Name
Affiliation
Papers
CHANG CHOI
Dept. of Computer Science and Engineering, Chosun University, Korea 501-759
93
Collaborators
Citations 
PageRank 
160
261
39.04
Referers 
Referees 
References 
744
1540
593
Search Limit
1001000
Title
Citations
PageRank
Year
An Intelligent Signal Processing Data Denoising Method for Control Systems Protection in the Industrial Internet of Things00.342022
Evaluation and Comparative Analysis of Semantic Web-Based Strategies for Enhancing Educational System Development00.342022
An Enhanced 3dcnn-Convlstm For Spatiotemporal Multimedia Data Analysis00.342021
Novel data mining paradigms based on soft computing and machine learning in the current and upcoming information society revolution00.342020
Internet of Knowledge.00.342020
Efficient healthcare service based on Stacking Ensemble.00.342020
XSSPro - XSS Attack Detection Proxy to Defend Social Networking Platforms.00.342020
Multimodal Neuroimaging Game Theoretic Data Fusion in Adversarial Conditions.00.342020
Green resource allocation method for intelligent medical treatment-oriented service in a 5G mobile network: Green RRM for Intelligent Medical Service00.342020
Inter-Beam Interference Cancellation and Physical Layer Security Constraints by 3D Polarized Beamforming in Power Domain NOMA Systems00.342020
A Localization Based on Unscented Kalman Filter and Particle Filter Localization Algorithms.40.432020
Packer identification method based on byte sequences: Packer identification method based on byte sequences00.342020
Robust Decentralised Trust Management for the Internet of Things by Using Game Theory20.372020
Visual saliency guided complex image retrieval120.542020
Generative Neural Networks for Anomaly Detection in Crowded Scenes.60.422019
A Reliable Energy Efficient Dynamic Spectrum Sensing for Cognitive Radio IoT Networks80.432019
Ontology-Based Security Context Reasoning for Power IoT-Cloud Security Service00.342019
An Edge Intelligence Empowered Recommender System Enabling Cultural Heritage Applications10.412019
Moving intelligence of mobile edge computing to maritime network.10.372019
A novel energy-efficient neighbor discovery procedure in a wireless self-organization network.10.362019
Clustered NFV service chaining scheme for ocean observations.00.342019
Medical Information Protection Frameworks for Smart Healthcare based on IoT00.342019
Automatic Maritime Traffic Synthetic Route - A Framework for Route Prediction.10.362019
A reinforcement learning approach for UAV target searching and tracking40.382019
Metamorphic malicious code behavior detection using probabilistic inference methods10.352019
Accelerating temporal action proposal generation via high performance computing00.342019
Localization and Detection of Targets in Underwater Wireless Sensor Using Distance and Angle Based Algorithms.10.362019
A novel CNN based security guaranteed image watermarking generation scenario for smart city applications.190.762019
Microservices Scheduling Model Over Heterogeneous Cloud-Edge Environments As Support for IoT Applications.70.512018
Combined pre-detection and sleeping for energy-efficient spectrum sensing in cognitive radio networks.00.342018
Intelligent Power Equipment Management Based on Distributed Context-Aware Inference in Smart Cities.10.362018
An improved method of automatic text summarization for web contents using lexical chain with semantic-related terms.10.352018
Towards Affective Lifelogging with Information Fusion00.342018
Unsupervised translated word sense disambiguation in constructing bilingual lexical database.00.342018
Power domain NOMA to support group communication in public safety networks.10.362018
Performance analysis of smart cultural heritage protection oriented wireless networks.50.452018
Tensor 2-D DOA Estimation for a Cylindrical Conformal Antenna Array in a Massive MIMO System Under Unknown Mutual Coupling.10.352018
A novel valuation pruning optimization fuzzing test model based on mutation tree for industrial control systems.00.342018
CNN-based malicious user detection in social networks.00.342018
Securing Collaborative Deep Learning in Industrial Applications Within Adversarial Scenarios.20.372018
Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures.10.352018
Improved performance optimization for massive small files in cloud computing environment.20.372018
Vulnerability Analysis on a Secure USB: Based on a Commercial Product A00.342018
Fine-Grained Big Traffic Data Reverse-charge System: A Method of Saving Expenses.00.342018
Intelligent approaches for security technologies.00.342018
Apt Attack Behavior Pattern Mining Using The Fp-Growth Algorithm00.342017
A Study Of Interference Cancellation For Noma Downlink Near-Far Effect To Support Big Data00.342017
SwiftRank: An Unsupervised Statistical Approach of Keyword and Salient Sentence Extraction for Individual Documents.10.352017
Signaling game based strategy for secure positioning in wireless sensor networks.20.382017
Channel allocation and power control schemes for cross-tier 3GPP LTE networks to support multimedia applications.50.472017
  • 1
  • 2