Chang Choi
Chang Choi
Assistant Professor, Department of Computer Engineering, Gachon University
Correu electrònic verificat a gachon.ac.kr - Pàgina d'inici
Títol
Citada per
Citada per
Any
Ontology-based access control model for security policy reasoning in cloud computing
C Choi, J Choi, P Kim
The Journal of Supercomputing 67 (3), 711-722, 2014
902014
Detecting Web based DDoS Attack using MapReduce operations in Cloud Computing Environment.
J Choi, C Choi, B Ko, D Choi, P Kim
J. Internet Serv. Inf. Secur. 3 (3/4), 28-37, 2013
712013
Automatic enrichment of semantic relation network and its application to word sense disambiguation
M Hwang, C Choi, PK Kim
IEEE Transactions on Knowledge and Data Engineering 23 (6), 845-858, 2010
682010
A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment
J Choi, C Choi, B Ko, P Kim
Soft Computing 18 (9), 1697-1703, 2014
612014
Efficient malicious code detection using n-gram analysis and SVM
J Choi, H Kim, C Choi, P Kim
2011 14th International Conference on Network-Based Information Systems, 618-621, 2011
532011
Travel ontology for intelligent recommendation system
C Choi, M Cho, J Choi, M Hwang, J Park, P Kim
2009 Third Asia International Conference on Modelling & Simulation, 637-642, 2009
382009
Interference cancellation for non-orthogonal multiple access used in future wireless mobile networks
X Su, HF Yu, W Kim, C Choi, D Choi
EURASIP Journal on Wireless Communications and Networking 2016 (1), 231, 2016
342016
Travel ontology for recommendation system based on semantic web
C Choi, M Cho, E Kang, P Kim
2006 8th International Conference Advanced Communication Technology 1, 624-627, 2006
282006
Intelligent power equipment management based on distributed context-aware inference in smart cities
C Choi, C Esposito, H Wang, Z Liu, J Choi
IEEE Communications Magazine 56 (7), 212-217, 2018
272018
Generative Neural Networks for Anomaly Detection in Crowded Scenes
T Wang, M Qiao, Z Lin, C Li, H Snoussi, Z Liu, C Choi
IEEE Transactions on Information Forensics and Security 14 (5), 1390-1399, 2019
242019
A novel CNN based security guaranteed image watermarking generation scenario for smart city applications
D Li, L Deng, BB Gupta, H Wang, C Choi
Information Sciences 479, 432-447, 2019
242019
Microservices scheduling model over heterogeneous cloud-edge environments as support for IoT applications
ID Filip, F Pop, C Serbanescu, C Choi
IEEE Internet of Things Journal 5 (4), 2672-2681, 2018
222018
Securing Collaborative Deep Learning in Industrial Applications within Adversarial Scenarios
C Esposito, X Su, S Aljawarneh, C Choi
IEEE Transactions on Industrial Informatics 14 (11), 4972-4981, 2018
182018
Visual saliency guided complex image retrieval
H Wang, Z Li, Y Li, BB Gupta, C Choi
Pattern Recognition Letters 130, 64-72, 2020
172020
An Edge Intelligence Empowered Recommender System Enabling Cultural Heritage Applications
X Su, G Sperli, V Moscato, A Picariello, C Esposito, C Choi
IEEE Transactions on Industrial Informatics 15 (7), 4266-4275, 2019
162019
A design of onto-ACM (ontology based access control model) in cloud computing environments.
C Choi, J Choi, B Ko, K Oh, P Kim
J. Internet Serv. Inf. Secur. 2 (3/4), 54-64, 2012
152012
Power Allocation Scheme for Femto-to-Macro Downlink Interference Reduction for Smart Devices in Ambient Intelligence
X Su, C Liang, D Choi, C Choi
Journal of Mobile Information Systems 2016 (7172515), 1-10, 2016
142016
Probabilistic spatio-temporal inference for motion event understanding
C Choi, J Choi, E Lee, I You, P Kim
Neurocomputing 122, 24-32, 2013
142013
Intelligent reconfigurable method of cloud computing resources for multimedia data delivery
J Choi, C Choi, K Yim, J Kim, P Kim
Informatica 24 (3), 381-394, 2013
142013
Detection of cross site scripting attack in wireless networks using n-Gram and SVM
JH Choi, C Choi, BK Ko, PK Kim
Mobile Information Systems 8 (3), 275-286, 2012
132012
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20