Chang Choi
Chang Choi
Assistant Professor, Department of Computer Engineering, Gachon University
Verified email at - Homepage
Cited by
Cited by
A novel CNN based security guaranteed image watermarking generation scenario for smart city applications
D Li, L Deng, BB Gupta, H Wang, C Choi
Information Sciences 479, 432-447, 2019
Visual saliency guided complex image retrieval
H Wang, Z Li, Y Li, BB Gupta, C Choi
Pattern Recognition Letters 130, 64-72, 2020
Generative Neural Networks for Anomaly Detection in Crowded Scenes
T Wang, M Qiao, Z Lin, C Li, H Snoussi, Z Liu, C Choi
IEEE Transactions on Information Forensics and Security 14 (5), 1390-1399, 2019
A Localization based on Unscented Kalman Filter and Particle Filter Localization Algorithms
I Ullah, Y Shen, X Su, C Esposito, C Choi
IEEE Access 8, 2233-2246, 2020
Ontology-based access control model for security policy reasoning in cloud computing
C Choi, J Choi, P Kim
The Journal of Supercomputing 67 (3), 711-722, 2014
Localization and detection of targets in underwater wireless sensor using distance and angle based algorithms
I Ullah, J Chen, X Su, C Esposito, C Choi
IEEE Access 7, 45693-45704, 2019
A reliable energy efficient dynamic spectrum sensing for cognitive radio IoT networks
JA Ansere, G Han, H Wang, C Choi, C Wu
IEEE Internet of Things Journal 6 (4), 6748-6759, 2019
A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment
J Choi, C Choi, B Ko, P Kim
Soft Computing 18, 1697-1703, 2014
Detecting web based Ddos attack using mapreduce operations in cloud computing environment.
J Choi, C Choi, B Ko, D Choi, P Kim
J. Internet Serv. Inf. Secur. 3 (3/4), 28-37, 2013
A reinforcement learning approach for uav target searching and tracking
T Wang, R Qin, Y Chen, H Snoussi, C Choi
Multimedia Tools and Applications 78 (4), 4347-4364, 2019
Microservices scheduling model over heterogeneous cloud-edge environments as support for IoT applications
ID Filip, F Pop, C Serbanescu, C Choi
IEEE Internet of Things Journal 5 (4), 2672-2681, 2018
Intelligent power equipment management based on distributed context-aware inference in smart cities
C Choi, C Esposito, H Wang, Z Liu, J Choi
IEEE Communications Magazine 56 (7), 212-217, 2018
An Edge Intelligence Empowered Recommender System Enabling Cultural Heritage Applications
X Su, G Sperli, V Moscato, A Picariello, C Esposito, C Choi
IEEE Transactions on Industrial Informatics 15 (7), 4266-4275, 2019
Efficient malicious code detection using N-gram analysis and SVM
J Choi, H Kim, C Choi, P Kim
2011 14th International Conference on Network-Based Information Systems, 618-621, 2011
Interference cancellation for non-orthogonal multiple access used in future wireless mobile networks
X Su, HF Yu, W Kim, C Choi, D Choi
EURASIP journal on wireless communications and networking 2016, 1-12, 2016
Ontology-based security context reasoning for power IoT-cloud security service
C Choi, J Choi
IEEE Access 7, 110510-110517, 2019
Automatic enrichment of semantic relation network and its application to word sense disambiguation
M Hwang, C Choi, PK Kim
IEEE Transactions on Knowledge and Data Engineering 23 (6), 845-858, 2010
Threats and corrective measures for IoT security with observance of cybercrime: A survey
S Rani, A Kataria, V Sharma, S Ghosh, V Karar, K Lee, C Choi
Wireless communications and mobile computing 2021 (1), 5579148, 2021
Securing Collaborative Deep Learning in Industrial Applications within Adversarial Scenarios
C Esposito, X Su, S Aljawarneh, C Choi
IEEE Transactions on Industrial Informatics 14 (11), 4972-4981, 2018
Robust decentralised trust management for the internet of things by using game theory
C Esposito, O Tamburis, X Su, C Choi
Information Processing & Management 57 (6), 102308, 2020
The system can't perform the operation now. Try again later.
Articles 1–20