
Junho Choi- Fairleigh Dickinson University
Junho Choi
- Fairleigh Dickinson University
About
53
Publications
4,433
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
717
Citations
Current institution
Publications
Publications (53)
Recently, damages such as internal system intrusion, network and device vulnerability attacks, malicious code infection, and information leakage due to security attacks are increasing within the smart grid environment. Detailed and dynamic access control must be implemented to enable the power system in the smart grid environment to respond to such...
We demonstrate a security threat of mouse data by differentiating the real mouse data from the dummy mouse data by deriving features to have high accuracy based on data science. Features appearing between the mouse coordinates input by the user are analyzed, and the feature is defined as a feature for machine learning models to derive a method of i...
For a variety of cyber-attacks occurring in a power IoT-Cloud environment, conventional security intrusion incident detection and response technologies typically use pattern-and behavior-based statistical methods. However, they cannot provide fundamental solutions for a security intrusion or attacks, which are becoming more intelligent and diverse...
The smart healthcare area is expanding its application to telemedicine, mobile health, EHR/EMR/PHR, wireless medical services, and precision medicine through a combination of Internet of Things (IoT) technologies. In the IoT environment, it is difficult to actively control packets and traffic using existing network technologies because multiple dev...
Although many security systems with biometric information have appeared, they only have been used the static bio-information, e.g., a fingerprint, ris, and so on. However, because these values are permanent, the attackers can modify and abuse that. To overcome this problem, many researchers would like to use dynamic bio-information, e.g., electroca...
Smart grid technology is the core technology for the next-generation power grid system with enhanced energy efficiency through decision-making communication between suppliers and consumers enabled by integrating the IoT into the existing grid. This open architecture allowing bilateral information exchange makes it vulnerable to various types of cyb...
Hadoop uses the Hadoop distributed file system for storing big data, and uses MapReduce to process big data in cloud computing environments. Because Hadoop is optimized for large file sizes, it has difficulties processing large numbers of small files. A small file can be defined as any file that is significantly smaller than the Hadoop block size,...
In this paper, a semi-supervised method for automatic keyword extraction of web documents using unconventional Markov Chain with conditional transition matrices for each distinct feature distributed by Transition Probability Distribution Generator (TPDG) is introduced. Since keywords are the set of the most appropriate and relevant words which defi...
Recently, there have been many studies of health services combined with smart devices, gathering a user’ health lifelog and managing his or her health for the improvement of the quality of his or her life, using various sensors. However, previous works have problems in the extraction of patterns in person’s complex health lifelog, the analysis of c...
Recently, a lot of users are increasing for searching travel information through smart devices such as, tourist attractions, accommodation, entertainment, local gourmet food and so on. A general method for recommendation system has a data sparseness and the first rate problem. This problem can be solved by ontology and inference rules. In this pape...
Cyber hacking attacks based on malicious code are becoming diversified. Malicious code analysis is very important because static flow analysis can naturally be helpful as part of the detection process given that malicious codes can affect the data and control flow of a program. This paper introduces the representation method of the Control Flow Gra...
The web services used on desktop can be accessed through a smartphone due to the development of smart devices. As the usage of smartphones increases, the importance of personal information security inside the smartphone is emphasized. The openness features of Android platform make a lot easier to develop an application and also deploying malicious...
The majority of existing malware detection techniques detects malicious codes by identifying malicious behavior patterns. However, they have difficulty identifying new or modified malicious behaviors; consequently, new techniques that can effectively and accurately detect new malicious behaviors are crucial. This paper proposes a method that define...
Most recommendation systems are based on historical data and profile files. The most common method is collaboration filtering. After analysis, a collaboration filtering recommender system differentiates one user profile from another to determine what to recommend. There has been substantial research on personalized social search. However, previous...
In the field of “U-Healthcare Service”, many studies have been actively conducted to develop “smart device”-based healthcare applications that enable healthcare providers and patients to be better served through interoperations among various kinds of sensors and wireless network interfaces. In particular, contemporary intelligent healthcare service...
This paper proposes a semantic weighting method to classify textural documents. Human lives in the world where web documents have a great potential and the amount of valuable information has been consistently growing over the year. There is a problem that finding relevant web documents corresponding to what users want is more difficult due to the h...
Cloud computing is a more advanced technology for distributed processing, e.g., a thin client and grid computing, which is implemented by means of virtualization technology for servers and storages, and advanced network functionalities. However, this technology has certain disadvantages such as monotonous routing for attacks, easy attack method, an...
Webservice is a software technology as the representative method of information communication currently used to create a dynamic system environment that is configured to fulfill its users’ needs. Therefore, analyzing log data that occurred at provision is being used as the significant basic data in webservice research. Thanks to development of Clou...
Recently, as smart devices are equipped with various kinds of sensors and wireless network interface, many studies in the field of U-healthcare service have been in progress to provide smart device based medical applications to patients or healthcare providers. This paper is a variety of health-related Ontology available on the Internet and context...
There are many security issues in cloud computing service environments, including virtualization, distributed big-data processing, serviceability, traffic management, application security, access control, authentication, and cryptography, among others. In particular, data access using various resources requires an authentication and access control...
In Video data, moving object has temporal flow and spatial features, which can be expressed in spatio-temporal relation. The goal in this paper is the understanding of object movement of spatio-temporal relation through mapping between vocabulary and object movement. In this case, spatio-temporal relation consists of temporal relation obedient to t...
Recently, various studies have been studying for measuring social relationship among online users by using social network service and expressing relationship through network. However, these previous researches did not consider the current time or generate relationships among the users, so they cannot clearly express the real time relationships amon...
While users increasingly use such large multimedia data, more people use the cloud computing technology. It is necessary to manage large data in an efficient way, and to consider transmission efficiency for multimedia data of different quality. To this end, an important thing is to ensure efficient distribution of important resources (CPU, network...
There are a lot of malicious codes on the internet and many research studies methods for detection of them. Generally, detection methods of malicious codes compare source codes through definition and analysis pattern of malicious codes. In this paper, proposed method is a malicious code detection using relations and concepts between codes pattern b...
This paper proposed a method to classify textural documents using specified n-gram data set. Human lives in the world where web documents have a great potential and the amount of valuable information has been consistently growing over the year. There is a problem that finding relevant web documents corresponding to what users want is more difficult...
In the existing methods for building and extension of Ontology, there is a manually worked form by professionals or a semi-automated method method uses the probability distribution of statistics through analysis of universal dictionary or thesaurus group. If it is produced manually, its accuracy for concept extraction and relation production is exc...
Recent proliferation of multimedia data necessitates effective and efficient methods of retrieving of multimedia data. Especially, intelligent surveillance system needs semantic multimedia data processing. However, these studies are significantly insufficient to enable a complete semantic recognition in regard to semantic-based video retrieval. Cur...
Ontology which is the fundamental for semantic web is getting important while the semantic information processing is developed. To build and extend ontologies, much of research has been proposed such as semi-automatic and full-automatic methods through analyzing raw text documents. However, the methods based on document set in specific domain have...
As the use of the internet increases, the distribution of web based malicious code has also vastly increased. By inputting malicious code that can attack vulnerabilities, it enables one to perform various illegal acts, such as SQL Injection and Cross Site Scripting (XSS). Furthermore, an extensive amount of computer, network and human resources are...
During the last decade, the emerging technology for video retrieval is mainly based on the content. However, semantic-based
video retrieval has become more and more necessary for the humans especially the naive users who can only use the human language
during retrieval. In this paper, we focus on semantic representation using topological and direct...
Online Knowledge bases are utilized for semantic information processing such as WordNet. However, research indicates the existing knowledge base cannot cover all concepts used in talking and writing in the real world. It is necessary to use online knowledge base such as Wikipedia to resolve this limitation. Web document tagging generally chooses co...
This paper contains contents about a text editor based on Google trigram and its performance. Google has constructed n-gram data from uni- to 5-gram through analyzing huge document set. The n-gram data is a representative type of collective intelligence. Especially, big grams such as 4 and 5-gram contain more detail semantic context (semantics). Ho...
Knowledge bases such as WordNet are positively utilized for semantic information processing. However, much research indicates
that the existing knowledge bases cannot cover all of concepts used in talking and writing in real world. To solve this limitation,
this research suggests a method which enriches WordNet concepts through analyzing Wikipedia...
This paper introduces new similarity measure for semantic document interconnections. Most existing work on Semantic Web has focused on semantics of keywords. However, this research proposes a content based document retrieval using semantic similarity between documents while basically including keyword based retrieval as well. With this method, exte...
Nowadays, travel information is increasing to appeal the tourists on the web. Although there are numerous information provided on the web, the user gets puzzled in finding accurate information. In order to solve these web problems, the concept of semantic web comes into existence to have communication between human and computer.In this paper, we pr...
An aim of this research is to grasp related words of unknown word. Currently, several lexical dictionaries have been developed for semantic retrieval such as WordNet and FrameNet. However, more new words are created in every day because of new trends, new paradigm, new technology, etc. And, it is impossible to contain all of these new words. The ex...
This paper deals with a method for semantic keyword detection of web documents. While the document consists of many kinds of part-of-speech, we just consider noun words. We propose a method for measure of relation value that represents relationship between words occurred in the document using WordNet. We calculate concept weight that measures seman...
The amount of multimedia information is rapidly increasing due to digital cameras and mobile telephones equipped with such devices. To interpret semantic of image, many researchers use keywords as textual annotation. However, current state of the art produces too many irrelevant keywords for images by annotator. They make bad retrieval result. In t...
Most of the researchers have used spatio-temporal relations for retrieval in video. It’s just trajectory-based or content-based
retrieval. However, we seldom retrieve information referring to semantics. So, in this paper, we propose a novel approach
for motion recognition from the aspect of semantic meaning. This issue can be addressed through a hi...
Nowadays, a lot of techniques have been applied for the detection of malicious behavior. However, the current techniques taken
into practice are facing with the challenge of much variations of the original malicious behavior, and it is impossible to
respond the new forms of behavior appropriately and timely. With the questions above, we suggest a n...
In this paper, we introduce a novel method about how to recognize the human action/activity in video using motion verbs based
on WordNet. We provide a more deterministic mapping, and then we have extended WordNet with a small, fixed vocabulary of highly
salient attribute for human motion description.
In studying the semantic web, the main area is to build web ontologies and create the relationships between concepts. Until
now, the capabilities of markup languages for expressing the relationships have improved a great deal but it is insufficient
for representing the temporal relationships. In this paper, we define the new axioms for representing...
The core of the study into the semantic web is ontologies. Ontologies have been actively studied in many areas for a long
time. There has been a great deal of effort reported in building ontologies. In the study of a semantic web, the ontologies
are constructed using the RDF Schemas and OWL Capabilities. The RDF Schemas and OWL Capabilities can dea...
Previous definitions of semantic similarity can be classified into two approaches. The node(information content)-based approach uses an entropy measure that is computed on the basis of child node population. The edge-based approach involves the use of the number of edges between two concepts within a hierarchical conceptual structure. The edge-base...
Semantic content implies more than the simple identification of objects. Techniques for content-based image retrieval are
not yet mature enough to recognize visual semantics completely. Therefore, it is necessary to use captions or text information
attached to photos in the content-based information access of visual data. However, keyword-based ret...
Semantic interpretation of image is incomplete without some mechanism for understanding semantic content that is not directly visible. For this reason, human assisted content-annotation through natural language is an attachment of textual description (i.e. a keyword, or a simple sentence) to image. However, keyword-based retrieval is in the level o...
In this paper, we propose a mechanism for extracting semantic information from basketball video sequence using audio and video
features. After we divide the input video into shots by a simple cut detection algorithm using visual information, we analyze
audio signal data to predict the location of an important event from which a cheering sound happe...
Recently, the rapid increase of the available amount of multimedia information has revealed an urgent need for developing
intelligent methods for understanding and managing information. There are many features such as color, shape, texture and
motion for semantic information in video data. Especially, the most important semantic information is base...
Semantic interpretation of image is incomplete without some mechanism for understanding semantic content that is not directly visible. For this reason, human assisted content-annotation through natural language is an attachment of textual description (i.e, a keyword, or a simple sentence) to image. Textual annotations may convey name of a visual ob...