default search action
Jaewook Jung
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j22]Jaewook Jung, Jungsuk Baik, Youngwook Kim, Hea-Sook Park, Jong-Moon Chung:
OTOP: Optimized Transmission Power Controlled OBSS PD-Based Spatial Reuse for High Throughput in IEEE 802.11be WLANs. IEEE Internet Things J. 10(19): 17110-17123 (2023) - [j21]Jaewook Jung, Changsung Lee, Jungsuk Baik, Jong-Moon Chung:
REVeno: RTT Estimation Based Multipath TCP in 5G Multi-RAT Networks. IEEE Trans. Mob. Comput. 22(9): 5479-5491 (2023) - [j20]Wonsuk Yoo, Jusik Yun, Jaewook Jung, Giyoung Hwang, Jong-Moon Chung:
Optimized Resource Utilization Scheme for Real-Time V2V Sidelink Unicast Communication in 5G Networks. IEEE Wirel. Commun. Lett. 12(10): 1721-1725 (2023) - 2022
- [j19]Changsung Lee, Jaewook Jung, Jong-Moon Chung:
Intelligent Dual Active Protocol Stack Handover Based on Double DQN Deep Reinforcement Learning for 5G mmWave Networks. IEEE Trans. Veh. Technol. 71(7): 7572-7584 (2022) - [j18]Jungsuk Baik, Changsung Lee, Jaewook Jung, Jong-Moon Chung:
5G mmWave Multiple Active Protocol Stack Optimized Deep Learning Handover. IEEE Wirel. Commun. Lett. 11(11): 2265-2269 (2022) - 2021
- [j17]Changsung Lee, Jaewook Jung, Jong-Moon Chung:
DEFT: Multipath TCP for High Speed Low Latency Communications in 5G Networks. IEEE Trans. Mob. Comput. 20(12): 3311-3323 (2021) - 2019
- [j16]Sooeun Song, Jaewook Jung, Minsu Choi, Changsung Lee, Jungkyu Sun, Jong-Moon Chung:
Multipath Based Adaptive Concurrent Transfer for Real-Time Video Streaming Over 5G Multi-RAT Systems. IEEE Access 7: 146470-146479 (2019) - [j15]Leihan Chen, Jaewook Jung, Gunho Sohn:
Multi-Scale Hierarchical CRF for Railway Electrification Asset Classification From Mobile Laser Scanning Data. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 12(8): 3131-3148 (2019) - 2018
- [j14]Dongwoo Kang, Jaewook Jung, Hyoungshick Kim, Youngsook Lee, Dongho Won:
Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity. Secur. Commun. Networks 2018: 9046064:1-9046064:14 (2018) - 2017
- [j13]Jongho Moon, Donghoon Lee, Jaewook Jung, Dongho Won:
Improvement of Efficient and Secure Smart Card Based Password Authentication Scheme. Int. J. Netw. Secur. 19(6): 1053-1061 (2017) - [j12]Jaewook Jung, Jongho Moon, Dongho Won:
Robust Biometric-based Anonymous User Authenticated Key Agreement Scheme for Telecare Medicine Information Systems. KSII Trans. Internet Inf. Syst. 11(7): 3720-3746 (2017) - [j11]Jaewook Jung, Yoonseok Jwa, Gunho Sohn:
Implicit Regularization for Reconstructing 3D Building Rooftop Models Using Airborne LiDAR Data. Sensors 17(3): 621 (2017) - [j10]Jaewook Jung, Jongho Moon, Donghoon Lee, Dongho Won:
Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks. Sensors 17(3): 644 (2017) - 2016
- [j9]Donghoon Lee, Jaewook Jung, Younsung Choi, Dongho Won:
Improvement and Weakness of Zero-Sum Defender against Return-Oriented Programming Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(12): 2585-2590 (2016) - [j8]Jiye Kim, Jongho Moon, Jaewook Jung, Dongho Won:
Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks. J. Sensors 2016: 4393721:1-4393721:17 (2016) - [j7]Jaewook Jung, Leihan Chen, Gunho Sohn, Chao Luo, Jong-Un Won:
Multi-Range Conditional Random Field for Classifying Railway Electrification System Objects Using Mobile Laser Scanning Data. Remote. Sens. 8(12): 1008 (2016) - [j6]Dongwoo Kang, Jaewook Jung, Jongho Mun, Donghoon Lee, Younsung Choi, Dongho Won:
Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain. Secur. Commun. Networks 9(11): 1462-1476 (2016) - [j5]Jaewook Jung, Gunho Sohn, Ki-In Bang, Andreas Wichmann, Costas Armenakis, Martin Kada:
Matching Aerial Images to 3D Building Models Using Context-Based Geometric Hashing. Sensors 16(6): 932 (2016) - [j4]Jaewook Jung, Jiye Kim, Younsung Choi, Dongho Won:
An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks. Sensors 16(8): 1299 (2016) - 2014
- [j3]Younsung Choi, Donghoon Lee, Jiye Kim, Jaewook Jung, Junghyun Nam, Dongho Won:
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography. Sensors 14(6): 10081-10106 (2014) - 2010
- [j2]Jaewook Jung, Hanbit Park, Shin Kang, Seungwoo Lee, Minsoo Hahn:
Measurement of initial motion of a flying golf ball with multi-exposure images for screen-golf. IEEE Trans. Consumer Electron. 56(2): 516-523 (2010) - 2008
- [j1]Giovanna Di Marzo Serugendo, Alfredo A. Villalba Castro, Dimitri Konstantas, Liu Liang, Duan Zheng-yu, G. S. Thyagaraju, Umakanth P. Kulkarni, Anil R. Yardi, Gonzalo Huerta Cánepa, Angel Jiménez Molina, In-Young Ko, Dongman Lee, Jaewook Jung, Youngjae Kim, Minsoo Hahn, Tatsuya Yamazaki, Tetsuo Toyomura, Takashi Matsuyama, D. B. Kulkarni:
Activity-Based Computing. IEEE Pervasive Comput. 7(2): 58-61 (2008)
Conference and Workshop Papers
- 2022
- [c15]Yunyeong Goh, Minsu Choi, Jaewook Jung, Jong-Moon Chung:
Partial Offloading MEC Optimization Scheme using Deep Reinforcement Learning for XR Real-Time M&S Devices. ICCE 2022: 1-3 - [c14]Jaewook Jung, Minsu Choi, Yunyeong Goh, Jong-Moon Chung:
Multipath TCP Control Scheme for Low Latency and High Speed XR Real-Time M&S Devices. ICCE 2022: 1-3 - 2019
- [c13]Jung Hee Cheon, Haejin Cho, Jaewook Jung, Joohee Lee, Keewoo Lee:
Efficient Identity-Based Encryption from LWR. ICISC 2019: 225-241 - 2018
- [c12]Kang Zhao, Jungwon Kang, Jaewook Jung, Gunho Sohn:
Building Extraction From Satellite Images Using Mask R-CNN With Building Boundary Regularization. CVPR Workshops 2018: 247-251 - [c11]Chunyi Quan, Jaewook Jung, Hakjun Lee, Dongwoo Kang, Dongho Won:
Cryptanalysis of a chaotic chebyshev polynomials based remote user authentication scheme. ICOIN 2018: 438-441 - 2017
- [c10]Dongwoo Kang, Jaewook Jung, Hyungkyu Yang, Younsung Choi, Dongho Won:
Cryptanalysis of Lightweight User Authentication Scheme Using Smartcard. AHFE (9) 2017: 78-84 - [c9]Taeui Song, Jaewook Jung, Dongwoo Kang, Hyoungshick Kim, Dongho Won:
Cryptanalysis of an authentication scheme for multi-gateway wireless sensor networks. ICDIM 2017: 139-143 - [c8]Dongwoo Kang, Donghoon Lee, Seokhyang Cho, Jaewook Jung, Dongho Won:
Cryptanalysis and improvement of robust authentication scheme for telecare medicine information systems. IMCOM 2017: 18 - [c7]Hakjun Lee, Jiye Kim, Jaewook Jung, Youngsook Lee, Dongho Won:
An enhanced unlinkable anonymous payment scheme based on near field commnication. IMCOM 2017: 38 - [c6]Chunyi Quan, Jaewook Jung, Jiye Kim, Qimin Sun, Donghoon Lee, Dongho Won:
Cryptanalysis and improvement of a biometric and smart card based remote user authentication scheme. IMCOM 2017: 50 - 2016
- [c5]Jaewook Jung, Donghoon Lee, Jiye Kim, Youngsook Lee, Dongwoo Kang, Dongho Won:
Cryptanalysis and Improvement of Efficient Password-Based User Authentication Scheme using Hash Function. IMCOM 2016: 23:1-23:8 - 2015
- [c4]Jaewook Jung, Younsung Choi, Donghoon Lee, Jiye Kim, Jongho Mun, Dongho Won:
Cryptanalysis of Dynamic ID-Based User Authentication Scheme Using Smartcards Without Verifier Tables. CSA/CUTE 2015: 45-51 - 2014
- [c3]Jaewook Jung, Woongryul Jeon, Dongho Won:
An enhanced remote user authentication scheme using smart card. ICUIMC 2014: 62:1-62:5 - 2010
- [c2]Jaewook Jung, Shin Kang, Hanbit Park, Minsoo Hahn:
Healthy Super Mario: Tap Your Stomach and Shout for Active Healthcare. ICEC 2010: 482-483 - [c1]Jaewook Jung, Hanbit Park, Shin Kang, Minsoo Hahn:
Smile Like Hollywood Star: Face Components as Game Input. ICEC 2010: 487-489
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint