PUBLICATION
Publication List
Selected Papers
[2024-C-1] [BKCSA IF 2] Action-Concentrated Embedding Framework: This is your captain sign-tokening, LREC-COLING 2024, Torino, Accepted
[2023-J-3] [JCR JIF Top 1%] J. Kim, S. Park, M. Kim, Safety map: Disaster management road network for urban resilience, Sustainable Cities and Society, vol. 96(2023), 104650, 2023, https://doi.org/10.1016/j.scs.2023.104650 [KIAT-2020]
[2021-J-6] [JCR JIF Top 1%] J. Kim, G. Kim, M. Kim, RnR-SMART: Resilient Smart City evacuation plan based on Road Network Reconfiguration in outbreak response, Sustainable Cities and Society, 75(2021), 103386, 2021 [KISTI-2019][CAUGRS-2019]
[2021-J-5] Kim et al., Trend analysis using agglomerative hierarchical clustering approach for time series big data, Journal of Supercomputing, 77, 6505–6524, 2021 [NRF-2020]
[2021-J-3] [JCR JIF Top 10%] Kim et al.,, An Efficient Lung Nodule Segmentation System using Improved DA-NET, Mathematics, 9, 1457, 2021 [KHIDI-2019][KIAT-2021]
[2021-J-1] [JCR JIF Top 20%] J. Kim, M. Kim, Intelligent Mediator-based Enhanced Smart Contract for Privacy Protection, ACM Transactions on Internet Technology, Vol. 21, No. 1, 1-16, 2021 [KHIDI-2019]
[2018-J-3] [JCR JIF Top 10%]Crowdsourcing based scientific issue tracking with topic analysis, Applied Soft Computing, 66, pp. 506-511, 2018
[2018-J-1] The Impact of E-marketing Orientation on Performance in Asian SMEs: A B2B Perspective, Enterprise Information Systems, 12(1), 4-18, 2018
Journal Paper (2018.09 ~)
Analysis of deep learning on graph : a systematic literature review, In Preparation
Impirical Analysis of Graph Embedding for Relationship between Vulnerability Information, In Preparation
Only Graph Structure learning for robust Node Classification, Submitted
Degree-specific random walk strategy for graph embedding, Submitted
SafeWitness: Crowdsensing-based Geofencing Approach for Dynamic Disaster Risk Detection, Submitted
[2024-J-1] [Q4-JCR2022] Crowd movement based Geofence construction method for urban flood response, TIIS, Accepted
[2023-J-6] [Q2-JCR2022] Deep Learning-Assisted IoMT framework for Cerebral Microbleed Detection, Heliyon, 9(12), e22879, 2023, https://doi.org/10.1016/j.heliyon.2023.e22879 [KIAT-2020][NRF-2021]
[2023-J-5] Improvement of multistep-ahead bike-sharing demand prediction in Seoul based on a two-stage online learning forecasting model, Journal of Supercomputing, Accepted
[2023-J-4] [Q2-JCR2021] M. Shin, G. Park, A. Abraham, M. Kim,, Adaptive variable sampling model for performance analysis in high-performance computing environments, Heliyon,vol 9(6), e16777, 2023 https://doi.org/10.1016/j.heliyon.2023.e16777 [KIAT-2020][NRF-2021]
[2023-J-3] [Q1-JCR2021] J. Kim, S. Park, M. Kim, Safety map: Disaster management road network for urban resilience, Sustainable Cities and Society, vol. 96(2023), 104650, 2023, https://doi.org/10.1016/j.scs.2023.104650 [KIAT-2020]
[2023-J-2] [Q1-JCR2021] J. Jeon, J. Kim, M. Shin, M. Kim, A Blockchain -Based Trust Model for Supporting Collaborative Healthcare Data Management, Computer Systems Science and Engineering, Computer Systems Science and Engineering, Vol.46, No.3, pp. 3403-3421, 2023, DOI:10.32604/csse.2023.036658 [KHIDI-2019][KIAT-2020]
[2023-J-1] [Q2-JCR2021] T. Choe, J. Kim, pM. Shin, G. Kim, M. Kim, Complex Disaster Response Framework to Reduce Urban Disaster Vulnerability, Science Progress, 106(1), 00368504231152770, https://doi.org/10.1177/00368504231152770 [KIAT-20][KISTI-19][CAU-2021]
[2022-J-1] [Q2-JCR2021] Kim et al., An efficient recommender system algorithm using trust data, Journal of Supercomputing, 78(3), 3184-3204, 2022 [NRF-2020]
[2021-J-6] [Q1-JCR2020] J. Kim, G. Kim, M. Kim, RnR-SMART: Resilient Smart City evacuation plan based on Road Network Reconfiguration in outbreak response, Sustainable Cities and Society, 75(2021), 103386, 2021 [KISTI-2019][CAUGRS-2019]
[2021-J-5] [Q2-JCR2020] Kim et al., Trend analysis using agglomerative hierarchical clustering approach for time series big data, Journal of Supercomputing, 77, 6505–6524, 2021 [NRF-2020]
[2021-J-4] [Q2-JCR2020] M. Shin, G. Park, J. Lee, M. Kim, Application specific feature selection and clustering approach with HPC System profiling Data, Journal of Supercomputing, 77, 6817–6831, 2021 [KISTI-2020]
[2021-J-3] [Q1-JCR2020] Kim et al.,, An Efficient Lung Nodule Segmentation System using Improved DA-NET, Mathematics, 9, 1457, 2021 [KHIDI-2019][KIAT-2021]
[2021-J-2] [Q1-JCR2020] J. Kim, M. Kim, DeepBlockShield : Blockchain agent based Secured clinical data management model from Deep web Environment , Mathematics, 9(9), 1069, 2021 [KHIDI-2019][KIAT-2021]
[2021-J-1] [Q1-JCR2020] J. Kim, M. Kim, Intelligent Mediator-based Enhanced Smart Contract for Privacy Protection, ACM Transactions on Internet Technology, Vol. 21, No. 1, 1-16, 2021 [KHIDI-2019]
[2020-J-2] [Q4-JCR2019] J. Lee, M. Kim, G. Park, C. Park, Roofline-based Data Migration Methodology for Hybrid Memories, Journal of Internet Technology, 21(3), 855-864, 2020. [KISTI-2020]
[2020-J-1] [Q4-JCR2019] M. Kim, J. Kim, M. Shin, Word Embedding based text mining for extracting relationship in science data, Intelligent Automation & Soft Computing, 26, 141-147, 2020 [CAU-2019]
[2019-J-1] [Q1-JCR2018] Kim, et al., Feature Extraction from Oriental painting for Wellness Contents Recommendation Services, IEEE Access, 7(1), 59263-59270, 2019 [CAU-2018]
Conference Paper
**Anonimized Paper**, CIKM2024, under review
**Anonimized Paper**, CIKM2024, under review
[2024-C-1] Action-Concentrated Embedding Framework: This is your captain sign-tokening, LREC-COLING 2024, Torino, Accepted
[2022-C-3] Application of Recommendation System for Personalized Smart Home Care, ICTC2022, Jeju, 2022
[2022-C-2] Meta-learning-based lightweight learning framework for healthcare recommendation system, ICTC2022, Jeju, 2022
[2022-C-1] Luxating Patella and Obesity Prevention Device Model of Dogs Based on Vision Transformers, ICTC2022, Jeju, 2022
[2020-C-2] Blockchain based healthcare system with Artificial Intelligence, CSCI-20, Las Vegas, Dec, 2020
[2020-C-1] A Study on Blockchain-based Music Distribution Framework: Focusing on Copyright Protection, PlatCon-21, Jeju, Jan, 2020
[2019-C-4] Blockchain Development Status and Research Change Trend, Digicon-19, Daegu, Oct. 31- Nov. 2, 2019
[2019-C-3] Dimensional reduction method for effective analysis of many monitoring tools, Digicon-19, Daegu, Oct. 31- Nov. 2, 2019
[2019-C-2] A Study on Decision Support by Topic modeling, Digicon-19, Daegu, Oct. 31- Nov. 2, 2019
[2019-C-1] A Case Study for Block Chain in Smart Grid, PlatCon-19, Jeju, Jan. 28-30, 2019
[2018-C-2] HyDM: Data Migration Methodology for Hybrid Memories targeting Intel Knights Landing Processor, CICET, Taiwan, Oct. 29~31, 2018 (Best Paper Award)
[2018-C-1] PCA based Performance Analysis with System Profiling Data in Many-core System, CICET, Taiwan, Oct. 29~31, 2018
[2012-C-3] A Mobile-based Cognitive Social Influence Model for Recommender Systems, LNEE 179, pp.34-44, 2012
[2012-C-2] IPTV Contents Recommender System Based on a Social Network, LNEE 181, pp.123-127, 2012
[2012-C-1] The Method Based on Professionalism of Evaluator for Reliability Reputation Model, LNEE 181, pp.205-211, 2012
[2011-C-1] Group-Aware Social Trust Management for a Movie Recommender System, LNEE 107, pp.495-501, 2011
In Preparation
Patent List
개인정보 보호를 위한 비식별화 방법 및 장치
개인정보 보호를 위해 개선된 스마트 컨트랙트 기반의 지능형 중개를 위한 장치 및 방법
Journal Paper (~ 2018.08)
[2018-J-5] Sustainable Situation-aware Recommendation Services with Collective Intelligence, Sustainability, Sustainability 10(5), 1632, 2018
[2018-J-4] Cognitive social network analysis for supporting the reliable decision-making process. The Journal of Supercomputing 74(8) 3654-3665, 2018.
[2018-J-3] Crowdsourcing based scientific issue tracking with topic analysis, Applied Soft Computing, 66, pp. 506-511, 2018
[2018-k-1] 공공데이터를 활용한 창업 장소 분석 시스템 설계, 한국디지털콘텐츠학회논문지, 19(3), 425-433, 2018
[2018-J-2] Multimedia based student-teacher smart interaction framework using multi-agents in eLearning. Multimedia Tools and Applications 77, no. 4, 5003-5026, 2018
[2018-J-1] The Impact of E-marketing Orientation on Performance in Asian SMEs: A B2B Perspective, Enterprise Information Systems, 12(1), 4-18, 2018
[2017-J-3] Chrological big data curation: A study on the enhanced information retrieval system. IEEE Access, 5, pp.11269-11277, 2017
[2017-k-1] 노인의 외모관리가 심리적 적응과 사회적 유대관계에 미치는 영향에서 인터넷 쇼핑경험의 조절효과 : 가상현실예술융합의 필요성 탐색을 기반으로, 한국컴퓨터게임학회논문지, 30(3), pp. 77-85, 2017
[2017-J-2] Real-time imaging-based assessment model for improving teaching performance and student experience in e-learning, Journal of Real-Time Image Processing, 13(3), pp. 491-504, 2017
[2017-J-1] Uncertain clustering algorithms based on rough and fuzzy sets for real-time image segmentation, Journal of Real-Time Image Processing, 13(3), pp. 645-663, 2017
[2016-J-7] Resource Management Model based on Cloud Computing Environment, International Journal of Distributed Sensor Networks (Sage), 12(11), pp.1-7, 2016. doi: 10.1177/1550147716676554
[2016-J-7] Context-Aware Recommendation Model based on Mobile Application Analysis Platform, Journal of Multimedia Tools and Applications(Springer), 75(22), pp. 14783-14794, 2016
[2016-J-6] An object localization optimization technique in medical images using plant growth simulation algorithm, SpringerPlus(Springer), 5(1784), 2016
[2016-J-5] Big-data: transformation from heterogeneous data to semantically-enriched simplified data, Journal of Multimedia Tools and Applications(Springer), 75(20), pp. 12727-12747, 2016
[2016-J-4] Scientific trend analysis and Curation with Korean R&D information, Journal of Supercomputing(Springer), 72(9), pp. 3663-3673, 2016
[2016-J-3] Mixed scheduling with heterogeneous delay constraints in cyber-physical systems, Future Generation Computer Systems(Elsevier), 61, pp. 108–117, 2016
[2016-J-2] Cross-Layer Opportunistic Scheduling for Device-to-Device Video Multicast Services, ACM Transactions on Embedded Computing System, Vol. 15(2), Article 37 ,2016
[2016-J-1] A robust ensemble-based trust and reputation system against different types of intruder attacks", International Journal of Computer Mathematics (Taylor&Francis), Vol. 93(2), pp. 308-324 ,2016
[2016-k-1] 과학기술용어 간 관계 도출을 위한 토픽 분석 연구, 한국전자거래학회, 21(1), pp.119-129, 2016
[2015-J-4] Dynamic knowledge management from multiple sources in crowdsourcing environments, New review of hypermedia and multimedia(Taylor&Francis), Vol. 21(3-4), pp. 199-211, 2015
[2015-J-3] Image Denoising Based on Improved Wavelet Threshold Function for Wireless Camera Networks and Transmissions, International Journal of Distributed Sensor Networks (Hindawi), 11(9), Article ID 670216, 2015
[2015-J-2] Dependability and Reliability Analysis of Intra Cluster Routing Techniques, Peer-to-Peer Networking and Applications, Vol. 8(5), pp. 838-850, 2015
[2015-k-1] 멀티미디어 콘텐츠의 맞춤형 정보 제공 연구, 한국전자거래학회, 20(3), pp.79-87, 2015
[2015-J-1] Impact of Dynamic Path Loss Models in an Urban Obstacle Aware Adhoc Network Environment, Journal of Sensors(Hindawi), Vol. 2015, Article ID 286270, 2015
[2014-J-3] A Study on Enhanced Security Monitoring in University Network Environments, Journal of Platform Technology, 2(4), pp. 49-55, 2014
[2014-J-2] A Method of Evaluating Trust and Reputation for Online Transaction, Computing And Informatics, Vol. 33(5), 1095-1115, 2014
[2014-J-1] CAPNet: An Enhanced Load-Balancing Clustering Algorithm for Prolonging Network Lifetime in WSNs, International Journal of Distributed Sensor Networks (Hindawi), 10(2), 2014, Article ID 234394
[2013-J-4] The Method of Personalized Recommendation with Ensemble Combination, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 4(4), 108-121, 2013.12
[2013-J-3] Trust management on user behavioral patterns for a mobile cloud computing, Cluster Computing(Springer) , Vol 16, No. 4 pp. 725-731, 2013
[2013-J-2] Tag based collaborative Knowledge management system with crowdsourcing, Journal of Internet Technology(Taiwan Academic Network), Vol. 14, No. 5, 859-866
[2013-J-1] Group affinity based social trust model for an intelligent movie recommender system, Journal of Multimedia Tools and Applications(Springer), Vol 64, No 2. pp. 505-516, 2013
[2012-J-1] Identity Management based Social Trust Model for mediating an Information Sharing and a Privacy Enhancement, Security and Communication Networks(Wiley), Vol 5, No 8. pp.887-897, 2012
[2011-J-1] Trust and Risk based Access Control and Access Control Constraints, KSII Transactions on Internet and Information Systems, Vol. 5, No. 11. pp.2254-2271, 2011
[2010-J-1] Reliable Social Trust Management for Mitigating sparsity problem, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol. 1, No.1, pp.86-97, 2010
[2009-J-1] Optimized Algorithm for Balancing Clusters in Wireless Sensor Networks, Journal of Zhejiang University-SCIENCE A, Vol. 10, No.10, pp.1404-1412, 2009
[2008-J-1] Valuable Resources for Personalized Web in Web 3.0 Generations, International Journal of Web Services Practices, Vol. 3, No.2, pp.53-56, 2008