A deep bidirectional GRU network model for biometric electrocardiogram classification based on recurrent neural networks HM Lynn, SB Pan, P Kim Ieee Access 7, 145395-145405, 2019 | 297 | 2019 |
Ontology-based access control model for security policy reasoning in cloud computing C Choi, J Choi, P Kim The Journal of Supercomputing 67, 711-722, 2014 | 140 | 2014 |
A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment J Choi, C Choi, B Ko, P Kim Soft Computing 18, 1697-1703, 2014 | 124 | 2014 |
Detecting web based Ddos attack using mapreduce operations in cloud computing environment. J Choi, C Choi, B Ko, D Choi, P Kim J. Internet Serv. Inf. Secur. 3 (3/4), 28-37, 2013 | 113 | 2013 |
Efficient malicious code detection using N-gram analysis and SVM J Choi, H Kim, C Choi, P Kim 2011 14th International Conference on Network-Based Information Systems, 618-621, 2011 | 92 | 2011 |
Text analysis for detecting terrorism-related articles on the web D Choi, B Ko, H Kim, P Kim Journal of Network and Computer Applications 38, 16-21, 2014 | 86 | 2014 |
Efficient and accurate target localization in underwater environment I Ullah, Y Liu, X Su, P Kim IEEE Access 7, 101415-101426, 2019 | 80 | 2019 |
Automatic enrichment of semantic relation network and its application to word sense disambiguation M Hwang, C Choi, PK Kim IEEE Transactions on Knowledge and Data Engineering 23 (6), 845-858, 2010 | 78 | 2010 |
A telematics service system based on the Linux cluster J Lee, GL Park, H Kim, YK Yang, P Kim, SW Kim Computational Science–ICCS 2007: 7th International Conference, Beijing …, 2007 | 75 | 2007 |
A green ant-based method for path planning of unmanned ground vehicles MR Jabbarpour, H Zarrabi, JJ Jung, P Kim IEEE access 5, 1820-1832, 2017 | 67 | 2017 |
Computational offloading for efficient trust management in pervasive online social networks using osmotic computing V Sharma, I You, R Kumar, P Kim IEEE Access 5, 5084-5103, 2017 | 60 | 2017 |
A new methodology for merging the heterogeneous domain ontologies based on the wordnet H Kong, M Hwang, P Kim International Conference on Next Generation Web Services Practices (NWeSP'05 …, 2005 | 52 | 2005 |
Comments on “dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks” H Tan, D Choi, P Kim, S Pan, I Chung IEEE Transactions on Intelligent Transportation Systems 19 (7), 2149-2151, 2017 | 51 | 2017 |
Secure certificateless authentication and road message dissemination protocol in VANETs H Tan, D Choi, P Kim, S Pan, I Chung Wireless Communications and Mobile Computing 2018 (1), 7978027, 2018 | 48 | 2018 |
Travel ontology for intelligent recommendation system C Choi, M Cho, J Choi, M Hwang, J Park, P Kim 2009 Third Asia International Conference on Modelling & Simulation, 637-642, 2009 | 44 | 2009 |
Automatic cell classification in human’s peripheral blood images based on morphological image processing K Kim, J Jeon, WK Choi, P Kim, YS Ho AI 2001: Advances in Artificial Intelligence: 14th Australian Joint …, 2001 | 42 | 2001 |
Least slack time rate first: New scheduling algorithm for multi-processor environment M Hwang, D Choi, P Kim 2010 International Conference on Complex, Intelligent and Software Intensive …, 2010 | 41 | 2010 |
Automatic liver segmentation of contrast enhanced CT images based on histogram processing KS Seo, HB Kim, T Park, PK Kim, JA Park Advances in Natural Computation: First International Conference, ICNC 2005 …, 2005 | 40 | 2005 |
Travel ontology for recommendation system based on semantic web C Choi, M Cho, E Kang, P Kim 2006 8th international conference advanced communication technology 1, 624-627, 2006 | 39 | 2006 |
Intelligent handover scheme for drone using fuzzy inference systems E Lee, C Choi, P Kim IEEE Access 5, 13712-13719, 2017 | 38 | 2017 |