Follow
Ji Won Yoon
Title
Cited by
Cited by
Year
An image encryption scheme with a pseudorandom permutation based on chaotic maps
JW Yoon, H Kim
Communications in Nonlinear Science and Numerical Simulation 15 (12), 3998-4006, 2010
2042010
Cityride: a predictive bike sharing journey advisor
JW Yoon, F Pinelli, F Calabrese
2012 IEEE 13th international conference on mobile data management, 306-311, 2012
1542012
Nanopipette delivery of individual molecules to cellular compartments for single-molecule fluorescence tracking
A Bruckbauer, P James, D Zhou, JW Yoon, D Excell, Y Korchev, R Jones, ...
Biophysical journal 93 (9), 3120-3131, 2007
1332007
Predicting arrival times of buses using real-time GPS measurements
M Sinn, JW Yoon, F Calabrese, E Bouillet
2012 15th International IEEE Conference on Intelligent Transportation …, 2012
802012
Hybrid spam filtering for mobile communication
JW Yoon, H Kim, JH Huh
computers & security 29 (4), 446-459, 2010
782010
DySCo: quantitating associations of membrane proteins using two-color single-molecule tracking
PD Dunne, RA Fernandes, J McColl, JW Yoon, JR James, SJ Davis, ...
Biophysical Journal 97 (4), L5-L7, 2009
732009
Bayesian inference for improved single molecule fluorescence tracking
JW Yoon, A Bruckbauer, WJ Fitzgerald, D Klenerman
Biophysical journal 94 (12), 4932-4947, 2008
592008
Estimation of arrival times at transit stops
EP Bouillet, F Calabrese, F Pinelli, M Sinn, JW Yoon
US Patent 9,183,741, 2015
562015
Deterministic and statistical methods for reconstructing multidimensional NMR spectra
JW Yoon, S Godsill, E Kupče, R Freeman
Magnetic Resonance in Chemistry 44 (3), 197-209, 2006
552006
Adaptive classification for brain computer interface systems using sequential Monte Carlo sampling
JW Yoon, SJ Roberts, M Dyson, JQ Gan
Neural Networks 22 (9), 1286-1294, 2009
462009
A new countermeasure against brute-force attacks that use high performance computers for big data analysis
HJ Jo, JW Yoon
International Journal of Distributed Sensor Networks, 2015
282015
Visual honey encryption: Application to steganography
JW Yoon, H Kim, HJ Jo, H Lee, K Lee
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia …, 2015
272015
Efficient model selection for probabilistic K nearest neighbour classification
JW Yoon, N Friel
Neurocomputing 149, 1098-1108, 2015
252015
Network analysis of temporal trends in scholarly research productivity
H Kim, JW Yoon, J Crowcroft
Journal of Informetrics 6 (1), 97-110, 2012
222012
Various threat models to circumvent air-gapped systems for preventing network attack
E Lee, H Kim, JW Yoon
Information Security Applications: 16th International Workshop, WISA 2015 …, 2016
212016
Voice presentation attack detection through text-converted voice command analysis
IY Kwak, JH Huh, ST Han, I Kim, J Yoon
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
202019
The impact of COVID-19 on cryptocurrency markets: A network analysis based on mutual information
MY Hong, JW Yoon
Plos one 17 (2), e0259869, 2022
192022
ResMax: Detecting voice spoofing attacks with residual network and max feature map
IY Kwak, S Kwag, J Lee, JH Huh, CH Lee, Y Jeon, J Hwang, JW Yoon
2020 25th International Conference on Pattern Recognition (ICPR), 4837-4844, 2021
182021
Classification of home appliance by using Probabilistic KNN with sensor data
SJ Kang, JW Yoon
2016 Asia-Pacific Signal and Information Processing Association Annual …, 2016
182016
Honey chatting: A novel instant messaging system robust to eavesdropping over communication
JI Kim, JW Yoon
2016 IEEE International Conference on Acoustics, Speech and Signal …, 2016
172016
The system can't perform the operation now. Try again later.
Articles 1–20