Follow
Changhun Jung
Title
Cited by
Cited by
Year
W-net: a CNN-based architecture for white blood cells image classification
C Jung, M Abuhamad, J Alikhanov, A Mohaisen, K Han, DH Nyang
arXiv preprint arXiv:1910.01091, 2019
292019
WBC image classification and generative models based on convolutional neural network
C Jung, M Abuhamad, D Mohaisen, K Han, DH Nyang
BMC Medical Imaging 22 (1), 1-16, 2022
152022
A Study of User Behavior Recognition-Based PIN Entry Using Machine Learning Technique
C Jung, Z Dagvatur, RH Jang, DH Nyang, KH Lee
KIPS Transactions on Computer and Communication Systems 7 (5), 127-136, 2018
72018
A Mobile Customization Technique using Push Service
CH Jung, JH Ye, CJ Kim
Journal of the Korea Academia-Industrial Cooperation Society 14 (9), 4498-4506, 2013
62013
A network-independent tool-based usable authentication system for Internet of Things devices
C Jung, J Choi, R Jang, D Mohaisen, DH Nyang
Computers & Security 108, 102338, 2021
52021
A one-page text entry method optimized for rectangle smartwatches
R Jang, C Jung, D Mohaisen, K Lee, D Nyang
IEEE Transactions on Mobile Computing 21 (10), 3443-3454, 2021
52021
Digitalseal: a transaction authentication tool for online and offline transactions
C Jung, J Kang, A Mohaisen, DH Nyang
2018 IEEE International Conference on Acoustics, Speech and Signal …, 2018
42018
A Dynamic Location Recognition Technique for Location-based Service
C Jung, C Kim
Journal of the Korea Academia-Industrial cooperation Society 15 (7), 4562-4572, 2014
42014
Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows
DN Dao, R Jang, C Jung, D Mohaisen, DH Nyang
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022
32022
Count-less: A counting sketch for the data plane of high speed switches
SY Kim, C Jung, RH Jang, D Mohaisen, DH Nyang
arXiv preprint arXiv:2111.02759, 2021
22021
Technique for PIN Entry Using an Accelerometer Sensor and a Vibration Sensor on Smartphone
C Jung, RH Jang, DH Nyang, KH Lee
KIPS Transactions on Computer and Communication Systems 6 (12), 497-506, 2017
22017
A method for generating robust key from face image and user intervention
H Kim, JC Choi, C Jung, DH Nyang, KH Lee
Journal of the Korea Institute of Information Security & Cryptology 27 (5 …, 2017
22017
Enhancing RCC (Recyclable counter with confinement) with cuckoo hashing
R Jang, C Jung, K Kim, D Nyang, KH Lee
The Journal of Korean Institute of Communications and Information Sciences …, 2016
22016
A Scalable and Dynamic ACL System for In-Network Defense
C Jung, S Kim, R Jang, D Mohaisen, DH Nyang
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
12022
White Blood Cells (WBC) Images Classification Using CNN-Based Networks
C Jung, M Abuhamad, D Mohaisen, K Han, DH Nyang
12021
SHIELD: Thwarting Code Authorship Attribution
M Abuhamad, C Jung, D Mohaisen, DH Nyang
arXiv preprint arXiv:2304.13255, 2023
2023
Wall Cuckoo. A Method for Reducing Memory Access Using Hash Function Categorization
S Moon, D Min, R Jang, C Jung, D NYang, K Lee
KIPS Transactions on Computer and Communication Systems 8 (6), 127-138, 2019
2019
A Study of Flying Intrusion Detector using the Drone
L Juha, C Jung, DH Nyang
Proceedings of the Korea Information Processing Society Conference, 326-329, 2017
2017
Digital Legal Seal for Message Authentication Code
CH Jung, DO Shin, RH Jang, DH Nyang, KH Lee, HY Youm
Journal of the Korea Institute of Information Security & Cryptology 26 (2 …, 2016
2016
오디오 채널을 이용하는 인증 시스템의 동향
정창훈, 양대헌
정보보호학회지 25 (3), 29-35, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–20