Pan-Koo Kim’s research while affiliated with Chosun University and other places


Ad

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (12)


Security Verification Software Platform of Data-efficient Image Transformer Based on Fast Gradient Sign Method
  • Conference Paper

June 2023

·

8 Reads

·

1 Citation

In-pyo Hong

·

Gyu-ho Choi

·

Pan-koo Kim

·


Figure 1. Example of electricity consumption data with missing values.
Figure 2. Calculation method of linear interpolation.
Figure 4. Power consumption data: abnormal data (non-stationary).
Figure 5. Comparison of linear interpolation results and real data.
Figure 6. Comparison between the real data and the results obtained from the past-similar-situation substitution method.

+21

A Missing Data Compensation Method Using LSTM Estimates and Weights in AMI System
  • Article
  • Full-text available

August 2021

·

132 Reads

·

3 Citations

Information

With the expansion of advanced metering infrastructure (AMI) installations, various additional services using AMI data have emerged. However, some data is lost in the communication process of data collection. Hence, to address this challenge, the estimation of the missing data is required. To estimate the missing values in the time-series data generated from smart meters, we investigated four methods, ranging from a conventional method to an estimation method applying long short-term memory (LSTM), which exhibits excellent performance in the time-series field, and provided the performance comparison data. Furthermore, because power usages represent estimates of data that are missing some values in the middle, rather than regular time-series estimation data, the simple estimation may lead to an error where the estimated accumulated power usage in the missing data is larger than the real accumulated power usage appearing in the data after the end of the missing data interval. Therefore, this study proposes a hybrid method that combines the advantages of the linear interpolation method and the LSTM estimation-based compensation method, rather than those of conventional methods adopted in the time-series field. The performance of the proposed method is more stable and better than that of other methods.

Download




Implementation of 1:N Communication Model Using Serial Communication in an RF-Based Environment

November 2018

·

8 Reads

Yeon-Ju Lee

·

Jeong-In Kim

·

Eun-Ji Lee

·

[...]

·

Pan-Koo Kim

The most important thing in the Internet of Things (IoT) is data transmission and reception between devices. Accordingly, various types of communication modules have been introduced. Currently, Bluetooth module is the most widely used but it is not suitable for 1:N communication since it performs 1:1 communication through pairing process. To overcome this limitation, the present paper proposes a model of data transmission and reception where 1:N communication can be done based on RF communication module using Arduino serial communication.





Detection of Cross Site Scripting Attack in Wireless Networks Using n-Gram and SVM

July 2012

·

75 Reads

·

10 Citations

Mobile Information Systems

Large parts of attacks targeting the web are aiming at the weak point of web application. Even though SQL injection, which is the form of XSS Cross Site Scripting attacks, is not a threat to the system to operate the web site, it is very critical to the places that deal with the important information because sensitive information can be obtained and falsified. In this paper, the method to detect themalicious SQL injection script code which is the typical XSS attack using n-Gram indexing and SVM Support Vector Machine is proposed. In order to test the proposed method, the test was conducted after classifying each data set as normal code and malicious code, and the malicious script code was detected by applying index term generated by n-Gram and data set generated by code dictionary to SVM classifier. As a result, when the malicious script code detection was conducted using n-Gram index term and SVM, the superior performance could be identified in detecting malicious script and the more improved results than existing methods could be seen in the malicious script code detection recall.


Ad

Citations (7)


... Through this structure, DeiT achieved outstanding performance, exceeding ViT with a smaller dataset than ViT [31]. However, similar to its predecessor, ViT, DeiT remains vulnerable to adversarial attacks, which pose a significant concern in the field of AI security [15]. ...

Reference:

Knowledge distillation vulnerability of DeiT through CNN adversarial attack
Security Verification Software Platform of Data-efficient Image Transformer Based on Fast Gradient Sign Method
  • Citing Conference Paper
  • June 2023

... An LSTM network is based on the ordinary recurrent neural network (RNN) [44], which controls the transmission of information within the network by gating the state and retains the important temporal state in each pass-through step in a long-time memory manner to achieve better prediction results. An LSTM model is generally applicable to various types of continuous temporal prediction models, such as traffic flow prediction [45], network attacks prediction [46], and missing data compensation [47]. Considering the possible discontinuity of DNS data, an additional LSTM variant, time-aware LSTM (T-LSTM) [48], was chosen for comparison in this paper. ...

A Missing Data Compensation Method Using LSTM Estimates and Weights in AMI System

Information

... The AMI operating system enables the convergence of various services such as remote meter reading, demand management, power consumption reduction, and power quality improvement based on a bi-directional communication between consumers and power companies [3]. The Table 1 is shows, Starting with the first phase of the AMI construction project for 2 million households in 2013, with a goal of completing the construction for a total of 22.5 million households by 2020, according to the new energy industry acceleration policy, the Korea Electric Power Corporation (KEPCO) completed the construction of AMI for approximately 6.8 million households by 2018 and 400 households in 2019, thereby handling AMI operations for approximately 10 million households [4]. However, it has become difficult to construct the AMI for all 22.5 million households by 2020, as originally planned. ...

Estimate method of missing data using Similarity in AMI system
  • Citing Article
  • December 2019

... In order to efficiently understand a document, if a user inputs a keyword then, the system must search for paragraphs including that keyword and extract them [8], [9]. Also, extracted paragraphs are analyzed to form important paragraphs and displayed to the user [10][11][12]. ...

A Study on the Short Text Categorization using SNS Feature Informations
  • Citing Article
  • June 2016

The Journal of Korean Institute of Information Technology

... In a different study [20], a method called "XSSChaser" was introduced, proposing a linear automated approach to prevent XSS attacks within web applications. This technique utilizes chain analysis to identify vulnerable patterns, effectively thwarting XSS attempts. ...

Detection of Cross Site Scripting Attack in Wireless Networks Using n-Gram and SVM
  • Citing Article
  • July 2012

Mobile Information Systems

... When using an information-based strategy, the accuracy of the knowledge bases would also affect the outcome. Many experiments have been conducted using Bayes theory [8], decision trees [9], Latent Semantic Analysis (LSA) [10], Support Vector Machine (SVM) [11], and other methods to help computers understand human language. Document comprehension remains a difficult challenge for systems. ...

Automatic Enrichment of Semantic Relation Network and Its Application to Word Sense Disambiguation
  • Citing Article
  • July 2011

IEEE Transactions on Knowledge and Data Engineering