• 608 Citations
  • 10 h-Index
20062020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 608 Citations
  • 10 h-Index
  • 30 Conference contribution
  • 24 Article
  • 2 Conference article
  • 1 Paper
Filter
Conference contribution
2020

Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression

Hong, M. Y. & Yoon, J. W., 2020 Jan 1, Information Security Applications - 20th International Conference, WISA 2019, Revised Selected Papers. You, I. (ed.). Springer, p. 155-166 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11897 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2019

A Bitwise Logistic Regression Using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme

Yoo, J. S., Hwang, J. H., Song, B. K. & Yoon, J. W., 2019 Jan 1, Information Security Practice and Experience - 15th International Conference, ISPEC 2019, Proceedings. Heng, S-H. & Lopez, J. (eds.). Springer, p. 20-40 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11879 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A new bayesian approach to exploring damaged assets by monitoring mission failures caused by undetected attack

Shim, S. & Yoon, J. W., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 185-196 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Forecasting the Electric Network Frequency Signals on Power Grid

Bang, W. & Yoon, J. W., 2019 Oct, ICTC 2019 - 10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future. Institute of Electrical and Electronics Engineers Inc., p. 1218-1223 6 p. 8939676. (ICTC 2019 - 10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Logarithm design on encrypted data with bitwise operation

Yoo, J. S., Song, B. K. & Yoon, J. W., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 105-116 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Static Malware Analysis in Encrypted Domain

Hwang, T. & Yoon, J. W., 2019 Oct, ICTC 2019 - 10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future. Institute of Electrical and Electronics Engineers Inc., p. 47-52 6 p. 8939880. (ICTC 2019 - 10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

An Efficient Method for Securely Storing and Handling of Genomic Data

Ki, Y. & Yoon, J. W., 2018 Jun 21, Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017. Institute of Electrical and Electronics Engineers Inc., p. 121-125 5 p. (Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Model Parameter Estimation and Inference on Encrypted Domain: Application to Noise Reduction in Encrypted Images

Lee, S. & Yoon, J. W., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 115-126 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers

Kim, H., Kim, H. & Yoon, J. W., 2017 Jan 10, Proceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015. Institute of Electrical and Electronics Engineers Inc., p. 7-12 6 p. 7812939

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

A practical approach to constructing triple-blind review process with maximal anonymity and fairness

Jung, J., Kim, J. I. & Yoon, J. W., 2017, Information Security Applications - 17th International Workshop, WISA 2016, Revised Selected Papers. Springer Verlag, Vol. 10144 LNCS. p. 198-209 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10144 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Classification of home appliance by using Probabilistic KNN with sensor data

Kang, S. & Yoon, J. W., 2017 Jan 17, 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2016. Institute of Electrical and Electronics Engineers Inc., 7820745

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Construction of a national scale ENF map using online multimedia data

Kim, H., Jeon, Y. & Yoon, J. W., 2017 Nov 6, CIKM 2017 - Proceedings of the 2017 ACM Conference on Information and Knowledge Management. Association for Computing Machinery, p. 19-28 10 p. (International Conference on Information and Knowledge Management, Proceedings; vol. Part F131841).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Side channel attack on digital door lock with vibration signal analysis: Longer password does not guarantee higher security level

Ha, Y., Jang, S. H., Kim, K. W. & Yoon, J. W., 2017 Dec 7, MFI 2017 - 2017 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-November. p. 103-110 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2016

An adaptive approximation for Gaussian wavelet kernel

Ha, Y. M. & Yoon, J. W., 2016 Mar 1, International Conference on Advanced Communication Technology, ICACT. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-March. p. 576-580 5 p. 7423478

Research output: Chapter in Book/Report/Conference proceedingConference contribution

An efficient geometric shape coding and representation approach to obtain both skeleton and contours

Yoon, J. W., 2016 Jan 4, ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. Association for Computing Machinery, Inc, a4

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Honey chatting: A novel instant messaging system robust to eavesdropping over communication

Kim, J. I. & Yoon, J. W., 2016 May 18, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-May. p. 2184-2188 5 p. 7472064

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Various threat models to circumvent air-gapped systems for preventing network attack

Lee, E., Kim, H. & Yoon, J. W., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9503. p. 187-199 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)
2015

A simple sequential outlier detection with several residuals

Yoon, J. W., 2015 Dec 22, 2015 23rd European Signal Processing Conference, EUSIPCO 2015. Institute of Electrical and Electronics Engineers Inc., p. 2351-2355 5 p. 7362805

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Passing go with DNA sequencing: Delivering messages in a covert transgenic channel

Chun, J. Y., Lee, H. L. & Yoon, J. W., 2015 Jul 17, Proceedings - 2015 IEEE Security and Privacy Workshops, SPW 2015. Institute of Electrical and Electronics Engineers Inc., p. 17-26 10 p. 7163204

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Visual honey encryption: Application to steganography

Yoon, J. W., Kim, H., Jo, H. J., Lee, H. & Lee, K., 2015 Jun 17, IH and MMSec 2015 - Proceedings of the 2015 ACM Workshop on Information Hiding and Multimedia Security. Association for Computing Machinery, Inc, p. 65-74 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)
2012

Bayesian implementation of a Lagrangian macroscopic traffic flow model

Yoon, J. W. & Tchrakian, T. T., 2012, ICPR 2012 - 21st International Conference on Pattern Recognition. p. 214-217 4 p. 6460110. (Proceedings - International Conference on Pattern Recognition).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bayesian separation of wind power generation signals

Yoon, J. W., Fusco, F. & Wurst, M., 2012, ICPR 2012 - 21st International Conference on Pattern Recognition. p. 2660-2663 4 p. 6460713. (Proceedings - International Conference on Pattern Recognition).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cityride: A predictive bike sharing journey advisor

Yoon, J. W., Pinelli, F. & Calabrese, F., 2012, Proceedings - 2012 IEEE 13th International Conference on Mobile Data Management, MDM 2012. p. 306-311 6 p. 6341407. (Proceedings - 2012 IEEE 13th International Conference on Mobile Data Management, MDM 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

58 Citations (Scopus)

Mining residential household information from low-resolution smart meter data

Fusco, F., Wurst, M. & Yoon, J., 2012, ICPR 2012 - 21st International Conference on Pattern Recognition. p. 3545-3548 4 p. 6460930. (Proceedings - International Conference on Pattern Recognition).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Predicting arrival times of buses using real-time GPS measurements

Sinn, M., Yoon, J. W., Calabrese, F. & Bouillet, E., 2012, 2012 15th International IEEE Conference on Intelligent Transportation Systems, ITSC 2012. p. 1227-1232 6 p. 6338767. (IEEE Conference on Intelligent Transportation Systems, Proceedings, ITSC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

32 Citations (Scopus)
2011

Effective measurement selection in truncated kernel density estimator: Voronoi mean shift algorithm for truncated kernels

Yoon, J. W., Lee, H. J. & Kim, H., 2011, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 57. (Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2010

Improved mean shift algorithm with heterogeneous node weights

Yoon, J. W. & Wilson, S. P., 2010, Proceedings - 2010 20th International Conference on Pattern Recognition, ICPR 2010. p. 4222-4225 4 p. 5597740. (Proceedings - International Conference on Pattern Recognition).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2009

A new collision-free pseudonym scheme in mobile ad hoc networks

Yoon, J. W. & Kim, H., 2009, Final Proceedings of the 2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2009. 5291612. (Final Proceedings of the 2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)
2008

Adaptive classification by hybrid EKF with truncated filtering: Brain computer interfacing

Yoon, J. W., Roberts, S. J., Dyson, M. & Gan, J. Q., 2008, Intelligent Data Engineering and Automated Learning - IDEAL 2008 - 9th International Conference, Proceedings. p. 370-377 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5326 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)
2007

Bayesian inference for 2D gel electrophoresis image analysis

Yoon, J. W., Godsill, S. J., Kang, C. H. & Kim, T. S., 2007, Bioinformatics Research and Development - First International Conference, BIRD 2007 Proceedings. Springer Verlag, p. 343-356 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4414 LNBI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)