default search action
Jun-Ho Huh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j79]Ji-Heon Park, Jae-Hwan Kim, Jun-Ho Huh:
Deep Reinforcement Learning Robots for Algorithmic Trading: Considering Stock Market Conditions and U.S. Interest Rates. IEEE Access 12: 20705-20725 (2024) - [j78]Young-Suk Lee, Jaehyeon Choi, Seung-Mo Je, Jun-Ho Huh:
A Scalable Vector Graphics Warping System for Anthropomorphizing Game Characters. IEEE Access 12: 32472-32481 (2024) - [j77]Seong-Kyu Kim, Jun-Ho Huh, Byung-Gyu Kim:
Artificial Intelligence Blockchain Based Fake News Discrimination. IEEE Access 12: 53838-53854 (2024) - [j76]Thi-Ngot Pham, Viet-Hoan Nguyen, Ki-Ryong Kwon, Jae-Hwan Kim, Jun-Ho Huh:
Improved YOLOv5 Based Deep Learning System for Jellyfish Detection. IEEE Access 12: 87838-87849 (2024) - [j75]Ngoc-Bao-van Le, Yeong-Seok Seo, Jun-Ho Huh:
Artificial Intelligence in Finance: Coffee Commodity Trading Big Data for Informed Decision Making. IEEE Access 12: 91780-91792 (2024) - [j74]Ngoc-Bao-van Le, Hanchul Woo, Daesung Lee, Jun-Ho Huh:
AgTech: A Survey on Digital Twins Based Aquaculture Systems. IEEE Access 12: 125751-125767 (2024) - [j73]Hong-Danh Thai, Han-Jong Ko, Jun-Ho Huh:
Coffee Bean Defects Automatic Classification Realtime Application Adopting Deep Learning. IEEE Access 12: 126503-126517 (2024) - [j72]Ngoc-Bao-van Le, Hong-Danh Thai, Chang-Won Yoon, Jun-Ho Huh:
Recent Development of Drone Technology Software Engineering: A Systematic Survey. IEEE Access 12: 128729-128751 (2024) - [j71]Hoon-Gi Lee, Thi-Ngot Pham, Viet-Hoan Nguyen, Ki-Ryong Kwon, Jae-Hun Lee, Jun-Ho Huh:
Image-Based Outlet Fire Causing Classification Using CNN-Based Deep Learning Models. IEEE Access 12: 135104-135116 (2024) - [j70]Hong-Danh Thai, Ngoc-Bao-van Le, Daesung Lee, Jun-Ho Huh:
A Survey of Electrical Fire Causes Assessment Technology. IEEE Access 12: 145378-145392 (2024) - [j69]Ngoc-Bao-van Le, Yeong-Seok Seo, Jun-Ho Huh:
AgTech: Volatility Prediction for Agricultural Commodity Exchange Trading Applied Deep Learning. IEEE Access 12: 153898-153910 (2024) - [j68]Sungwook Eom, Jun-Ho Huh:
Group signature with restrictive linkability: minimizing privacy exposure in ubiquitous environment. J. Ambient Intell. Humaniz. Comput. 15(2): 1411-1421 (2024) - [j67]Jaehong Jung, Seunghyun Oh, Joomyoung Kim, Jinhyeon Lee, Wonkang Kim, Euiyoung Park, Seungyong Bae, Seungjin Kim, Jaehoon Lee, Yelim Youn, Yeongcheol Jeong, Sungsik Park, Kyungsoo Lee, Yong Lim, Junho Huh, Jongwoo Lee:
A Fully Integrated, Low-Noise, Cost-Effective Single-Crystal-Oscillator-Based Clock Management IC in 28-nm CMOS. IEEE J. Solid State Circuits 59(6): 1809-1822 (2024) - [j66]Thi-Ngot Pham, Viet-Hoan Nguyen, Jun-Ho Huh:
COVID-19 monitoring system: in-browser face mask detection application using deep learning. Multim. Tools Appl. 83(22): 61943-61970 (2024) - [j65]Tran Duy Thanh, Hoanh-Su Le, Jun-Ho Huh:
Building an Automatic Irrigation Fertilization System for Smart Farm in Greenhouse. IEEE Trans. Consumer Electron. 70(2): 4685-4698 (2024) - [c84]Hyejin Shin, Jun Ho Huh, Bum Jun Kwon, Iljoo Kim, Eunyong Cheon, HongMin Kim, Choong-Hoon Lee, Ian Oakley:
SkullID: Through-Skull Sound Conduction based Authentication for Smartglasses. CHI 2024: 834:1-834:19 - [c83]Jimin Lee, Sangwoo Park, Junho Huh, Sanghyo Jeong, Inhwan Kim, Jae Min Kim:
I2SR: Immediate Interrupt Service Routine on RISC-V MCU to Control mmWave RF Transceivers. DATE 2024: 1-2 - [c82]Mingyi Liu, Jun Ho Huh, HyungSeok Han, Jaehyuk Lee, Jihae Ahn, Frank Li, Hyoungshick Kim, Taesoo Kim:
I Experienced More than 10 DeFi Scams: On DeFi Users' Perception of Security Breaches and Countermeasures. USENIX Security Symposium 2024 - [i5]Mingyi Liu, Jun Ho Huh, HyungSeok Han, Jaehyuk Lee, Jihae Ahn, Frank Li, Hyoungshick Kim, Taesoo Kim:
I Experienced More than 10 DeFi Scams: On DeFi Users' Perception of Security Breaches and Countermeasures. CoRR abs/2406.15709 (2024) - 2023
- [j64]Il-Youp Kwak, Sungsu Kwag, Junhee Lee, Youngbae Jeon, Jeong-Hwan Hwang, Hyoukryeol Choi, Jong-Hoon Yang, Soyul Han, Jun Ho Huh, Choong-Hoon Lee, Ji Won Yoon:
Voice Spoofing Detection Through Residual Network, Max Feature Map, and Depthwise Separable Convolution. IEEE Access 11: 49140-49152 (2023) - [j63]Uinam Son, Jong-Su Yoon, Jun-Ho Huh, Jin-Hun Choo:
Empirical Study on the Development of ESS-Based Electric Propulsion System for a Catamaran USV. IEEE Access 11: 66895-66909 (2023) - [j62]Ji-Hyeon Bang, Sungwook Park, Jun-Yeong Kim, Jun Park, Jun-Ho Huh, Se-Hoon Jung, Chun-Bo Sim:
CA-CMT: Coordinate Attention for Optimizing CMT Networks. IEEE Access 11: 76691-76702 (2023) - [j61]Sangil Park, Jun-Ho Huh:
A Study on Big Data Collecting and Utilizing Smart Factory Based Grid Networking Big Data Using Apache Kafka. IEEE Access 11: 96131-96142 (2023) - [j60]Jun Ho Huh, Sungsu Kwag, Iljoo Kim, Alexandr Popov, Younghan Park, Geumhwan Cho, Juwon Lee, Hyoungshick Kim, Choong-Hoon Lee:
On the Long-Term Effects of Continuous Keystroke Authentication: Keeping User Frustration Low through Behavior Adaptation. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(2): 58:1-58:32 (2023) - [j59]Tran Duy Thanh, Dang Huy Truong, Hoanh-Su Le, Jun-Ho Huh:
Mobile robot: automatic speech recognition application for automation and STEM education. Soft Comput. 27(15): 10789-10805 (2023) - [j58]Tran Duy Thanh, Jun-Ho Huh, Jae-Hwan Kim:
Building a Lucy hybrid model for grocery sales forecasting based on time series. J. Supercomput. 79(4): 4048-4083 (2023) - [j57]Tran Duy Thanh, Jun-Ho Huh:
New machine learning model based on the time factor for e-commerce recommendation systems. J. Supercomput. 79(6): 6756-6801 (2023) - [j56]Thi-Ngot Pham, Viet-Hoan Nguyen, Jun-Ho Huh:
Integration of improved YOLOv5 for face mask detector and auto-labeling to generate dataset for fighting against COVID-19. J. Supercomput. 79(8): 8966-8992 (2023) - [j55]Tran Duy Thanh, Jun-Ho Huh:
Forecast of seasonal consumption behavior of consumers and privacy-preserving data mining with new S-Apriori algorithm. J. Supercomput. 79(11): 12691-12736 (2023) - [c81]Eunyong Cheon, Jun Ho Huh, Ian Oakley:
GestureMeter: Design and Evaluation of a Gesture Password Strength Meter. CHI 2023: 69:1-69:19 - [c80]Soo-Yong Kim, Dong-ook Chung, Kyungsoo Lee, Chang-Ju Lee, Junho Huh:
Low-Power Always-on Camera (AoC) System with Workload Offloading to CMOS Image Sensor. ICCE 2023: 1-2 - [c79]Hasong Kim, Horang Jang, Helin Lin, Junho Huh:
A Time-Based Digital Interface for RF and Baseband IC. ICCE 2023: 1-4 - [c78]Jimin Lee, Jae Min Kim, Junho Huh, Jungwoo Kim:
Software-driven Debug Framework for Embedded RISC-V, that Transparently Emulates the Industry Standard Debug Framework. ICCE 2023: 1-4 - [c77]Daecheol You, Jae Min Kim, Taesung Kim, Junho Huh:
Automotive Multi-Chip System with Cache Coherent Interconnect for Pipelined Parallel Applications. ICCE 2023: 1-5 - 2022
- [j54]Jun Ho Huh, Hyejin Shin, HongMin Kim, Eunyong Cheon, Youngeun Song, Choong-Hoon Lee, Ian Oakley:
WristAcoustic: Through-Wrist Acoustic Response Based Authentication for Smartwatches. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(4): 167:1-167:34 (2022) - [j53]Yeong-Seok Seo, Jun-Ho Huh:
GUI-based software modularization through module clustering in edge computing based IoT environments. J. Ambient Intell. Humaniz. Comput. 13(3): 1625-1639 (2022) - [j52]Tran Duy Thanh, Jun-Ho Huh:
Building a model to exploit association rules and analyze purchasing behavior based on rough set theory. J. Supercomput. 78(8): 11051-11091 (2022) - [j51]Hong-Danh Thai, Jun-Ho Huh:
Optimizing patient transportation by applying cloud computing and big data analysis. J. Supercomput. 78(16): 18061-18090 (2022) - [c76]Jaehong Jung, Seunghyun Oh, Joo-Myoung Kim, Gihyeok Ha, Jinhyeon Lee, Seungjin Kim, Euiyoung Park, Jaehoon Lee, Yelim Yoon, Seungyong Bae, Wonkang Kim, Yong Lim, Kyungsoo Lee, Junho Huh, Jongwoo Lee, Thomas Byunghak Cho:
A Single-Crystal-Oscillator-Based Clock-Management IC with 18× Start-Up Time Reduction and 0.68ppm/ºC Duty-Cycled Machine-Learning-Based RCO Calibration. ISSCC 2022: 58-60 - [c75]Jaehong Jung, Seungjin Kim, Wonkang Kim, Jae-Yeol Han, Euiyoung Park, Seongwook Hwang, Seunghyun Oh, Sangwook Han, Kyungsoo Lee, Junho Huh, Jongwoo Lee:
A 52MHz -158.2dBc/Hz PN @ 100kHz Digitally Controlled Crystal Oscillator Utilizing a Capacitive-Load-Dependent Dynamic Feedback Resistor in 28nm CMOS. ISSCC 2022: 60-62 - [i4]Jusop Choi, Wonseok Choi, William Aiken, Hyoungshick Kim, Jun Ho Huh, Taesoo Kim, Yongdae Kim, Ross J. Anderson:
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild. CoRR abs/2201.08678 (2022) - 2021
- [j50]Seung-Mo Je, Jun-Ho Huh:
Estimation of future power consumption level in smart grid: Application of fuzzy logic and genetic algorithm on big data platform. Int. J. Commun. Syst. 34(2) (2021) - [j49]Sang-Hyang Lee, Jae-Hwan Kim, Jun-Ho Huh:
Land Price Forecasting Research by Macro and Micro Factors and Real Estate Market Utilization Plan Research by Landscape Factors: Big Data Analysis Approach. Symmetry 13(4): 616 (2021) - [c74]Masoud Mehrabi Koushki, Borke Obada-Obieh, Jun Ho Huh, Konstantin Beznosov:
On Smartphone Users' Difficulty with Understanding Implicit Authentication. CHI 2021: 690:1-690:14 - [c73]Geumhwan Cho, Sungsu Kwag, Jun Ho Huh, Bedeuro Kim, Choong-Hoon Lee, Hyoungshick Kim:
Towards Usable and Secure Location-based Smartphone Authentication. SOUPS @ USENIX Security Symposium 2021: 1-16 - 2020
- [j48]Jaegwan Yu, Eunsoo Kim, Hyoungshick Kim, Jun Ho Huh:
Design of a Framework to Detect Device Spoofing Attacks Using Network Characteristics. IEEE Consumer Electron. Mag. 9(2): 34-40 (2020) - [j47]Seong-Kyu Kim, Jun-Ho Huh:
Autochain platform: expert automatic algorithm Blockchain technology for house rental dApp image application model. EURASIP J. Image Video Process. 2020(1): 47 (2020) - [j46]Se-Hoon Jung, Hansung Lee, Jun-Ho Huh:
A Novel Model on Reinforce K-Means Using Location Division Model and Outlier of Initial Value for Lowering Data Cost. Entropy 22(8): 902 (2020) - [j45]Yeong-Seok Seo, Jun-Ho Huh:
Context-aware auction solution of cooperative fish market monitoring system for intelligent user. Hum. centric Comput. Inf. Sci. 10: 30 (2020) - [j44]Hanchul Woo, Suk-Jae Jeong, Jun-Ho Huh:
Improvement of ITSM IT Service Efficiency in Military Electronic Service. J. Inf. Process. Syst. 16(2): 246-260 (2020) - [j43]Hanchul Woo, Sangdo Lee, Jun-Ho Huh, Sukjae Jeong:
Impact of ITSM Military Service Quality and Value on Service Trust. J. Multim. Inf. Syst. 7(1): 55-72 (2020) - [j42]Hansung Lee, So-Hee Park, Jang-Hee Yoo, Se-Hoon Jung, Jun-Ho Huh:
Face Recognition at a Distance for a Stand-Alone Access Control System. Sensors 20(3): 785 (2020) - [j41]Chang-Ju Lee, Jong Kang Park, Han-Eol Seo, Junho Huh, Jung-Hoon Chun:
Fully Differential Touch Screen Controller with Wide Input Dynamic Range for Thin Displays. Sensors 20(3): 837 (2020) - [j40]Geumhwan Cho, Jun Ho Huh, Soolin Kim, Junsung Cho, Heesung Park, Yenah Lee, Konstantin Beznosov, Hyoungshick Kim:
On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better? ACM Trans. Priv. Secur. 23(4): 22:1-22:32 (2020) - [j39]Jun-Ho Huh:
Reefer container monitoring system using PLC-based communication technology for maritime edge computing. J. Supercomput. 76(7): 5221-5243 (2020) - [c72]YeonSung Chu, Jae Min Kim, YoonJick Lee, SungHoon Shim, Junho Huh:
SS-DPKI: Self-Signed Certificate Based Decentralized Public Key Infrastructure for Secure Communication. ICCE 2020: 1-6 - [c71]Il-Youp Kwak, Sungsu Kwag, Junhee Lee, Jun Ho Huh, Choong-Hoon Lee, Youngbae Jeon, Jeong-Hwan Hwang, Ji Won Yoon:
ResMax: Detecting Voice Spoofing Attacks with Residual Network and Max Feature Map. ICPR 2020: 4837-4844 - [c70]Masoud Mehrabi Koushki, Borke Obada-Obieh, Jun Ho Huh, Konstantin Beznosov:
Is Implicit Authentication on Smartphones Really Popular? On Android Users' Perception of "Smart Lock for Android". MobileHCI 2020: 20:1-20:17 - [c69]Eunyong Cheon, Yonghwan Shin, Jun Ho Huh, Hyoungshick Kim, Ian Oakley:
Gesture Authentication for Smartphones: Evaluation of Gesture Password Selection Policies. SP 2020: 249-267 - [c68]Muhammad Ejaz Ahmed, Il-Youp Kwak, Jun Ho Huh, Iljoo Kim, Taekkyung Oh, Hyoungshick Kim:
Void: A fast and light voice liveness detection system. USENIX Security Symposium 2020: 2685-2702 - [c67]Sangwook Han, Jaehyuk Jang, Jaeseung Lee, Daechul Jeong, Joonhee Lee, Jongsoo Lee, Chung Lau, Juyoung Han, Sung-Jun Lee, Jeongyeol Bae, Ikkyun Cho, Sang-Yun Lee, Shinwoong Kim, Jae Hoon Lee, Yanghoon Lee, Jaehong Jung, Junho Huh, Jongwoo Lee, Thomas Byunghak Cho, Inyup Kang:
An RF Transceiver with Full Digital Interface Supporting 5G New Radio FR1 with 3.84Gbps DL/1.92Gbps UL and Dual-Band GNSS in 14nm FinFET CMOS. VLSI Circuits 2020: 1-2
2010 – 2019
- 2019
- [j38]Jun-Ho Huh, Yeong-Seok Seo:
Understanding Edge Computing: Engineering Evolution With Artificial Intelligence. IEEE Access 7: 164229-164245 (2019) - [j37]Cong Viet-Ngu Huynh, Jun-Ho Huh:
B+-tree construction on massive data with Hadoop. Clust. Comput. 22(Suppl 1): 1011-1021 (2019) - [j36]Jun-Ho Huh, Kyungryong Seo:
Digitalization of Seafarer's Book for Authentication and e-Navigation. J. Inf. Process. Syst. 15(1): 217-232 (2019) - [j35]Ying Yuan, Jun-Ho Huh:
Automatic Pattern Setting System Reacting to Customer Design. J. Inf. Process. Syst. 15(6): 1277-1295 (2019) - [j34]Jun-Ho Huh, Tae-Jung Kim:
A location-based mobile health care facility search system for senior citizens. J. Supercomput. 75(4): 1831-1848 (2019) - [j33]Jun-Ho Huh, Kyungryong Seo:
Blockchain-based mobile fingerprint verification and automatic log-in platform for future computing. J. Supercomput. 75(6): 3123-3139 (2019) - [j32]Sangdo Lee, Jun-Ho Huh:
An effective security measures for nuclear power plant using big data analysis approach. J. Supercomput. 75(8): 4267-4294 (2019) - [c66]Il-Youp Kwak, Jun Ho Huh, Seung Taek Han, Iljoo Kim, Ji Won Yoon:
Voice Presentation Attack Detection through Text-Converted Voice Command Analysis. CHI 2019: 598 - [c65]Jae Min Kim, Jae Won Lee, Kyungsoo Lee, Junho Huh:
Proof of Phone: A Low-cost Blockchain Platform. ICCE 2019: 1-4 - [i3]Woohyung Chun, Sung-Min Hong, Junho Huh, Inyup Kang:
Mitigating large adversarial perturbations on X-MAS (X minus Moving Averaged Samples). CoRR abs/1912.12170 (2019) - 2018
- [j31]Kyoung-Min Lee, Yunhyeok Im, Jun Ho Huh, Tae Hee Han:
Adaptive thermal property control technique for holistic thermal management of mobile devices. IEICE Electron. Express 15(10): 20180187 (2018) - [j30]Jun-Ho Huh:
Implementation of lightweight intrusion detection model for security of smart green house and vertical farm. Int. J. Distributed Sens. Networks 14(4) (2018) - [j29]Hui-Su Gong, Sunghyun Weon, Jun-Ho Huh:
A Study on the Design of Humane Animal Care System and Java Implementation. J. Inf. Process. Syst. 14(5): 1225-1236 (2018) - [j28]Jeong-Hoon Choi, Jun-Ho Huh, Sunghyun Weon:
A Design of Diabetes Mellitus Scheduling Program for Diabetic Patients: A Software Engineering Approach. J. Multim. Inf. Syst. 5(1): 53-58 (2018) - [j27]Woo-Hyeok Choi, Jun-Ho Huh:
A Design of Application through Physical Therapy Big Data Analytics. J. Multim. Inf. Syst. 5(3): 171-178 (2018) - [j26]Ying Yuan, Jun-Ho Huh:
A Case Study Analysis of Clothing Shopping Mall for Customer Design Participation Service and Development of Customer Editing User Interface. Mob. Inf. Syst. 2018: 7698648:1-7698648:19 (2018) - [j25]Tae-Jung Kim, Jun-Ho Huh, Jin-Mo Kim:
Bi-directional education contents using VR equipments and augmented reality. Multim. Tools Appl. 77(22): 30089-30104 (2018) - [j24]Jun-Ho Huh:
PLC-Integrated Sensing Technology in Mountain Regions for Drone Landing Sites: Focusing on Software Technology. Sensors 18(8): 2693 (2018) - [j23]Jun-Ho Huh:
Big Data Analysis for Personalized Health Activities: Machine Learning Processing for Automatic Keyword Extraction Approach. Symmetry 10(4): 93 (2018) - [c64]Ian Oakley, Jun Ho Huh, Junsung Cho, Geumhwan Cho, Md. Rasel Islam, Hyoungshick Kim:
The Personal Identification Chord: A Four ButtonAuthentication System for Smartwatches. AsiaCCS 2018: 75-87 - [c63]Seung-Mo Je, Jun-Ho Huh:
Nash Equilibrium Solution for Communication in Strategic Competition Adopted by Zigbee Network for Micro Grid. ICISA 2018: 595-606 - [c62]Jeong-Min Lee, Jun-Ho Huh, Hyun-Suk Kim:
A Study on the Harmony of Music and TV Lighting Through Music Analysis. MUE/FutureTech 2018: 487-495 - [c61]Sooyoung Jung, Jun-Ho Huh:
A Design of Demand Response Energy Optimization System for Micro Grid. MUE/FutureTech 2018: 511-516 - [c60]Sooyoung Jung, Jun-Ho Huh:
Demand Response Resource Energy Optimization System for Residential Buildings: Smart Grid Approach. MUE/FutureTech 2018: 517-522 - [c59]Ying Yuan, Jun-Ho Huh:
Developing Participatory Clothing Shopping Platform for Customer's Participation in Design. MUE/FutureTech 2018: 717-723 - [c58]Ying Yuan, Jun-Ho Huh:
Cloth Size Coding and Size Recommendation System Applicable for Personal Size Automatic Extraction and Cloth Shopping Mall. MUE/FutureTech 2018: 725-731 - [c57]Ying Yuan, Jun-Ho Huh, Myung-Ja Park:
Definition of Digital Printing Type Cloth Pattern Drawing for Mass Customizing. MUE/FutureTech 2018: 733-739 - [c56]Ying Yuan, Jun-Ho Huh:
A Case Study Analysis of Clothing Shopping Mall for Customer Design Participation Service and Development of Customer Editing User Interface with Solutions for Picture Works Copyright. MUE/FutureTech 2018: 741-746 - [c55]Ying Yuan, Jun-Ho Huh:
Development of Customer Design Responsive Automation Design Pattern Setting System. MUE/FutureTech 2018: 747-753 - [c54]Ying Yuan, Jun-Ho Huh, Myung-Ja Park:
A Development of Automation Position Processing Process and Pattern Grouping Technology Per Size for Automation Printing Pattern Image Generation. MUE/FutureTech 2018: 755-761 - [c53]Seong-Kyu Kim, Jun-Ho Huh:
A Study on the RFID and 2D Barcode, and NFC and Performance Improvement. MUE/FutureTech 2018: 773-779 - [c52]Seong-Kyu Kim, Jun-Ho Huh:
A Study on the LMS Platform Performance and Performance Improvement of K-MOOCs Platform from Learner's Perspective. MUE/FutureTech 2018: 781-786 - [c51]Seong-Kyu Kim, Jun-Ho Huh:
A Study on the Security Performance Improvement in BoT Perspective in Order to Overcome Security Weaknesses of IoT Devices. MUE/FutureTech 2018: 787-792 - [c50]Seong-Kyu Kim, Jun-Ho Huh:
A Study on the Rainbowchain Certificate in Order to Overcome Existing Certification System. MUE/FutureTech 2018: 793-798 - [c49]Nak-Hwe Kim, Jun-Ho Huh:
A Study on the Method of Propelling by Analyzing the Form of Bird's Movement. MUE/FutureTech 2018: 799-804 - [c48]Nak-Hwe Kim, Jun-Ho Huh:
A Method of Propelling with Many Whirlpools Used by Inland Birds. MUE/FutureTech 2018: 805-810 - [c47]Nak-Hwe Kim, Jun-Ho Huh:
Designing 3D Propeller by Applying Bird's Wing and Making a Test Product. MUE/FutureTech 2018: 811-817 - [c46]Nak-Hwe Kim, Jun-Ho Huh:
A Study on the Bumps at the Leading Edge of the Wing Used by Hovering Birds. MUE/FutureTech 2018: 819-824 - [c45]Jun-Ho Huh, Kyungryong Seo:
Artificial Intelligence Shoe Cabinet Using Deep Learning for Smart Home. MUE/FutureTech 2018: 825-834 - [c44]Seung-Mo Je, Jun-Ho Huh:
An Optimization Theory of Home Occupants' Access Data for Determining Smart Grid Service. PDCAT 2018: 143-152 - [c43]Youngbae Jeon, Minchul Kim, Hyunsoo Kim, Hyoungshick Kim, Jun Ho Huh, Ji Won Yoon:
I'm Listening to your Location! Inferring User Location with Acoustic Side Channels. WWW 2018: 339-348 - [i2]Woohyung Chun, Sung-Min Hong, Junho Huh, Inyup Kang:
Controlling the privacy loss with the input feature maps of the layers in convolutional neural networks. CoRR abs/1805.03444 (2018) - 2017
- [j22]Jun-Ho Huh:
PLC-based design of monitoring system for ICT-integrated vertical fish farm. Hum. centric Comput. Inf. Sci. 7: 20 (2017) - [j21]So-hui Son, Im-kyeong Lee, Jun-Ho Huh:
A System Algorithm for Recommending User-Customized Games. J. Multim. Inf. Syst. 4(3): 145-150 (2017) - [j20]Hyun-jin Jeong, Seung-hwan Lee, Jun-hyun Lee, Jun-ho Huh:
A Design of Promotion Management System for Webtoon. J. Multim. Inf. Syst. 4(4): 211-218 (2017) - [j19]Junhan Park, Jun-Ho Huh:
Algorithm for Youth Soccer Players Management System: Software Engineering Approach. J. Multim. Inf. Syst. 4(4): 307-310 (2017) - [j18]Jun-Ho Huh, Kyungryong Seo:
An Indoor Location-Based Control System Using Bluetooth Beacons for IoT Systems. Sensors 17(12): 2917 (2017) - [c42]Seunghun Cha, Sungsu Kwag, Hyoungshick Kim, Jun Ho Huh:
Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks. AsiaCCS 2017: 313-326 - [c41]Jun Ho Huh, Hyoungshick Kim, Swathi S. V. P. Rayala, Rakesh B. Bobba, Konstantin Beznosov:
I'm too Busy to Reset my LinkedIn Password: On the Effectiveness of Password Reset Emails. CHI 2017: 387-391 - [c40]Jeong-Hoon Choi, Jun-Ho Huh, Sunghyun Weon:
A Design of Scheduling Program for Diabetic Patients: A Software Engineering Approach. CSA/CUTE 2017: 198-203 - [c39]Do Yeon Jeon, Young Hyo Kim, Ha Yeon Park, Jun-Ho Huh, Hyeok Gyu Kwon:
A Design of Portable Continuous Passive Joint Mobilization Equipment System. CSA/CUTE 2017: 215-220 - [c38]Sungwook Eom, Jun-Ho Huh:
Anonymous Signature with Signer-Controlled Opening Capability. CSA/CUTE 2017: 878-882 - [c37]Sungwook Eom, Jun-Ho Huh:
Group Signature with Signer-Controlled Opening Capability: Separate Token Generator. CSA/CUTE 2017: 883-887 - [c36]Sangdo Lee, Hoanh-Su Le, Jun-Ho Huh:
A Keyword-Based Big Data Analysis for Individualized Health Activity Using Keyword Analysis Technique: A Methodological Approach Using National Health Data. CSA/CUTE 2017: 1237-1243 - [c35]Cong Viet-Ngu Huynh, Jongmin Kim, Jun-Ho Huh:
Improving the B+-Tree Construction for Transaction Log Data in Bank System Using Hadoop. ICISA 2017: 519-525 - [c34]Jun-Ho Huh, Han-Byul Kim, Jin-Mo Kim:
A Method of Modeling of Basic Big Data Analysis for Korean Medical Tourism: A Machine Learning Approach Using Apriori Algorithm. ICISA 2017: 784-790 - [c33]Yohan Bu, Kyungryong Seo, Jun-Ho Huh:
A study of enhancement of ranging performance of beacons through improvement of the smart phone's gyroscope: focusing on the Bluetooth low energy. IMCOM 2017: 90 - [c32]Geumhwan Cho, Jun Ho Huh, Junsung Cho, Seongyeol Oh, Youngbae Song, Hyoungshick Kim:
SysPal: System-Guided Pattern Locks for Android. IEEE Symposium on Security and Privacy 2017: 338-356 - 2016
- [j17]Maciej Korczynski, Ali Hamieh, Jun Ho Huh, Henrik Holm, S. Raj Rajagopalan, Nina H. Fefferman:
Hive oversight for network intrusion early warning using DIAMoND: a bee-inspired method for fully distributed cyber defense. IEEE Commun. Mag. 54(6): 60-67 (2016) - [j16]Jun-Ho Huh, Kyungryong Seo:
Design and test bed experiments of server operation system using virtualization technology. Hum. centric Comput. Inf. Sci. 6: 1 (2016) - [j15]Jun Ho Huh, Rakesh B. Bobba, Tom Markham, David M. Nicol, Julie Hull, Alexander Chernoguzov, Himanshu Khurana, Kevin Staggs, Jingwei Huang:
Next-Generation Access Control for Distributed Control Systems. IEEE Internet Comput. 20(5): 28-37 (2016) - [j14]Junho Huh:
Information Communication Ethical Study on the Protection of Digital Copyrights and Alternatives: Focusing on the Secondary School Students. J. Multim. Inf. Syst. 3(2): 27-34 (2016) - [j13]Jun-Ho Huh, Dong-Geun Lee, Kyungryong Seo:
A Design of Base Technology for Airbag Actuation Checking Application Based on Mechanical Calculations for Old Container Vehicle. J. Multim. Inf. Syst. 3(3): 69-76 (2016) - [j12]Jun-Ho Huh, Taehoon Koh, Kyungryong Seo:
Shipboard Secret Electronic Voting System for Information and Communication Technology-isolated Ocean Crews. J. Multim. Inf. Syst. 3(3): 77-84 (2016) - [j11]Jun-Ho Huh, Sugarbayar Otgonchimeg, Kyungryong Seo:
Advanced metering infrastructure design and test bed experiment using intelligent agents: focusing on the PLC network base technology for Smart Grid system. J. Supercomput. 72(5): 1862-1877 (2016) - [c31]Saurabh Verma, Ali Hamieh, Jun Ho Huh, Henrik Holm, Siva Raj Rajagopalan, Maciej Korczynski, Nina H. Fefferman:
Stopping Amplified DNS DDoS Attacks through Distributed Query Rate Sharing. ARES 2016: 69-78 - [c30]Youngbae Song, Hyoungshick Kim, Jun Ho Huh:
On the Guessability of Resident Registration Numbers in South Korea. ACISP (1) 2016: 128-138 - [c29]Seunghun Cha, Jaewoo Park, Geumhwan Cho, Jun Ho Huh, Hyoungshick Kim:
POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack. CCS 2016: 1835-1837 - [c28]Jun-Ho Huh:
A Study on Digitalization of Seafarer's Book Republic of Korea for e-Navigation: Focusing on Wireless Network. CSA/CUTE 2016: 1046-1052 - [c27]Jaegwan Yu, Eunsoo Kim, Hyoungshick Kim, Jun Ho Huh:
A Framework for Detecting MAC and IP Spoofing Attacks with Network Characteristics. ICSSA 2016: 49-53 - [c26]Jun-Ho Huh, Taehoon Koh, Kyungryong Seo:
Design of a Shipboard Outside Communication Network and the Test Bed Using PLC: for the Workers' Safety Management During Ship-Building process. IMCOM 2016: 43:1-43:6 - [c25]Jun-Ho Huh, Kyungryong Seo:
Smart Grid Framework Test Bed Using OPNET and Power Line Communication. SCIS&ISIS 2016: 736-742 - 2015
- [c24]Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim, Konstantin Beznosov, Apurva Mohan, S. Raj Rajagopalan:
Surpass: System-initiated User-replaceable Passwords. CCS 2015: 170-181 - [c23]Youngbae Song, Geumhwan Cho, Seongyeol Oh, Hyoungshick Kim, Jun Ho Huh:
On the Effectiveness of Pattern Lock Strength Meters: Measuring the Strength of Real World Pattern Locks. CHI 2015: 2343-2352 - [c22]Joonheung Park, Taehoon Koh, Jun-Ho Huh, Taeyoung Kim, Jeongho Lee, Jaesoon Kang, Donghyun Ju, Jeongdae Kim, Junwon Lee, Taewook Hwang, Youngjoon Park, Kyungryong Seo:
Design of the Real-Time Mobile Push System for Implementation of the Shipboard Smart Working. CSA/CUTE 2015: 541-548 - [c21]Jun-Ho Huh, Taehoon Koh, Kyungryong Seo:
A Shipboard Secret Ballot System for the ICT-Isolated Ocean Crews. CSA/CUTE 2015: 549-557 - [c20]Jun-Ho Huh, Dong-Geun Lee, Kyungryong Seo:
Design and Implementation of the Basic Technology for Realtime Smart Metering System Using Power Line Communication for Smart Grid. CSA/CUTE 2015: 663-669 - [c19]Maciej Korczynski, Ali Hamieh, Jun Ho Huh, Henrik Holm, S. Raj Rajagopalan, Nina H. Fefferman:
DIAMoND: Distributed Intrusion/Anomaly Monitoring for Nonparametric Detection. ICCCN 2015: 1-8 - [c18]Jina Kang, Hyoungshick Kim, Yun-Gyung Cheong, Jun Ho Huh:
Visualizing Privacy Risks of Mobile Applications through a Privacy Meter. ISPEC 2015: 548-558 - [c17]Jun Ho Huh, Hyoungshick Kim, Rakesh B. Bobba, Masooda N. Bashir, Konstantin Beznosov:
On the Memorability of System-generated PINs: Can Chunking Help? SOUPS 2015: 197-209 - 2014
- [j10]Junghwa Kim, Jun-Ho Huh, Soo-Yong Kim, Suk Won Kim, Joon-Sung Yang:
Low-power shared memory architecture power mode for mobile system-on-chip. IEICE Electron. Express 11(8) (2014) - [j9]Jun-Ho Huh, Yoondo Kim, Kyungryong Seo:
Power Aware Routing Protocol in Multimedia Ad-hoc Network Considering Hop Lifetime of Node. J. Multim. Inf. Syst. 1(2): 101-110 (2014) - [j8]Jun-Ho Huh, Kyungryong Seo:
PLC-Based Smart grid Home Network System Design and Implementation using OPNET Simulation. J. Multim. Inf. Syst. 1(2): 111-118 (2014) - [j7]Jun-Ho Huh, Kyungryong Seo:
Development of Competency-oriented Social Multimedia Computer Network Curriculum. J. Multim. Inf. Syst. 1(2): 133-142 (2014) - [j6]Incheol Shin, Jun Ho Huh, Sinkyu Kim, Jungtaek Seo:
Replacing Cryptographic Keys in AMI Mesh Networks with Small Latency. Mob. Networks Appl. 19(3): 426-434 (2014) - [j5]Alvaro A. Cárdenas, Robin Berthier, Rakesh B. Bobba, Jun Ho Huh, Jorjeta G. Jetcheva, David Grochocki, William H. Sanders:
A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures. IEEE Trans. Smart Grid 5(2): 906-915 (2014) - [c16]Robin Berthier, David I. Urbina, Alvaro A. Cárdenas, Michael Guerrero, Ulrich Herberg, Jorjeta G. Jetcheva, Daisuke Mashima, Jun Ho Huh, Rakesh B. Bobba:
On the practicality of detecting anomalies with encrypted traffic in AMI. SmartGridComm 2014: 890-895 - [c15]Jina Kang, Daehyun Kim, Hyoungshick Kim, Jun Ho Huh:
Analyzing Unnecessary Permissions Requested by Android Apps Based on Users' Opinions. WISA 2014: 68-79 - 2013
- [c14]Incheol Shin, Jun Ho Huh, Yuseok Jeon, David M. Nicol:
A distributed monitoring architecture for AMIs: minimizing the number of monitoring nodes and enabling collided packet recovery. SEGS@CCS 2013: 35-40 - [c13]Jun Ho Huh, Mirko Montanari, Derek Dagit, Rakesh Bobba, Dongwook Kim, Yoonjoo Choi, Roy H. Campbell:
An empirical study on the software integrity of virtual appliances: are you really getting what you paid for? AsiaCCS 2013: 231-242 - [c12]Muhammad Salman Malik, Mirko Montanari, Jun Ho Huh, Rakesh B. Bobba, Roy H. Campbell:
Towards SDN enabled network control delegation in clouds. DSN 2013: 1-6 - [c11]Jun Ho Huh, Mirko Montanari, Derek Dagit, Rakesh Bobba, Dongwook Kim, Yoonjoo Choi, Roy H. Campbell:
Assessing software integrity of virtual appliances through software whitelists. NDSS 2013 - [c10]Robin Berthier, Jorjeta G. Jetcheva, Daisuke Mashima, Jun Ho Huh, David Grochocki, Rakesh B. Bobba, Alvaro A. Cárdenas, William H. Sanders:
Reconciling security protection and monitoring requirements in Advanced Metering Infrastructures. SmartGridComm 2013: 450-455 - [c9]Mirko Montanari, Jun Ho Huh, Rakesh Bobba, Roy H. Campbell:
Limiting Data Exposure in Monitoring Multi-domain Policy Conformance. TRUST 2013: 65-82 - 2012
- [j4]Hyoungshick Kim, Jun Ho Huh:
PIN selection policies: Are they really effective? Comput. Secur. 31(4): 484-496 (2012) - [c8]Mirko Montanari, Jun Ho Huh, Derek Dagit, Rakesh Bobba, Roy H. Campbell:
Evidence of log integrity in policy-based security monitoring. DSN Workshops 2012: 1-6 - [c7]Jingwei Huang, David M. Nicol, Rakesh Bobba, Jun Ho Huh:
A framework integrating attribute-based policies into role-based access control. SACMAT 2012: 187-196 - [c6]David Grochocki, Jun Ho Huh, Robin Berthier, Rakesh Bobba, William H. Sanders, Alvaro A. Cárdenas, Jorjeta G. Jetcheva:
AMI threats, intrusion detection requirements and deployment recommendations. SmartGridComm 2012: 395-400 - 2011
- [j3]Jun Ho Huh, John Lyle, Cornelius Namiluko, Andrew P. Martin:
Managing application whitelists in trusted distributed systems. Future Gener. Comput. Syst. 27(2): 211-226 (2011) - [c5]Jun Ho Huh, Hyoungshick Kim, John Lyle, Andrew P. Martin:
Achieving attestation with less effort: an indirect and configurable approach to integrity reporting. STC@CCS 2011: 31-36 - [c4]Jun Ho Huh, Hyoungshick Kim:
Phishing Detection with Popular Search Engines: Simple and Effective. FPS 2011: 194-207 - [c3]Cornelius Namiluko, Jun Ho Huh, Andrew P. Martin:
Verifying Trustworthiness of Virtual Appliances in Collaborative Environments. TRUST 2011: 1-15 - [p1]Jun Ho Huh, Andrew P. Martin:
Trustworthy Distributed Systems Through Integrity-Reporting. Guide to e-Science 2011: 265-297 - 2010
- [j2]Ji Won Yoon, Hyoungshick Kim, Jun Ho Huh:
Hybrid spam filtering for mobile communication. Comput. Secur. 29(4): 446-459 (2010)
2000 – 2009
- 2009
- [c2]Jun Ho Huh, Andrew P. Martin:
Towards a Trustable Virtual Organisation. ISPA 2009: 425-431 - [c1]Jun Ho Huh, John Lyle:
Trustworthy Log Reconciliation for Distributed Virtual Organisations. TRUST 2009: 169-182 - [i1]Ji Won Yoon, Hyoungshick Kim, Jun Ho Huh:
Hybrid Spam Filtering for Mobile Communication. CoRR abs/0908.2462 (2009) - 2001
- [j1]Jun-Ho Huh, Soo-Won Kim, Sung-Hyun Koh, Hyung-Lae Roh:
A low power digital servo architecture for optical disc. IEEE Trans. Consumer Electron. 47(3): 534-541 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint