A survey on activities of daily living and occupations of upper extremity amputees CH Jang, HS Yang, HE Yang, SY Lee, JW Kwon, BD Yun, JY Choi, ... Annals of rehabilitation medicine 35 (6), 907-921, 2011 | 190 | 2011 |
LoRaWAN-based energy-efficient surveillance by drones for intelligent transportation systems V Sharma, I You, G Pau, M Collotta, JD Lim, JN Kim Energies 11 (3), 573, 2018 | 105 | 2018 |
A security protocol for route optimization in DMM-based smart home IoT networks D Shin, K Yun, J Kim, PV Astillo, JN Kim, I You IEEE Access 7, 142531-142550, 2019 | 87 | 2019 |
Multimodal biometric method that combines veins, prints, and shape of a finger BJ Kang, KR Park, JH Yoo, JN Kim Optical Engineering 50 (1), 017201-017201-13, 2011 | 56 | 2011 |
Access control method using token having security attributes in computer system SK Eun, JN Kim, JG Ko, SY Doo, JS Yu, JD Lim US Patent 7,290,279, 2007 | 52 | 2007 |
Android mobile application system call event pattern analysis for determination of malicious attack YJ Ham, D Moon, HW Lee, JD Lim, JN Kim International Journal of Security and Its Applications 8 (1), 231-246, 2014 | 47 | 2014 |
Evaluation of DNA extraction methods and their clinical application for direct detection of causative bacteria in continuous ambulatory peritoneal dialysis culture fluids from … SH Kim, HS Jeong, YH Kim, S Am Song, JY Lee, SH Oh, HR Kim, JN Lee, ... Annals of laboratory medicine 32 (2), 119, 2012 | 41 | 2012 |
System and method of verifying integrity of software SW Park, GL Kim, KS Lim, JD Lim, JN Kim US Patent 9,867,051, 2018 | 36 | 2018 |
SACA: Self‐Aware Communication Architecture for IoT Using Mobile Fog Servers V Sharma, JD Lim, JN Kim, I You Mobile Information Systems 2017 (1), 3273917, 2017 | 35 | 2017 |
Design and implementation of integrated security engine for secure networking JN Kim, K seok Lee, C Lee The 6th International Conference on Advanced Communication Technology, 2004 …, 2004 | 23 | 2004 |
Self-enforcing game theory-based resource allocation for LoRaWAN assisted public safety communications V Sharma, G Choudhary, I You, JD Lim, JN Kim arXiv preprint arXiv:1804.07204, 2018 | 22 | 2018 |
Analysis of eavesdropping attack in mmWave-based WPANs with directional antennas M Kim, E Hwang, JN Kim Wireless Networks 23, 355-369, 2017 | 20 | 2017 |
A practical implementation of fuzzy fingerprint vault for smart cards D Moon, Y Chung, C Seo, SY Kim, JN Kim Journal of intelligent Manufacturing 25, 293-302, 2014 | 19 | 2014 |
Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications SR Kim, JN Kim, ST Kim, S Shin, JH Yi The Journal of Supercomputing 74, 4261-4280, 2018 | 18 | 2018 |
Technology trends of access control in IoT and requirements analysis Y Lee, J Lim, Y Jeon, J Kim 2015 International conference on information and communication technology …, 2015 | 18 | 2015 |
A secure storage system for sensitive data protection based on mobile virtualization SW Park, JD Lim, JN Kim International Journal of Distributed Sensor Networks 11 (2), 929380, 2015 | 17 | 2015 |
Building secure execution environment for mobile platform YH Kim, JN Kim 2011 First ACIS/JNU International Conference on Computers, Networks, Systems …, 2011 | 15 | 2011 |
Access control for secure freebsd operating system JG Ko, JN Kim, KI Jeong Proc. of WISA2001, The Second International Workshop on Information Security …, 2001 | 15 | 2001 |
Secure mobile device structure for trust IoT Y Lee, J Kim, KS Lim, H Yoon The Journal of Supercomputing 74, 6646-6664, 2018 | 13 | 2018 |
Rooting attack detection method on the android-based smart phone WJ Jang, SW Cho, HW Lee, H Ju, JN Kim Proceedings of 2011 International Conference on Computer Science and Network …, 2011 | 13 | 2011 |