Junho Choi

Junho Choi
  • Fairleigh Dickinson University

About

53
Publications
4,433
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
717
Citations
Current institution
Fairleigh Dickinson University

Publications

Publications (53)
Article
Full-text available
Recently, damages such as internal system intrusion, network and device vulnerability attacks, malicious code infection, and information leakage due to security attacks are increasing within the smart grid environment. Detailed and dynamic access control must be implemented to enable the power system in the smart grid environment to respond to such...
Chapter
We demonstrate a security threat of mouse data by differentiating the real mouse data from the dummy mouse data by deriving features to have high accuracy based on data science. Features appearing between the mouse coordinates input by the user are analyzed, and the feature is defined as a feature for machine learning models to derive a method of i...
Article
Full-text available
For a variety of cyber-attacks occurring in a power IoT-Cloud environment, conventional security intrusion incident detection and response technologies typically use pattern-and behavior-based statistical methods. However, they cannot provide fundamental solutions for a security intrusion or attacks, which are becoming more intelligent and diverse...
Conference Paper
The smart healthcare area is expanding its application to telemedicine, mobile health, EHR/EMR/PHR, wireless medical services, and precision medicine through a combination of Internet of Things (IoT) technologies. In the IoT environment, it is difficult to actively control packets and traffic using existing network technologies because multiple dev...
Article
Full-text available
Although many security systems with biometric information have appeared, they only have been used the static bio-information, e.g., a fingerprint, ris, and so on. However, because these values are permanent, the attackers can modify and abuse that. To overcome this problem, many researchers would like to use dynamic bio-information, e.g., electroca...
Conference Paper
Smart grid technology is the core technology for the next-generation power grid system with enhanced energy efficiency through decision-making communication between suppliers and consumers enabled by integrating the IoT into the existing grid. This open architecture allowing bilateral information exchange makes it vulnerable to various types of cyb...
Article
Full-text available
Hadoop uses the Hadoop distributed file system for storing big data, and uses MapReduce to process big data in cloud computing environments. Because Hadoop is optimized for large file sizes, it has difficulties processing large numbers of small files. A small file can be defined as any file that is significantly smaller than the Hadoop block size,...
Conference Paper
In this paper, a semi-supervised method for automatic keyword extraction of web documents using unconventional Markov Chain with conditional transition matrices for each distinct feature distributed by Transition Probability Distribution Generator (TPDG) is introduced. Since keywords are the set of the most appropriate and relevant words which defi...
Article
Full-text available
Recently, there have been many studies of health services combined with smart devices, gathering a user’ health lifelog and managing his or her health for the improvement of the quality of his or her life, using various sensors. However, previous works have problems in the extraction of patterns in person’s complex health lifelog, the analysis of c...
Conference Paper
Recently, a lot of users are increasing for searching travel information through smart devices such as, tourist attractions, accommodation, entertainment, local gourmet food and so on. A general method for recommendation system has a data sparseness and the first rate problem. This problem can be solved by ontology and inference rules. In this pape...
Conference Paper
Cyber hacking attacks based on malicious code are becoming diversified. Malicious code analysis is very important because static flow analysis can naturally be helpful as part of the detection process given that malicious codes can affect the data and control flow of a program. This paper introduces the representation method of the Control Flow Gra...
Article
The web services used on desktop can be accessed through a smartphone due to the development of smart devices. As the usage of smartphones increases, the importance of personal information security inside the smartphone is emphasized. The openness features of Android platform make a lot easier to develop an application and also deploying malicious...
Article
The majority of existing malware detection techniques detects malicious codes by identifying malicious behavior patterns. However, they have difficulty identifying new or modified malicious behaviors; consequently, new techniques that can effectively and accurately detect new malicious behaviors are crucial. This paper proposes a method that define...
Article
Most recommendation systems are based on historical data and profile files. The most common method is collaboration filtering. After analysis, a collaboration filtering recommender system differentiates one user profile from another to determine what to recommend. There has been substantial research on personalized social search. However, previous...
Article
In the field of “U-Healthcare Service”, many studies have been actively conducted to develop “smart device”-based healthcare applications that enable healthcare providers and patients to be better served through interoperations among various kinds of sensors and wireless network interfaces. In particular, contemporary intelligent healthcare service...
Conference Paper
This paper proposes a semantic weighting method to classify textural documents. Human lives in the world where web documents have a great potential and the amount of valuable information has been consistently growing over the year. There is a problem that finding relevant web documents corresponding to what users want is more difficult due to the h...
Article
Cloud computing is a more advanced technology for distributed processing, e.g., a thin client and grid computing, which is implemented by means of virtualization technology for servers and storages, and advanced network functionalities. However, this technology has certain disadvantages such as monotonous routing for attacks, easy attack method, an...
Conference Paper
Webservice is a software technology as the representative method of information communication currently used to create a dynamic system environment that is configured to fulfill its users’ needs. Therefore, analyzing log data that occurred at provision is being used as the significant basic data in webservice research. Thanks to development of Clou...
Article
Recently, as smart devices are equipped with various kinds of sensors and wireless network interface, many studies in the field of U-healthcare service have been in progress to provide smart device based medical applications to patients or healthcare providers. This paper is a variety of health-related Ontology available on the Internet and context...
Article
There are many security issues in cloud computing service environments, including virtualization, distributed big-data processing, serviceability, traffic management, application security, access control, authentication, and cryptography, among others. In particular, data access using various resources requires an authentication and access control...
Article
In Video data, moving object has temporal flow and spatial features, which can be expressed in spatio-temporal relation. The goal in this paper is the understanding of object movement of spatio-temporal relation through mapping between vocabulary and object movement. In this case, spatio-temporal relation consists of temporal relation obedient to t...
Article
Recently, various studies have been studying for measuring social relationship among online users by using social network service and expressing relationship through network. However, these previous researches did not consider the current time or generate relationships among the users, so they cannot clearly express the real time relationships amon...
Article
While users increasingly use such large multimedia data, more people use the cloud computing technology. It is necessary to manage large data in an efficient way, and to consider transmission efficiency for multimedia data of different quality. To this end, an important thing is to ensure efficient distribution of important resources (CPU, network...
Conference Paper
There are a lot of malicious codes on the internet and many research studies methods for detection of them. Generally, detection methods of malicious codes compare source codes through definition and analysis pattern of malicious codes. In this paper, proposed method is a malicious code detection using relations and concepts between codes pattern b...
Conference Paper
This paper proposed a method to classify textural documents using specified n-gram data set. Human lives in the world where web documents have a great potential and the amount of valuable information has been consistently growing over the year. There is a problem that finding relevant web documents corresponding to what users want is more difficult...
Article
In the existing methods for building and extension of Ontology, there is a manually worked form by professionals or a semi-automated method method uses the probability distribution of statistics through analysis of universal dictionary or thesaurus group. If it is produced manually, its accuracy for concept extraction and relation production is exc...
Article
Recent proliferation of multimedia data necessitates effective and efficient methods of retrieving of multimedia data. Especially, intelligent surveillance system needs semantic multimedia data processing. However, these studies are significantly insufficient to enable a complete semantic recognition in regard to semantic-based video retrieval. Cur...
Article
Ontology which is the fundamental for semantic web is getting important while the semantic information processing is developed. To build and extend ontologies, much of research has been proposed such as semi-automatic and full-automatic methods through analyzing raw text documents. However, the methods based on document set in specific domain have...
Conference Paper
As the use of the internet increases, the distribution of web based malicious code has also vastly increased. By inputting malicious code that can attack vulnerabilities, it enables one to perform various illegal acts, such as SQL Injection and Cross Site Scripting (XSS). Furthermore, an extensive amount of computer, network and human resources are...
Conference Paper
Full-text available
During the last decade, the emerging technology for video retrieval is mainly based on the content. However, semantic-based video retrieval has become more and more necessary for the humans especially the naive users who can only use the human language during retrieval. In this paper, we focus on semantic representation using topological and direct...
Article
Online Knowledge bases are utilized for semantic information processing such as WordNet. However, research indicates the existing knowledge base cannot cover all concepts used in talking and writing in the real world. It is necessary to use online knowledge base such as Wikipedia to resolve this limitation. Web document tagging generally chooses co...
Article
This paper contains contents about a text editor based on Google trigram and its performance. Google has constructed n-gram data from uni- to 5-gram through analyzing huge document set. The n-gram data is a representative type of collective intelligence. Especially, big grams such as 4 and 5-gram contain more detail semantic context (semantics). Ho...
Chapter
Knowledge bases such as WordNet are positively utilized for semantic information processing. However, much research indicates that the existing knowledge bases cannot cover all of concepts used in talking and writing in real world. To solve this limitation, this research suggests a method which enriches WordNet concepts through analyzing Wikipedia...
Article
This paper introduces new similarity measure for semantic document interconnections. Most existing work on Semantic Web has focused on semantics of keywords. However, this research proposes a content based document retrieval using semantic similarity between documents while basically including keyword based retrieval as well. With this method, exte...
Conference Paper
Nowadays, travel information is increasing to appeal the tourists on the web. Although there are numerous information provided on the web, the user gets puzzled in finding accurate information. In order to solve these web problems, the concept of semantic web comes into existence to have communication between human and computer.In this paper, we pr...
Conference Paper
An aim of this research is to grasp related words of unknown word. Currently, several lexical dictionaries have been developed for semantic retrieval such as WordNet and FrameNet. However, more new words are created in every day because of new trends, new paradigm, new technology, etc. And, it is impossible to contain all of these new words. The ex...
Conference Paper
This paper deals with a method for semantic keyword detection of web documents. While the document consists of many kinds of part-of-speech, we just consider noun words. We propose a method for measure of relation value that represents relationship between words occurred in the document using WordNet. We calculate concept weight that measures seman...
Conference Paper
The amount of multimedia information is rapidly increasing due to digital cameras and mobile telephones equipped with such devices. To interpret semantic of image, many researchers use keywords as textual annotation. However, current state of the art produces too many irrelevant keywords for images by annotator. They make bad retrieval result. In t...
Conference Paper
Most of the researchers have used spatio-temporal relations for retrieval in video. It’s just trajectory-based or content-based retrieval. However, we seldom retrieve information referring to semantics. So, in this paper, we propose a novel approach for motion recognition from the aspect of semantic meaning. This issue can be addressed through a hi...
Conference Paper
Nowadays, a lot of techniques have been applied for the detection of malicious behavior. However, the current techniques taken into practice are facing with the challenge of much variations of the original malicious behavior, and it is impossible to respond the new forms of behavior appropriately and timely. With the questions above, we suggest a n...
Conference Paper
In this paper, we introduce a novel method about how to recognize the human action/activity in video using motion verbs based on WordNet. We provide a more deterministic mapping, and then we have extended WordNet with a small, fixed vocabulary of highly salient attribute for human motion description.
Conference Paper
In studying the semantic web, the main area is to build web ontologies and create the relationships between concepts. Until now, the capabilities of markup languages for expressing the relationships have improved a great deal but it is insufficient for representing the temporal relationships. In this paper, we define the new axioms for representing...
Conference Paper
The core of the study into the semantic web is ontologies. Ontologies have been actively studied in many areas for a long time. There has been a great deal of effort reported in building ontologies. In the study of a semantic web, the ontologies are constructed using the RDF Schemas and OWL Capabilities. The RDF Schemas and OWL Capabilities can dea...
Conference Paper
Previous definitions of semantic similarity can be classified into two approaches. The node(information content)-based approach uses an entropy measure that is computed on the basis of child node population. The edge-based approach involves the use of the number of edges between two concepts within a hierarchical conceptual structure. The edge-base...
Conference Paper
Semantic content implies more than the simple identification of objects. Techniques for content-based image retrieval are not yet mature enough to recognize visual semantics completely. Therefore, it is necessary to use captions or text information attached to photos in the content-based information access of visual data. However, keyword-based ret...
Conference Paper
Semantic interpretation of image is incomplete without some mechanism for understanding semantic content that is not directly visible. For this reason, human assisted content-annotation through natural language is an attachment of textual description (i.e. a keyword, or a simple sentence) to image. However, keyword-based retrieval is in the level o...
Conference Paper
In this paper, we propose a mechanism for extracting semantic information from basketball video sequence using audio and video features. After we divide the input video into shots by a simple cut detection algorithm using visual information, we analyze audio signal data to predict the location of an important event from which a cheering sound happe...
Conference Paper
Recently, the rapid increase of the available amount of multimedia information has revealed an urgent need for developing intelligent methods for understanding and managing information. There are many features such as color, shape, texture and motion for semantic information in video data. Especially, the most important semantic information is base...
Article
Semantic interpretation of image is incomplete without some mechanism for understanding semantic content that is not directly visible. For this reason, human assisted content-annotation through natural language is an attachment of textual description (i.e, a keyword, or a simple sentence) to image. Textual annotations may convey name of a visual ob...

Network

Cited By