules
Signal-To-Noise Ratio
Pixels
2012

Bayesian implementation of a Lagrangian macroscopic traffic flow model

Yoon, J. W. & Tchrakian, T. T., 2012 Dec 1, Proceedings - International Conference on Pattern Recognition. p. 214-217 4 p. 6460110

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Flow simulation
State estimation

Bayesian separation of wind power generation signals

Yoon, J. W., Fusco, F. & Wurst, M., 2012 Dec 1, Proceedings - International Conference on Pattern Recognition. p. 2660-2663 4 p. 6460713

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wind power
Power generation
Source separation
Energy utilization
Electricity
50 Citations (Scopus)

Cityride: A predictive bike sharing journey advisor

Yoon, J. W., Pinelli, F. & Calabrese, F., 2012 Dec 13, Proceedings - 2012 IEEE 13th International Conference on Mobile Data Management, MDM 2012. p. 306-311 6 p. 6341407

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Travel time
Availability
9 Citations (Scopus)

Mining residential household information from low-resolution smart meter data

Fusco, F., Wurst, M. & Yoon, J. W., 2012 Dec 1, Proceedings - International Conference on Pattern Recognition. p. 3545-3548 4 p. 6460930

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smart meters
Electric power utilization
Electricity
Education
Sampling
9 Citations (Scopus)

Network analysis of temporal trends in scholarly research productivity

Kim, H., Yoon, J. W. & Crowcroft, J., 2012 Jan 1, In : Journal of Informetrics. 6, 1, p. 97-110 14 p.

Research output: Contribution to journalArticle

Network Analysis
Electric network analysis
Productivity
Output
Empirical Analysis
27 Citations (Scopus)

Predicting arrival times of buses using real-time GPS measurements

Sinn, M., Yoon, J. W., Calabrese, F. & Bouillet, E., 2012 Dec 21, IEEE Conference on Intelligent Transportation Systems, Proceedings, ITSC. p. 1227-1232 6 p. 6338767

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Global positioning system
Bus transportation
Intelligent buildings
Linear regression
Interpolation
2011
2 Citations (Scopus)

A perfect collision-free pseudonym system

Yoon, J. W. & Kim, H., 2011 Jun 1, In : IEEE Communications Letters. 15, 6, p. 686-688 3 p., 5752795.

Research output: Contribution to journalArticle

Collision
Communication
Permutation
Anonymity
Randomness
7 Citations (Scopus)

Bayesian inference for an adaptive Ordered Probit model: An application to Brain Computer Interfacing

Yoon, J. W., Roberts, S. J., Dyson, M. & Gan, J. Q., 2011 Sep 1, In : Neural Networks. 24, 7, p. 726-734 9 p.

Research output: Contribution to journalArticle

Labels
Brain
Computer Systems
Extended Kalman filters
Labeling
1 Citation (Scopus)

Effective measurement selection in truncated kernel density estimator: Voronoi mean shift algorithm for truncated kernels

Yoon, J. W., Lee, H. J. & Kim, H., 2011 May 20, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 57

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Clustering algorithms
Computer vision
2010
2 Citations (Scopus)

A highly efficient blocked Gibbs sampler reconstruction of multidimensional NMR spectra

Yoon, J. W., Wilson, S. P. & Mok, K. H., 2010 Dec 1, In : Journal of Machine Learning Research. 9, p. 940-947 8 p.

Research output: Contribution to journalArticle

Gibbs Sampler
Nuclear magnetic resonance
Projection
Nuclear Magnetic Resonance
Statistical method
110 Citations (Scopus)

An image encryption scheme with a pseudorandom permutation based on chaotic maps

Yoon, J. W. & Kim, H., 2010 Dec 1, In : Communications in Nonlinear Science and Numerical Simulation. 15, 12, p. 3998-4006 9 p.

Research output: Contribution to journalArticle

Image Encryption
Chaotic Map
Cryptography
Permutation
Permutation Matrix
38 Citations (Scopus)

Hybrid spam filtering for mobile communication

Yoon, J. W., Kim, H. & Huh, J. H., 2010 Jun 1, In : Computers and Security. 29, 4, p. 446-459 14 p.

Research output: Contribution to journalArticle

communication
Communication
Classifiers
traffic
threat
2 Citations (Scopus)

Improved mean shift algorithm with heterogeneous node weights

Yoon, J. W. & Wilson, S. P., 2010 Nov 18, Proceedings - International Conference on Pattern Recognition. p. 4222-4225 4 p. 5597740

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Triangulation
Bandwidth
6 Citations (Scopus)

Robust measurement validation in target tracking using geometric structure

Yoon, J. W. & Roberts, S. J., 2010 Apr 15, In : IEEE Signal Processing Letters. 17, 5, p. 493-496 4 p., 5401060.

Research output: Contribution to journalArticle

Target Tracking
Geometric Structure
Target tracking
Voronoi
Voronoi Diagram
2009
23 Citations (Scopus)

Adaptive classification for Brain Computer Interface systems using Sequential Monte Carlo sampling

Yoon, J. W., Roberts, S. J., Dyson, M. & Gan, J. Q., 2009 Nov 1, In : Neural Networks. 22, 9, p. 1286-1294 9 p.

Research output: Contribution to journalArticle

Brain-Computer Interfaces
Brain computer interface
Computer Systems
Labels
Brain
3 Citations (Scopus)

A new collision-free pseudonym scheme in mobile ad hoc networks

Yoon, J. W. & Kim, H., 2009 Dec 1, Final Proceedings of the 2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2009. 5291612

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile ad hoc networks
Radio transmission
Hash functions
Communication
Computational complexity
57 Citations (Scopus)

DySCo: quantitating associations of membrane proteins using two-color single-molecule tracking.

Dunne, P. D., Fernandes, R. A., McColl, J., Yoon, J. W., James, J. R., Davis, S. J. & Klenerman, D., 2009 Aug 19, In : Biophysical Journal. 97, 4

Research output: Contribution to journalArticle

Cytoskeleton
Membrane Proteins
Color
Proteins
2008
5 Citations (Scopus)

Adaptive classification by hybrid EKF with truncated filtering: Brain computer interfacing

Yoon, J. W., Roberts, S. J., Dyson, M. & Gan, J. Q., 2008 Dec 31, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5326 LNCS. p. 370-377 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5326 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Extended Kalman filters
Kalman Filter
Brain
Filtering
Robust Algorithm
37 Citations (Scopus)

Bayesian inference for improved single molecule fluorescence tracking

Yoon, J. W., Bruckbauer, A., Fitzgerald, W. J. & Klenerman, D., 2008 Jun 15, In : Biophysical Journal. 94, 12, p. 4932-4947 16 p.

Research output: Contribution to journalArticle

Photobleaching
Blinking
Fluorescence
Monte Carlo Method
Lipids
8 Citations (Scopus)

Sequential Bayesian estimation for adaptive classification

Yoon, J. W., Roberts, S. J., Dyson, M. & Gan, J. Q., 2008 Dec 1, IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems. p. 601-605 5 p. 4648010

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Extended Kalman filters
Electroencephalography
2007
10 Citations (Scopus)

Bayesian inference for 2D gel electrophoresis image analysis

Yoon, J. W., Godsill, S. J., Kang, C. & Kim, T. S., 2007 Aug 27, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4414 LNBI. p. 343-356 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electrophoresis, Gel, Two-Dimensional
Bayesian inference
Electrophoresis
Image Analysis
Image analysis