A novel CNN based security guaranteed image watermarking generation scenario for smart city applications D Li, L Deng, BB Gupta, H Wang, C Choi Information Sciences 479, 432-447, 2019 | 329 | 2019 |
Visual saliency guided complex image retrieval H Wang, Z Li, Y Li, BB Gupta, C Choi Pattern Recognition Letters 130, 64-72, 2020 | 231 | 2020 |
Generative Neural Networks for Anomaly Detection in Crowded Scenes T Wang, M Qiao, Z Lin, C Li, H Snoussi, Z Liu, C Choi IEEE Transactions on Information Forensics and Security 14 (5), 1390-1399, 2019 | 149 | 2019 |
Ontology-based access control model for security policy reasoning in cloud computing C Choi, J Choi, P Kim The Journal of Supercomputing 67 (3), 711-722, 2014 | 138 | 2014 |
A Localization based on Unscented Kalman Filter and Particle Filter Localization Algorithms I Ullah, Y Shen, X Su, C Esposito, C Choi IEEE Access 8, 2233-2246, 2020 | 135 | 2020 |
A reliable energy efficient dynamic spectrum sensing for cognitive radio IoT networks JA Ansere, G Han, H Wang, C Choi, C Wu IEEE Internet of Things Journal 6 (4), 6748-6759, 2019 | 129 | 2019 |
Localization and detection of targets in underwater wireless sensor using distance and angle based algorithms I Ullah, J Chen, X Su, C Esposito, C Choi IEEE Access 7, 45693-45704, 2019 | 127 | 2019 |
A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment J Choi, C Choi, B Ko, P Kim Soft Computing 18, 1697-1703, 2014 | 117 | 2014 |
Detecting web based Ddos attack using mapreduce operations in cloud computing environment. J Choi, C Choi, B Ko, D Choi, P Kim J. Internet Serv. Inf. Secur. 3 (3/4), 28-37, 2013 | 101 | 2013 |
A reinforcement learning approach for uav target searching and tracking T Wang, R Qin, Y Chen, H Snoussi, C Choi Multimedia Tools and Applications 78 (4), 4347-4364, 2019 | 98 | 2019 |
Intelligent power equipment management based on distributed context-aware inference in smart cities C Choi, C Esposito, H Wang, Z Liu, J Choi IEEE Communications Magazine 56 (7), 212-217, 2018 | 94 | 2018 |
Microservices scheduling model over heterogeneous cloud-edge environments as support for IoT applications ID Filip, F Pop, C Serbanescu, C Choi IEEE Internet of Things Journal 5 (4), 2672-2681, 2018 | 93 | 2018 |
Efficient malicious code detection using N-gram analysis and SVM J Choi, H Kim, C Choi, P Kim 2011 14th International Conference on Network-Based Information Systems, 618-621, 2011 | 91 | 2011 |
An Edge Intelligence Empowered Recommender System Enabling Cultural Heritage Applications X Su, G Sperli, V Moscato, A Picariello, C Esposito, C Choi IEEE Transactions on Industrial Informatics 15 (7), 4266-4275, 2019 | 90 | 2019 |
Interference cancellation for non-orthogonal multiple access used in future wireless mobile networks X Su, HF Yu, W Kim, C Choi, D Choi EURASIP journal on wireless communications and networking 2016, 1-12, 2016 | 86 | 2016 |
Ontology-based security context reasoning for power IoT-cloud security service C Choi, J Choi IEEE Access 7, 110510-110517, 2019 | 84 | 2019 |
Automatic enrichment of semantic relation network and its application to word sense disambiguation M Hwang, C Choi, PK Kim IEEE Transactions on Knowledge and Data Engineering 23 (6), 845-858, 2010 | 78 | 2010 |
Threats and corrective measures for IoT security with observance of cybercrime: A survey S Rani, A Kataria, V Sharma, S Ghosh, V Karar, K Lee, C Choi Wireless communications and mobile computing 2021 (1), 5579148, 2021 | 77 | 2021 |
Securing Collaborative Deep Learning in Industrial Applications within Adversarial Scenarios C Esposito, X Su, S Aljawarneh, C Choi IEEE Transactions on Industrial Informatics 14 (11), 4972-4981, 2018 | 67 | 2018 |
Robust decentralised trust management for the internet of things by using game theory C Esposito, O Tamburis, X Su, C Choi Information Processing & Management 57 (6), 102308, 2020 | 60 | 2020 |