If you made any changes in Pure these will be visible here soon.

Research Output 2006 2019

  • 574 Citations
  • 10 h-Index
  • 29 Conference contribution
  • 24 Article
Filter
Conference contribution
2019

A Bitwise Logistic Regression Using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme

Yoo, J. S., Hwang, J. H., Song, B. K. & Yoon, J. W., 2019 Jan 1, Information Security Practice and Experience - 15th International Conference, ISPEC 2019, Proceedings. Heng, S-H. & Lopez, J. (eds.). Springer, p. 20-40 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11879 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Homomorphic Encryption
Logistic Regression
Cryptography
Logistics
Division

A new bayesian approach to exploring damaged assets by monitoring mission failures caused by undetected attack

Shim, S. & Yoon, J. W., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 185-196 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bayesian networks
Bayesian Approach
Computer systems
Attack
Monitoring
1 Citation (Scopus)

Logarithm design on encrypted data with bitwise operation

Yoo, J. S., Song, B. K. & Yoon, J. W., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 105-116 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Logarithm
Cryptography
Homomorphic Encryption
Privacy Preserving
Taylor Expansion
2018

An Efficient Method for Securely Storing and Handling of Genomic Data

Ki, Y. & Yoon, J. W., 2018 Jun 21, Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017. Institute of Electrical and Electronics Engineers Inc., p. 121-125 5 p. (Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing

Model Parameter Estimation and Inference on Encrypted Domain: Application to Noise Reduction in Encrypted Images

Lee, S. & Yoon, J. W., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 115-126 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Homomorphic Encryption
Noise Reduction
Noise abatement
Parameter estimation
Cryptography
2017
1 Citation (Scopus)

A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers

Kim, H., Kim, H. & Yoon, J. W., 2017 Jan 10, Proceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015. Institute of Electrical and Electronics Engineers Inc., p. 7-12 6 p. 7812939

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry

A practical approach to constructing triple-blind review process with maximal anonymity and fairness

Jung, J., Kim, J. I. & Yoon, J. W., 2017, Information Security Applications - 17th International Workshop, WISA 2016, Revised Selected Papers. Springer Verlag, Vol. 10144 LNCS. p. 198-209 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10144 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Anonymity
Fairness
Disclosure
Learning systems
Machine Learning
4 Citations (Scopus)

Classification of home appliance by using Probabilistic KNN with sensor data

Kang, S. & Yoon, J. W., 2017 Jan 17, 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2016. Institute of Electrical and Electronics Engineers Inc., 7820745

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Domestic appliances
Monitoring
Sensors
Atmospheric humidity
Temperature
1 Citation (Scopus)

Construction of a national scale ENF map using online multimedia data

Kim, H., Jeon, Y. & Yoon, J. W., 2017 Nov 6, CIKM 2017 - Proceedings of the 2017 ACM Conference on Information and Knowledge Management. Association for Computing Machinery, Vol. Part F131841. p. 19-28 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Multimedia
Grid
Uncertainty
Build-to-order
Evaluation
1 Citation (Scopus)

Side channel attack on digital door lock with vibration signal analysis: Longer password does not guarantee higher security level

Ha, Y., Jang, S. H., Kim, K. W. & Yoon, J. W., 2017 Dec 7, MFI 2017 - 2017 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-November. p. 103-110 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Signal analysis
Security systems
Experiments
Side channel attack
2016

An adaptive approximation for Gaussian wavelet kernel

Ha, Y. M. & Yoon, J. W., 2016 Mar 1, International Conference on Advanced Communication Technology, ICACT. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-March. p. 576-580 5 p. 7423478

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electricity
Big data

An efficient geometric shape coding and representation approach to obtain both skeleton and contours

Yoon, J. W., 2016 Jan 4, ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. Association for Computing Machinery, Inc, a4

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data structures
4 Citations (Scopus)

Honey chatting: A novel instant messaging system robust to eavesdropping over communication

Kim, J. I. & Yoon, J. W., 2016 May 18, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-May. p. 2184-2188 5 p. 7472064

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Communication
Entropy
Experiments
10 Citations (Scopus)

Various threat models to circumvent air-gapped systems for preventing network attack

Lee, E., Kim, H. & Yoon, J. W., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9503. p. 187-199 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Covert Channel
Attack
Microphones
Air
Acoustics
2015

A simple sequential outlier detection with several residuals

Yoon, J. W., 2015 Dec 22, 2015 23rd European Signal Processing Conference, EUSIPCO 2015. Institute of Electrical and Electronics Engineers Inc., p. 2351-2355 5 p. 7362805

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Signal systems
Time series

Passing go with DNA sequencing: Delivering messages in a covert transgenic channel

Chun, J. Y., Lee, H. L. & Yoon, J. W., 2015 Jul 17, Proceedings - 2015 IEEE Security and Privacy Workshops, SPW 2015. Institute of Electrical and Electronics Engineers Inc., p. 17-26 10 p. 7163204

Research output: Chapter in Book/Report/Conference proceedingConference contribution

DNA
Genetic engineering
Steganography
Screening
Control systems
4 Citations (Scopus)

Visual honey encryption: Application to steganography

Yoon, J. W., Kim, H., Jo, H. J., Lee, H. & Lee, K., 2015 Jun 17, IH and MMSec 2015 - Proceedings of the 2015 ACM Workshop on Information Hiding and Multimedia Security. Association for Computing Machinery, Inc, p. 65-74 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Cryptography
2012

Bayesian implementation of a Lagrangian macroscopic traffic flow model

Yoon, J. W. & Tchrakian, T. T., 2012 Dec 1, Proceedings - International Conference on Pattern Recognition. p. 214-217 4 p. 6460110

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Flow simulation
State estimation

Bayesian separation of wind power generation signals

Yoon, J. W., Fusco, F. & Wurst, M., 2012 Dec 1, Proceedings - International Conference on Pattern Recognition. p. 2660-2663 4 p. 6460713

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wind power
Power generation
Source separation
Energy utilization
Electricity
50 Citations (Scopus)

Cityride: A predictive bike sharing journey advisor

Yoon, J. W., Pinelli, F. & Calabrese, F., 2012 Dec 13, Proceedings - 2012 IEEE 13th International Conference on Mobile Data Management, MDM 2012. p. 306-311 6 p. 6341407

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Travel time
Availability
9 Citations (Scopus)

Mining residential household information from low-resolution smart meter data

Fusco, F., Wurst, M. & Yoon, J. W., 2012 Dec 1, Proceedings - International Conference on Pattern Recognition. p. 3545-3548 4 p. 6460930

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smart meters
Electric power utilization
Electricity
Education
Sampling
27 Citations (Scopus)

Predicting arrival times of buses using real-time GPS measurements

Sinn, M., Yoon, J. W., Calabrese, F. & Bouillet, E., 2012 Dec 21, IEEE Conference on Intelligent Transportation Systems, Proceedings, ITSC. p. 1227-1232 6 p. 6338767

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Global positioning system
Bus transportation
Intelligent buildings
Linear regression
Interpolation
2011
1 Citation (Scopus)

Effective measurement selection in truncated kernel density estimator: Voronoi mean shift algorithm for truncated kernels

Yoon, J. W., Lee, H. J. & Kim, H., 2011 May 20, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 57

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Clustering algorithms
Computer vision
2010
2 Citations (Scopus)

Improved mean shift algorithm with heterogeneous node weights

Yoon, J. W. & Wilson, S. P., 2010 Nov 18, Proceedings - International Conference on Pattern Recognition. p. 4222-4225 4 p. 5597740

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Triangulation
Bandwidth
2009
3 Citations (Scopus)

A new collision-free pseudonym scheme in mobile ad hoc networks

Yoon, J. W. & Kim, H., 2009 Dec 1, Final Proceedings of the 2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2009. 5291612

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile ad hoc networks
Radio transmission
Hash functions
Communication
Computational complexity
2008
5 Citations (Scopus)

Adaptive classification by hybrid EKF with truncated filtering: Brain computer interfacing

Yoon, J. W., Roberts, S. J., Dyson, M. & Gan, J. Q., 2008 Dec 31, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5326 LNCS. p. 370-377 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5326 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Extended Kalman filters
Kalman Filter
Brain
Filtering
Robust Algorithm
8 Citations (Scopus)

Sequential Bayesian estimation for adaptive classification

Yoon, J. W., Roberts, S. J., Dyson, M. & Gan, J. Q., 2008 Dec 1, IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems. p. 601-605 5 p. 4648010

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Extended Kalman filters
Electroencephalography
2007
10 Citations (Scopus)

Bayesian inference for 2D gel electrophoresis image analysis

Yoon, J. W., Godsill, S. J., Kang, C. & Kim, T. S., 2007 Aug 27, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4414 LNBI. p. 343-356 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electrophoresis, Gel, Two-Dimensional
Bayesian inference
Electrophoresis
Image Analysis
Image analysis
2006
7 Citations (Scopus)

Bayesian inference for multidimensional NMR image reconstruction

Yoon, J. W. & Godsill, S. J., 2006, European Signal Processing Conference.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Image reconstruction
Nuclear magnetic resonance
Markov processes
Statistical methods
Proteins