Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Cheonshik Kim
@article{DBLP:journals/mta/XiongZYK24, author = {Lizhi Xiong and Mengtao Zhang and Ching{-}Nung Yang and Cheonshik Kim}, title = {An enhanced {AMBTC} for color image compression using color palette}, journal = {Multim. Tools Appl.}, volume = {83}, number = {11}, pages = {31783--31803}, year = {2024}, url = {https://doi.org/10.1007/s11042-023-16734-7}, doi = {10.1007/S11042-023-16734-7}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/XiongZYK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/YuZK23, author = {Huan Yu and Ru Zhang and Cheonshik Kim}, title = {Intelligent analysis system of college students' employment and entrepreneurship situation: Big data and artificial intelligence-driven approach}, journal = {Comput. Electr. Eng.}, volume = {110}, pages = {108823}, year = {2023}, url = {https://doi.org/10.1016/j.compeleceng.2023.108823}, doi = {10.1016/J.COMPELECENG.2023.108823}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/YuZK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KimYZJ23, author = {Cheonshik Kim and Ching{-}Nung Yang and Zhili Zhou and Ki{-}Hyun Jung}, title = {Dual efficient reversible data hiding using Hamming code and {OPAP}}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103544}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103544}, doi = {10.1016/J.JISA.2023.103544}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KimYZJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/NguyenNKD23, author = {The{-}Vinh Nguyen and Ngoc Phi Nguyen and Cheonshik Kim and Nhu{-}Ngoc Dao}, title = {Intelligent aerial video streaming: Achievements and challenges}, journal = {J. Netw. Comput. Appl.}, volume = {211}, pages = {103564}, year = {2023}, url = {https://doi.org/10.1016/j.jnca.2022.103564}, doi = {10.1016/J.JNCA.2022.103564}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/NguyenNKD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangWLK21, author = {Ching{-}Nung Yang and Xiaotian Wu and Hsuan{-}Yu Lin and Cheonshik Kim}, title = {Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolation}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102910}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102910}, doi = {10.1016/J.JISA.2021.102910}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YangWLK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/ZhouYKC20, author = {Zhili Zhou and Ching{-}Nung Yang and Cheonshik Kim and Stelvio Cimato}, title = {Introduction to the special issue on deep learning for real-time information hiding and forensics}, journal = {J. Real Time Image Process.}, volume = {17}, number = {1}, pages = {1--5}, year = {2020}, url = {https://doi.org/10.1007/s11554-020-00947-2}, doi = {10.1007/S11554-020-00947-2}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/ZhouYKC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LengYKZ20, author = {Lu Leng and Ziyuan Yang and Cheonshik Kim and Yue Zhang}, title = {A Light-Weight Practical Framework for Feces Detection and Trait Recognition}, journal = {Sensors}, volume = {20}, number = {9}, pages = {2644}, year = {2020}, url = {https://doi.org/10.3390/s20092644}, doi = {10.3390/S20092644}, timestamp = {Fri, 06 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/LengYKZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/KimSYCW19, author = {Cheonshik Kim and Dongkyoo Shin and Ching{-}Nung Yang and Yi{-}Cheng Chen and Song{-}Yu Wu}, title = {Data Hiding Using Sequential Hamming + k with m Overlapped Pixels}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {13}, number = {12}, pages = {6159--6174}, year = {2019}, url = {https://doi.org/10.3837/tiis.2019.12.020}, doi = {10.3837/TIIS.2019.12.020}, timestamp = {Wed, 15 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/KimSYCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/YangCLK19, author = {Ching{-}Nung Yang and Yung{-}Shun Chou and Yan{-}Xiao Liu and Cheonshik Kim}, title = {Exploiting error control in matrix coding-based data hiding over lossy channel}, journal = {J. Real Time Image Process.}, volume = {16}, number = {3}, pages = {577--588}, year = {2019}, url = {https://doi.org/10.1007/s11554-018-0829-1}, doi = {10.1007/S11554-018-0829-1}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/YangCLK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/KimKR19, author = {Cheonshik Kim and Byung{-}Gyu Kim and Joel J. P. C. Rodrigues}, title = {Editorial: Recent Advances in Mining Intelligence and Context-Awareness on IoT-Based Platforms}, journal = {Mob. Networks Appl.}, volume = {24}, number = {1}, pages = {160--162}, year = {2019}, url = {https://doi.org/10.1007/s11036-018-1172-2}, doi = {10.1007/S11036-018-1172-2}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/KimKR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/KimSYC19, author = {Cheonshik Kim and Dongkyoo Shin and Ching{-}Nung Yang and Yung{-}Shun Chou}, title = {Generalizing Hamming+k data hiding by overlapped pixels}, journal = {Multim. Tools Appl.}, volume = {78}, number = {13}, pages = {17995--18015}, year = {2019}, url = {https://doi.org/10.1007/s11042-018-7101-3}, doi = {10.1007/S11042-018-7101-3}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/KimSYC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/YangWCK19, author = {Ching{-}Nung Yang and Song{-}Yu Wu and Yung{-}Shun Chou and Cheonshik Kim}, title = {Enhanced stego-image quality and embedding capacity for the partial reversible data hiding scheme}, journal = {Multim. Tools Appl.}, volume = {78}, number = {13}, pages = {18595--18616}, year = {2019}, url = {https://doi.org/10.1007/s11042-019-7220-5}, doi = {10.1007/S11042-019-7220-5}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/YangWCK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/displays/KimSLY18, author = {Cheonshik Kim and Dongkyoo Shin and Lu Leng and Ching{-}Nung Yang}, title = {Separable reversible data hiding in encrypted halftone image}, journal = {Displays}, volume = {55}, pages = {71--79}, year = {2018}, url = {https://doi.org/10.1016/j.displa.2018.04.002}, doi = {10.1016/J.DISPLA.2018.04.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/displays/KimSLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/KimSYC18, author = {Cheonshik Kim and Dongkyoo Shin and Ching{-}Nung Yang and Yung{-}Shun Chou}, title = {Improving capacity of Hamming (\emph{n}, \emph{k})+1 stego-code by using optimized Hamming +{\unicode{8239}}\emph{k}}, journal = {Digit. Signal Process.}, volume = {78}, pages = {284--293}, year = {2018}, url = {https://doi.org/10.1016/j.dsp.2018.03.016}, doi = {10.1016/J.DSP.2018.03.016}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dsp/KimSYC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/KimCYZB18, author = {Cheonshik Kim and Chin{-}Chen Chang and Ching{-}Nung Yang and Xinpeng Zhang and Jinsuk Baek}, title = {Special Issue: Real-Time Data Hiding and Visual Cryptography}, journal = {J. Real Time Image Process.}, volume = {14}, number = {1}, pages = {1--4}, year = {2018}, url = {https://doi.org/10.1007/s11554-018-0749-0}, doi = {10.1007/S11554-018-0749-0}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jrtip/KimCYZB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/LeeYKY18, author = {Gil{-}Je Lee and Eun{-}Jun Yoon and Cheonshik Kim and Kee{-}Young Yoo}, title = {A real-time secret image sharing with fairness}, journal = {J. Real Time Image Process.}, volume = {14}, number = {1}, pages = {5--12}, year = {2018}, url = {https://doi.org/10.1007/s11554-015-0558-7}, doi = {10.1007/S11554-015-0558-7}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/LeeYKY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/KimSLY18, author = {Cheonshik Kim and Dongkyoo Shin and Lu Leng and Ching{-}Nung Yang}, title = {Lossless data hiding for absolute moment block truncation coding using histogram modification}, journal = {J. Real Time Image Process.}, volume = {14}, number = {1}, pages = {101--114}, year = {2018}, url = {https://doi.org/10.1007/s11554-016-0641-8}, doi = {10.1007/S11554-016-0641-8}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/KimSLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/KimSKY18, author = {Cheonshik Kim and Dongkyoo Shin and Byung{-}Gyu Kim and Ching{-}Nung Yang}, title = {Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and {OPAP}}, journal = {J. Real Time Image Process.}, volume = {14}, number = {1}, pages = {115--126}, year = {2018}, url = {https://doi.org/10.1007/s11554-017-0674-7}, doi = {10.1007/S11554-017-0674-7}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/KimSKY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/KimYKY18, author = {Dae{-}Soo Kim and Eun{-}Jun Yoon and Cheonshik Kim and Kee{-}Young Yoo}, title = {Reversible data hiding scheme with edge-direction predictor and modulo operation}, journal = {J. Real Time Image Process.}, volume = {14}, number = {1}, pages = {137--145}, year = {2018}, url = {https://doi.org/10.1007/s11554-015-0548-9}, doi = {10.1007/S11554-015-0548-9}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/KimYKY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/YangKL18, author = {Ching{-}Nung Yang and Cheonshik Kim and Yen{-}Hung Lo}, title = {Adaptive real-time reversible data hiding for {JPEG} images}, journal = {J. Real Time Image Process.}, volume = {14}, number = {1}, pages = {147--157}, year = {2018}, url = {https://doi.org/10.1007/s11554-015-0555-x}, doi = {10.1007/S11554-015-0555-X}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/YangKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/KimKRY18, author = {Cheonshik Kim and Bryan Kim and Joel J. P. C. Rodrigues and James C. N. Yang}, title = {Special issue: Advanced technology for smart home automation and entertainment}, journal = {Pers. Ubiquitous Comput.}, volume = {22}, number = {1}, pages = {1--2}, year = {2018}, url = {https://doi.org/10.1007/s00779-017-1102-5}, doi = {10.1007/S00779-017-1102-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/KimKRY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/KimSY18, author = {Cheonshik Kim and Dongkyoo Shin and Ching{-}Nung Yang}, title = {Self-embedding fragile watermarking scheme to restoration of a tampered image using {AMBTC}}, journal = {Pers. Ubiquitous Comput.}, volume = {22}, number = {1}, pages = {11--22}, year = {2018}, url = {https://doi.org/10.1007/s00779-017-1061-x}, doi = {10.1007/S00779-017-1061-X}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/KimSY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/LeeBKY18, author = {Yong{-}Joon Lee and Namkyun Baik and Cheonshik Kim and Ching{-}Nung Yang}, title = {Study of detection method for spoofed {IP} against DDoS attacks}, journal = {Pers. Ubiquitous Comput.}, volume = {22}, number = {1}, pages = {35--44}, year = {2018}, url = {https://doi.org/10.1007/s00779-017-1097-y}, doi = {10.1007/S00779-017-1097-Y}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/LeeBKY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/LengGCK18, author = {Lu Leng and Fumeng Gao and Qi Chen and Cheonshik Kim}, title = {Palmprint recognition system on mobile devices with double-line-single-point assistance}, journal = {Pers. Ubiquitous Comput.}, volume = {22}, number = {1}, pages = {93--104}, year = {2018}, url = {https://doi.org/10.1007/s00779-017-1105-2}, doi = {10.1007/S00779-017-1105-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/LengGCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/FisherJBK18, author = {Paul S. Fisher and Jimmy James II and Jinsuk Baek and Cheonshik Kim}, title = {Mining intelligent solution to compensate missing data context of medical IoT devices}, journal = {Pers. Ubiquitous Comput.}, volume = {22}, number = {1}, pages = {219--224}, year = {2018}, url = {https://doi.org/10.1007/s00779-017-1106-1}, doi = {10.1007/S00779-017-1106-1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/FisherJBK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/YangHK17, author = {Ching{-}Nung Yang and Shen{-}Chieh Hsu and Cheonshik Kim}, title = {Improving stego image quality in image interpolation based data hiding}, journal = {Comput. Stand. Interfaces}, volume = {50}, pages = {209--215}, year = {2017}, url = {https://doi.org/10.1016/j.csi.2016.10.005}, doi = {10.1016/J.CSI.2016.10.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/YangHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/YangWYWK17, author = {Ching{-}Nung Yang and Chihi{-}Han Wu and Zong{-}Xuan Yeh and Daoshun Wang and Cheonshik Kim}, title = {A new sharing digital image scheme with clearer shadow images}, journal = {Comput. Stand. Interfaces}, volume = {51}, pages = {118--131}, year = {2017}, url = {https://doi.org/10.1016/j.csi.2016.11.015}, doi = {10.1016/J.CSI.2016.11.015}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/YangWYWK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LengLKB17, author = {Lu Leng and Ming Li and Cheonshik Kim and Xue Bi}, title = {Dual-source discrimination power analysis for multi-instance contactless palmprint recognition}, journal = {Multim. Tools Appl.}, volume = {76}, number = {1}, pages = {333--354}, year = {2017}, url = {https://doi.org/10.1007/s11042-015-3058-7}, doi = {10.1007/S11042-015-3058-7}, timestamp = {Sun, 16 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LengLKB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/KimSSY16, author = {Cheonshik Kim and Dongkyoo Shin and Dongil Shin and Ching{-}Nung Yang}, title = {Secure protection of video recorder video in smart car}, journal = {Int. J. Distributed Sens. Networks}, volume = {12}, number = {12}, year = {2016}, url = {https://doi.org/10.1177/1550147716681792}, doi = {10.1177/1550147716681792}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/KimSSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/BaekK16, author = {Jinsuk Baek and Cheonshik Kim}, title = {An energy-efficient video transport protocol for personal cloud-based computing}, journal = {J. Real Time Image Process.}, volume = {12}, number = {2}, pages = {303--310}, year = {2016}, url = {https://doi.org/10.1007/s11554-014-0475-1}, doi = {10.1007/S11554-014-0475-1}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/BaekK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/YangSYK16, author = {Ching{-}Nung Yang and Li{-}Zhe Sun and Xuehu Yan and Cheonshik Kim}, title = {Design a new visual cryptography for human-verifiable authentication in accessing a database}, journal = {J. Real Time Image Process.}, volume = {12}, number = {2}, pages = {483--494}, year = {2016}, url = {https://doi.org/10.1007/s11554-015-0511-9}, doi = {10.1007/S11554-015-0511-9}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/YangSYK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/KimY16a, author = {Cheonshik Kim and Ching{-}Nung Yang}, title = {Data hiding based on overlapped pixels using hamming code}, journal = {Multim. Tools Appl.}, volume = {75}, number = {23}, pages = {15651--15663}, year = {2016}, url = {https://doi.org/10.1007/s11042-014-2355-x}, doi = {10.1007/S11042-014-2355-X}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/KimY16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdcloud/LiuD0WBK16, author = {Chun{-}Chi Liu and Rong Du and Shengling Wang and Chenyu Wang and Rongfang Bie and Cheonshik Kim}, editor = {Zhipeng Cai and Rafal A. Angryk and Wen{-}Zhan Song and Yingshu Li and Xiaojun Cao and Anu G. Bourgeois and Guangchun Luo and Liang Cheng and Bhaskar Krishnamachari}, title = {Crowdsourcing Framework for Acoustic Sound Based Obstacle Echolocation through Smartphones for Visually Impaired}, booktitle = {2016 {IEEE} International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom), BDCloud-SocialCom-SustainCom 2016, Atlanta, GA, USA, October 8-10, 2016}, pages = {185--192}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/BDCloud-SocialCom-SustainCom.2016.38}, doi = {10.1109/BDCLOUD-SOCIALCOM-SUSTAINCOM.2016.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bdcloud/LiuD0WBK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiki/XuZBLKS16, author = {Shuaijing Xu and Guangzhi Zhang and Rongfang Bie and Wenshuang Liang and Cheonshik Kim and Dongkyoo Shin}, title = {Implicit Correlation Intensity Mining Based on the Monte Carlo Method with Attenuation}, booktitle = {International Conference on Identification, Information and Knowledge in the Internet of Things, {IIKI} 2016, Beijing, China, October 20-21, 2016}, pages = {275--278}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/IIKI.2016.23}, doi = {10.1109/IIKI.2016.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iiki/XuZBLKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/KimY15a, author = {Cheonshik Kim and Ching{-}Nung Yang}, title = {Watermark with {DSA} signature using predictive coding}, journal = {Multim. Tools Appl.}, volume = {74}, number = {14}, pages = {5189--5203}, year = {2015}, url = {https://doi.org/10.1007/s11042-013-1667-6}, doi = {10.1007/S11042-013-1667-6}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/KimY15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vjcs/HoaTKY15, author = {Le Quang Hoa and Nguyen Huy Truong and Cheonshik Kim and Ching{-}Nung Yang}, title = {(1, 7, 4) Data hiding scheme for searching in hidden text with automata}, journal = {Vietnam. J. Comput. Sci.}, volume = {2}, number = {4}, pages = {257--265}, year = {2015}, url = {https://doi.org/10.1007/s40595-015-0050-0}, doi = {10.1007/S40595-015-0050-0}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vjcs/HoaTKY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jim/KimSSTY14, author = {Cheonshik Kim and Dongkyoo Shin and Dongil Shin and Raylin Tso and Ching{-}Nung Yang}, title = {A secret sharing scheme for {EBTC} using steganography}, journal = {J. Intell. Manuf.}, volume = {25}, number = {2}, pages = {241--249}, year = {2014}, url = {https://doi.org/10.1007/s10845-012-0660-7}, doi = {10.1007/S10845-012-0660-7}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jim/KimSSTY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/Kim14, author = {Cheonshik Kim}, title = {Data hiding by an improved exploiting modification direction}, journal = {Multim. Tools Appl.}, volume = {69}, number = {3}, pages = {569--584}, year = {2014}, url = {https://doi.org/10.1007/s11042-012-1114-0}, doi = {10.1007/S11042-012-1114-0}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/Kim14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcc/KimY14, author = {Cheonshik Kim and Ching{-}Nung Yang}, editor = {James Jong Hyuk Park and Albert Y. Zomaya and Hwa{-}Young Jeong and Mohammad S. Obaidat}, title = {Improving Data Hiding Capacity Based on Hamming Code}, booktitle = {Frontier and Innovation in Future Computing and Communications, Proceedings of the 2014 {FTRA} International Symposium on Frontier and Innovation in Future Computing and Communications, {FCC} 2014, Auckland, New Zealand, January 13-16, 2014}, series = {Lecture Notes in Electrical Engineering}, volume = {301}, pages = {697--706}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-94-017-8798-7\_80}, doi = {10.1007/978-94-017-8798-7\_80}, timestamp = {Fri, 27 Mar 2020 08:55:45 +0100}, biburl = {https://dblp.org/rec/conf/fcc/KimY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KimBF14, author = {Cheonshik Kim and Jinsuk Baek and Paul S. Fisher}, editor = {Jooyoung Lee and Jongsung Kim}, title = {Lossless Data Hiding for Binary Document Images Using n n -Pairs Pattern}, booktitle = {Information Security and Cryptology - {ICISC} 2014 - 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8949}, pages = {317--327}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15943-0\_19}, doi = {10.1007/978-3-319-15943-0\_19}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KimBF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/KimY14, author = {Cheonshik Kim and Ching{-}Nung Yang}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Ching{-}Nung Yang}, title = {Steganography Based on Grayscale Images Using (5, 3) Hamming Code}, booktitle = {Digital-Forensics and Watermarking - 13th International Workshop, {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9023}, pages = {588--598}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-19321-2\_45}, doi = {10.1007/978-3-319-19321-2\_45}, timestamp = {Thu, 28 May 2020 12:51:40 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/KimY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/HuyK13, author = {Phan Trung Huy and Cheonshik Kim}, title = {Binary Image Data Hiding Using Matrix Encoding Technique in Sensors}, journal = {Int. J. Distributed Sens. Networks}, volume = {9}, year = {2013}, url = {https://doi.org/10.1155/2013/340963}, doi = {10.1155/2013/340963}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/HuyK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/HuyTKY13, author = {Phan Trung Huy and Nguyen Hai Thanh and Cheonshik Kim and Ching{-}Nung Yang}, title = {Data-Hiding for Halftone Images Using an Improved {CPT} scheme}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {7}, number = {2}, pages = {405--424}, year = {2013}, url = {https://doi.org/10.3837/tiis.2013.02.013}, doi = {10.3837/TIIS.2013.02.013}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/HuyTKY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/YangCSK13, author = {Ching{-}Nung Yang and Pin{-}Wei Chen and Hsiang{-}Wen Shih and Cheonshik Kim}, title = {Aspect ratio invariant visual cryptography by image filtering and resizing}, journal = {Pers. Ubiquitous Comput.}, volume = {17}, number = {5}, pages = {843--850}, year = {2013}, url = {https://doi.org/10.1007/s00779-012-0535-0}, doi = {10.1007/S00779-012-0535-0}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/YangCSK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gpc/OpuBHK13, author = {Md. Fazla Rabbi Opu and Emon Biswas and Mansura Habiba and Cheonshik Kim}, editor = {James J. Park and Hamid R. Arabnia and Cheonshik Kim and Weisong Shi and Joon{-}Min Gil}, title = {Architecture of a Context Aware Framework for Automated Mobile Device Configuration}, booktitle = {Grid and Pervasive Computing - 8th International Conference, {GPC} 2013 and Colocated Workshops, Seoul, Korea, May 9-11, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7861}, pages = {299--308}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38027-3\_32}, doi = {10.1007/978-3-642-38027-3\_32}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/gpc/OpuBHK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gpc/HuyKAHY13, author = {Phan Trung Huy and Cheonshik Kim and Nguyen Tuan Anh and Le Quang Hoa and Ching{-}Nung Yang}, editor = {James J. Park and Hamid R. Arabnia and Cheonshik Kim and Weisong Shi and Joon{-}Min Gil}, title = {Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules}, booktitle = {Grid and Pervasive Computing - 8th International Conference, {GPC} 2013 and Colocated Workshops, Seoul, Korea, May 9-11, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7861}, pages = {649--658}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38027-3\_70}, doi = {10.1007/978-3-642-38027-3\_70}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gpc/HuyKAHY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gpc/YoonCK13, author = {Eun{-}Jun Yoon and Yong Soo Choi and Cheonshik Kim}, editor = {James J. Park and Hamid R. Arabnia and Cheonshik Kim and Weisong Shi and Joon{-}Min Gil}, title = {New ID-Based Proxy Signature Scheme with Message Recovery}, booktitle = {Grid and Pervasive Computing - 8th International Conference, {GPC} 2013 and Colocated Workshops, Seoul, Korea, May 9-11, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7861}, pages = {945--951}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38027-3\_111}, doi = {10.1007/978-3-642-38027-3\_111}, timestamp = {Sat, 11 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gpc/YoonCK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gpc/2013, editor = {James J. Park and Hamid R. Arabnia and Cheonshik Kim and Weisong Shi and Joon{-}Min Gil}, title = {Grid and Pervasive Computing - 8th International Conference, {GPC} 2013 and Colocated Workshops, Seoul, Korea, May 9-11, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7861}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38027-3}, doi = {10.1007/978-3-642-38027-3}, isbn = {978-3-642-38026-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gpc/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/YangWLK12, author = {Ching{-}Nung Yang and Chih{-}Cheng Wu and Yi{-}Chin Lin and Cheonshik Kim}, title = {Enhanced Matrix-Based Secret Image Sharing Scheme}, journal = {{IEEE} Signal Process. Lett.}, volume = {19}, number = {12}, pages = {789--792}, year = {2012}, url = {https://doi.org/10.1109/LSP.2012.2220348}, doi = {10.1109/LSP.2012.2220348}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spl/YangWLK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aciids/KimSSY12, author = {Cheonshik Kim and Dongkyoo Shin and Dongil Shin and Ching{-}Nung Yang}, editor = {Jeng{-}Shyang Pan and Shyi{-}Ming Chen and Ngoc Thanh Nguyen}, title = {A (2, 2) Secret Sharing Scheme Based on Hamming Code and {AMBTC}}, booktitle = {Intelligent Information and Database Systems - 4th Asian Conference, {ACIIDS} 2012, Kaohsiung, Taiwan, March 19-21, 2012, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {7197}, pages = {129--139}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28490-8\_14}, doi = {10.1007/978-3-642-28490-8\_14}, timestamp = {Thu, 16 Mar 2023 20:00:29 +0100}, biburl = {https://dblp.org/rec/conf/aciids/KimSSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/npc/HongKKL12, author = {YouSik Hong and Hongkyun Kim and Cheonshik Kim and Geuk Lee}, editor = {James J. Park and Albert Y. Zomaya and Sang{-}Soo Yeo and Sartaj Sahni}, title = {New Electronic Acupuncture System Using Intelligence}, booktitle = {Network and Parallel Computing, 9th {IFIP} International Conference, {NPC} 2012, Gwangju, Korea, September 6-8, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7513}, pages = {524--531}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35606-3\_62}, doi = {10.1007/978-3-642-35606-3\_62}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/npc/HongKKL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/npc/LeeKC12, author = {Sangyong Lee and Cheonshik Kim and Seongah Chin}, editor = {James J. Park and Albert Y. Zomaya and Sang{-}Soo Yeo and Sartaj Sahni}, title = {An Optimized Sub-texture Mapping Technique for an Arbitrary Texture Considering Topology Relations}, booktitle = {Network and Parallel Computing, 9th {IFIP} International Conference, {NPC} 2012, Gwangju, Korea, September 6-8, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7513}, pages = {559--564}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35606-3\_66}, doi = {10.1007/978-3-642-35606-3\_66}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/npc/LeeKC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/YangYK11, author = {Ching{-}Nung Yang and Guo{-}Cin Ye and Cheonshik Kim}, title = {Data Hiding in Halftone Images by {XOR} Block-Wise Operation with Difference Minimization}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {5}, number = {2}, pages = {457--476}, year = {2011}, url = {https://doi.org/10.3837/tiis.2011.02.013}, doi = {10.3837/TIIS.2011.02.013}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/YangYK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aciids/KimSS11, author = {Cheonshik Kim and Dongkyoo Shin and Dongil Shin}, editor = {Ngoc Thanh Nguyen and Chonggun Kim and Adam Janiak}, title = {Data Hiding in a Halftone Image Using Hamming Code (15, 11)}, booktitle = {Intelligent Information and Database Systems - Third International Conference, {ACIIDS} 2011, Daegu, Korea, April 20-22, 2011, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {6592}, pages = {372--381}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20042-7\_38}, doi = {10.1007/978-3-642-20042-7\_38}, timestamp = {Thu, 16 Mar 2023 20:00:28 +0100}, biburl = {https://dblp.org/rec/conf/aciids/KimSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sta/KimSSZ11, author = {Cheonshik Kim and Dongkyoo Shin and Dongil Shin and Xinpeng Zhang}, editor = {James J. Park and Javier L{\'{o}}pez and Sang{-}Soo Yeo and Taeshik Shon and David Taniar}, title = {Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications}, booktitle = {Secure and Trust Computing, Data Management and Applications - 8th {FTRA} International Conference, {STA} 2011, Loutraki, Greece, June 28-30, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {186}, pages = {130--138}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22339-6\_16}, doi = {10.1007/978-3-642-22339-6\_16}, timestamp = {Fri, 22 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sta/KimSSZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/KimKCWZ10, author = {Hyoung Joong Kim and Cheonshik Kim and YongSoo Choi and Shuozhong Wang and X. Zhang}, title = {Improved modification direction methods}, journal = {Comput. Math. Appl.}, volume = {60}, number = {2}, pages = {319--325}, year = {2010}, url = {https://doi.org/10.1016/j.camwa.2010.01.006}, doi = {10.1016/J.CAMWA.2010.01.006}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cma/KimKCWZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/YoonYKHJC10, author = {Eun{-}Jun Yoon and Kee{-}Young Yoo and Cheonshik Kim and YouSik Hong and Minho Jo and Hsiao{-}Hwa Chen}, title = {A secure and efficient {SIP} authentication scheme for converged VoIP networks}, journal = {Comput. Commun.}, volume = {33}, number = {14}, pages = {1674--1681}, year = {2010}, url = {https://doi.org/10.1016/j.comcom.2010.03.026}, doi = {10.1016/J.COMCOM.2010.03.026}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/YoonYKHJC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnis/BaekKFC10, author = {Jinsuk Baek and Cheonshik Kim and Paul S. Fisher and Hongyang Chao}, title = {(N, 1) secret sharing approach based on steganography with gray digital images}, booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications, Networking and Information Security, {WCNIS} 2010, 25-27 June 2010, Beijing, China}, pages = {325--329}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WCINS.2010.5541793}, doi = {10.1109/WCINS.2010.5541793}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/wcnis/BaekKFC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/Kim10, author = {Cheonshik Kim}, editor = {Ngoc Thanh Nguyen and Radoslaw P. Katarzyniak and Shyi{-}Ming Chen}, title = {Data Hiding Based on Compressed Dithering Images}, booktitle = {Advances in Intelligent Information and Database Systems}, series = {Studies in Computational Intelligence}, volume = {283}, pages = {89--98}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12090-9\_8}, doi = {10.1007/978-3-642-12090-9\_8}, timestamp = {Thu, 16 Mar 2023 20:00:38 +0100}, biburl = {https://dblp.org/rec/series/sci/Kim10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ichit/HongOKICYJMKK09, author = {YouSik Hong and Sun{-}Jin Oh and Cheonshik Kim and Yong Soon Im and Gyoo{-}Seok Choi and Eun{-}Jun Yoon and Yu Cheol Jeon and Chanwoo Moon and Myeon{-}Koo Kang and Jeongsook Kim}, editor = {Geuk Lee and Daniel Howard and Jeong Jin Kang and Dominik Slezak and Tae Nam Ahn and Chung{-}Huang Yang}, title = {A study on intelligent cyber university}, booktitle = {Proceedings of the 2009 International Conference on Hybrid Information Technology, {ICHIT} 2009, Daejeon, Korea, August 27-29, 2009}, series = {{ACM} International Conference Proceeding Series}, volume = {321}, pages = {525--529}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1644993.1645091}, doi = {10.1145/1644993.1645091}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ichit/HongOKICYJMKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ichit/HongRKCKK09, author = {YouSik Hong and Su{-}Bong Ryou and Cheonshik Kim and Young Im Cho and Kyung{-}Sook Kim and Jeong Jin Kang}, editor = {Geuk Lee and Daniel Howard and Jeong Jin Kang and Dominik Slezak and Tae Nam Ahn and Chung{-}Huang Yang}, title = {Optimal green time calculation using artificial intelligence}, booktitle = {Proceedings of the 2009 International Conference on Hybrid Information Technology, {ICHIT} 2009, Daejeon, Korea, August 27-29, 2009}, series = {{ACM} International Conference Proceeding Series}, volume = {321}, pages = {632--636}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1644993.1645110}, doi = {10.1145/1644993.1645110}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ichit/HongRKCKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kesamsta/HongKL08, author = {YouSik Hong and Cheonshik Kim and Geuk Lee}, editor = {Ngoc Thanh Nguyen and GeunSik Jo and Robert J. Howlett and Lakhmi C. Jain}, title = {Study of Optimal Traffic Information Using Agents Techniques}, booktitle = {Agent and Multi-Agent Systems: Technologies and Applications, Second {KES} International Symposium, {KES-AMSTA} 2008, Incheon, Korea, March 26-28, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4953}, pages = {868--877}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78582-8\_88}, doi = {10.1007/978-3-540-78582-8\_88}, timestamp = {Thu, 16 Mar 2023 20:00:31 +0100}, biburl = {https://dblp.org/rec/conf/kesamsta/HongKL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kesamsta/HongLKK07, author = {YouSik Hong and Geuk Lee and Cheonshik Kim and Jong Won Kim}, editor = {Ngoc Thanh Nguyen and Adam Grzech and Robert J. Howlett and Lakhmi C. Jain}, title = {Traffic Signal Planning Using a Smart Agent System}, booktitle = {Agent and Multi-Agent Systems: Technologies and Applications, First {KES} International Symposium, {KES-AMSTA} 2007, Wroclaw, Poland, May 31- June 1, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4496}, pages = {938--947}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72830-6\_99}, doi = {10.1007/978-3-540-72830-6\_99}, timestamp = {Thu, 16 Mar 2023 20:00:31 +0100}, biburl = {https://dblp.org/rec/conf/kesamsta/HongLKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ichit/KimJAP06, author = {Cheonshik Kim and Myunghee Jung and Shaikh Muhammad Allayear and Sung{-}Soon Park}, editor = {Marcin S. Szczuka and Daniel Howard and Dominik Slezak and Haeng{-}Kon Kim and Tai{-}Hoon Kim and Il Seok Ko and Geuk Lee and Peter M. A. Sloot}, title = {Personalized E-Learning Process Using Effective Assessment and Feedback}, booktitle = {Advances in Hybrid Information Technology, First International Conference, {ICHIT} 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4413}, pages = {63--72}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-77368-9\_7}, doi = {10.1007/978-3-540-77368-9\_7}, timestamp = {Tue, 14 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ichit/KimJAP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuct/KimNPPH06, author = {Cheonshik Kim and San{-}Yep Nam and Duk{-}Je Park and Injung Park and Taek{-}Young Hyun}, editor = {Frank Stajano and Hyoung Joong Kim and Jong{-}Suk Chae and Seong{-}Dong Kim}, title = {Product Control System Using {RFID} Tag Information and Data Mining}, booktitle = {Ubiquitous Convergence Technology, First International Conference, {ICUCT} 2006, Jeju Island, Korea, December 5-6, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4412}, pages = {100--109}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71789-8\_11}, doi = {10.1007/978-3-540-71789-8\_11}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/icuct/KimNPPH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuct/AllayearPK06, author = {Shaikh Muhammad Allayear and Sung{-}Soon Park and Cheonshik Kim}, editor = {Frank Stajano and Hyoung Joong Kim and Jong{-}Suk Chae and Seong{-}Dong Kim}, title = {iSCSI Protocol Parameter Optimization for Mobile Appliance Remote Storage System at Smart Home Environment Approach}, booktitle = {Ubiquitous Convergence Technology, First International Conference, {ICUCT} 2006, Jeju Island, Korea, December 5-6, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4412}, pages = {110--119}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71789-8\_12}, doi = {10.1007/978-3-540-71789-8\_12}, timestamp = {Tue, 14 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icuct/AllayearPK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuct/ParkPK06, author = {Injung Park and Duk{-}Je Park and Cheonshik Kim}, editor = {Frank Stajano and Hyoung Joong Kim and Jong{-}Suk Chae and Seong{-}Dong Kim}, title = {Dynamic {EPG} Implementation for Ubiquitous Environment}, booktitle = {Ubiquitous Convergence Technology, First International Conference, {ICUCT} 2006, Jeju Island, Korea, December 5-6, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4412}, pages = {292--300}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71789-8\_30}, doi = {10.1007/978-3-540-71789-8\_30}, timestamp = {Wed, 24 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icuct/ParkPK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/igarss/JungYK05, author = {Myunghee Jung and Eui{-}Jung Yun and Cheonshik Kim}, title = {Multiresolution approach for texture segmentation using {MRF} models}, booktitle = {{IEEE} International Geoscience {\&} Remote Sensing Symposium, {IGARSS} 2005, July 25-29, 2005, Seoul, Korea, Proceedings}, pages = {3971--3974}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/IGARSS.2005.1525782}, doi = {10.1109/IGARSS.2005.1525782}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/igarss/JungYK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.