default search action
Hoon Ko
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j54]Sangheon Kim, Hoon Ko, Jong Youl Hong, Hee-soo Choi:
A study on experience contents of Baekje Muryeong Royal tomb using virtual reality. J. Ambient Intell. Humaniz. Comput. 15(2): 1671-1678 (2024) - [j53]Hoon Ko, Isabel Praça, Seong Gon Choi:
Anomaly detection analysis based on correlation of features in graph neural network. Multim. Tools Appl. 83(9): 25487-25501 (2024) - [j52]JongHyuk Kim, Yong Moon, Hoon Ko:
Correlation-based advanced feature analysis for wireless sensor networks. J. Supercomput. 80(7): 9812-9828 (2024) - 2023
- [j51]Minho Lee, Libor Mesicek, Kitae Bae, Hoon Ko:
AI advisor platform for disaster response based on big data. Concurr. Comput. Pract. Exp. 35(16) (2023) - [j50]Kwangcheol Rim, Pankoo Kim, Hoon Ko:
Gradient descent for quadratic functions using geometric mean and the Kai Fang method. Concurr. Comput. Pract. Exp. 35(16) (2023) - [j49]Om Prakash Singh, Chandan Kumar, Amit Kumar Singh, Maheshwari Prasad Singh, Hoon Ko:
Fuzzy-based secure exchange of digital data using watermarking in NSCT-RDWT-SVD domain. Concurr. Comput. Pract. Exp. 35(16) (2023) - [j48]Hoon Ko, Chul Park, Wu Seong Kang, Yunyoung Nam, Dukyong Yoon, Jinseok Lee:
Machine Learning for Detecting Blood Transfusion Needs Using Biosignals. Comput. Syst. Sci. Eng. 46(2): 2369-2381 (2023) - [i1]Haci Ismail Aslan, Chang Choi, Hoon Ko:
Classification of vertices on social networks by multiple approaches. CoRR abs/2301.11288 (2023) - 2022
- [j47]Hooseok Lee, Heewon Chung, Hoon Ko, Antonino Parisi, Alessandro Busacca, Luca Faes, Riccardo Pernice, Jinseok Lee:
Adaptive scheduling of acceleration and gyroscope for motion artifact cancelation in photoplethysmography. Comput. Methods Programs Biomed. 226: 107126 (2022) - [j46]Tae-Yeun Kim, A. K. Singh, Hoon Ko:
Retraction Note to: Modeling for small cell networks in 5G communication environment. Telecommun. Syst. 81(4): 643 (2022) - 2021
- [j45]Jong Youl Hong, Hoon Ko, Libor Mesicek, MoonBae Song:
Cultural intelligence as education contents: Exploring the pedagogical aspects of effective functioning in higher education. Concurr. Comput. Pract. Exp. 33(2) (2021) - [j44]Hoon Ko, Goreti Marreiros:
Smart media and application. Concurr. Comput. Pract. Exp. 33(2) (2021) - [j43]Seong Wan Park, Libor Mesicek, Joohyun Shin, Kitae Bae, Kyungjin An, Hoon Ko:
Customizing intelligent recommendation study with multiple advisors based on hierarchy structured fuzzy-analytic hierarchy process. Concurr. Comput. Pract. Exp. 33(23) (2021) - [j42]Amit Kumar Singh, Xuan Liu, Haoxiang Wang, Hoon Ko:
Recent advances in multimedia security and information hiding. Trans. Emerg. Telecommun. Technol. 32(2) (2021) - [j41]Yizhang Jiang, Kim-Kwang Raymond Choo, Hoon Ko:
A Special Section on Deep & Advanced Machine Learning Approaches for Human Behavior Analysis. J. Inf. Process. Syst. 17(2): 334-336 (2021) - [j40]MoungHo Yi, MyungJin Lim, Hoon Ko, Juhyun Shin:
Method of Profanity Detection Using Word Embedding and LSTM. Mob. Inf. Syst. 2021: 6654029:1-6654029:9 (2021) - [j39]Taeyeun Kim, Hoon Ko, Sung-Hwan Kim, Ho-Da Kim:
Modeling of Recommendation System Based on Emotional Information and Collaborative Filtering. Sensors 21(6): 1997 (2021) - [j38]Hoon Ko, Kwangcheol Rim, Isabel Praça:
Influence of Features on Accuracy of Anomaly Detection for an Energy Trading System. Sensors 21(12): 4237 (2021) - [j37]Tae-Yeun Kim, Sung-Hwan Kim, Hoon Ko:
Design and Implementation of BCI-based Intelligent Upper Limb Rehabilitation Robot System. ACM Trans. Internet Techn. 21(3): 60:1-60:17 (2021) - [j36]Amit Kumar Singh, Zhihan Lv, Hoon Ko:
Introduction to the Special Issue on Recent Trends in Medical Data Security for e-Health Applications. ACM Trans. Multim. Comput. Commun. Appl. 17(2s): 58:1-58:3 (2021) - [j35]Amit Kumar Singh, Ashima Anand, Zhihan Lv, Hoon Ko, Anand Mohan:
A Survey on Healthcare Data: A Security Perspective. ACM Trans. Multim. Comput. Commun. Appl. 17(2s): 59:1-59:26 (2021) - 2020
- [j34]Heewon Chung, Hoon Ko, Hooseok Lee, Jinseok Lee:
Deep Learning for Heart Rate Estimation From Reflectance Photoplethysmography With Acceleration Power Spectrum and Acceleration Intensity. IEEE Access 8: 63390-63402 (2020) - [j33]Hoon Ko, Sung Bum Pan, Libor Mesícek:
Personal identification study for touchable devices with ECG. Concurr. Comput. Pract. Exp. 32(8) (2020) - [j32]HyoJoon Kim, Sang Hui Jeong, Ji Hyeon Seo, Inseok Park, Hoon Ko, Seong Yong Moon:
Augmented reality for botulinum toxin injection. Concurr. Comput. Pract. Exp. 32(18) (2020) - [j31]Yoosang Park, Jaehyung Ye, Jongsun Choi, Jaeyoung Choi, Hoon Ko:
Extraction of abstracted sensory data to reduce the execution time of context-aware services in wearable computing environments. Concurr. Comput. Pract. Exp. 32(18) (2020) - [j30]Hoon Ko, Jong Hyuk Kim, Kyung-jin An, Libor Mesicek, Goreti Marreiros, Sung Bum Pan, Pankoo Kim:
Smart home energy strategy based on human behaviour patterns for transformative computing. Inf. Process. Manag. 57(5): 102256 (2020) - [j29]Min-Gu Kim, Hoon Ko, Sung Bum Pan:
A study on user recognition using 2D ECG based on ensemble of deep convolutional neural networks. J. Ambient Intell. Humaniz. Comput. 11(5): 1859-1867 (2020) - [j28]Lidia Ogiela, Marek R. Ogiela, Hoon Ko:
Intelligent Data Management and Security in Cloud Computing. Sensors 20(12): 3458 (2020) - [j27]Gyu Ho Choi, Hoon Ko, Witold Pedrycz, Amit Kumar Singh, Sung Bum Pan:
Recognition System Using Fusion Normalization Based on Morphological Features of Post-Exercise ECG for Intelligent Biometrics. Sensors 20(24): 7130 (2020) - [c28]Hoon Ko, Heewon Chung, Hooseok Lee, Jinseok Lee:
Feasible Study on Intracranial Hemorrhage Detection and Classification using a CNN-LSTM Network. EMBC 2020: 1290-1293 - [c27]Hooseok Lee, Hoon Ko, Heewon Chung, Jinseok Lee:
Robot Assisted Instantaneous Heart Rate Estimator using Camera based Remote Photoplethysmograpy via Plane-Orthogonal-to-Skin and Finite State Machine. EMBC 2020: 4425-4428 - [c26]Jan Lacina, Libor Mesicek, Hoon Ko, Sung Bum Pan:
Case Study: Continual Evaluation of IT Process Portfolio in SME based on Val IT 2.0. SMA 2020: 10-14
2010 – 2019
- 2019
- [j26]Hoon Ko, Marek R. Ogiela, Lidia Ogiela, Libor Mesicek, Myoungwon Lee, Junho Choi, Pankoo Kim:
ECG-Based Advanced Personal Identification Study With Adjusted (Qi * Si). IEEE Access 7: 40078-40084 (2019) - [j25]Hoon Ko, Libor Mesicek, Jong Youl Hong, Soon Sim Yeo, Sung Bum Pan, Pankoo Kim:
Blog Reliability Analysis With Conflicting Interests of Contexts in the Extended Branch for Cyber-Security. IEEE Access 7: 143693-143698 (2019) - [j24]Hoon Ko, Jong Youl Hong, Sangheon Kim, Libor Mesicek, In Seop Na:
Human-machine interaction: A case study on fake news detection using a backtracking based on a cognitive system. Cogn. Syst. Res. 55: 77-81 (2019) - [j23]Min-Gu Kim, Hoon Ko, Sung Bum Pan:
A Study on User Recognition Using 2D ECG Image Based on Ensemble Networks for Intelligent Vehicles. Wirel. Commun. Mob. Comput. 2019 (2019) - [c25]Heewon Chung, Hoon Ko, Hooseok Lee, Jinseok Lee:
Feasibility Study of Deep Neural Network for Heart Rate Estimation from Wearable Photoplethysmography and Acceleration Signals. EMBC 2019: 3633-3636 - [c24]Jong Youl Hong, Hoon Ko, Jeong Hee Kim:
Cultural Intelligence and ARCS Model for Digital Era. WIMS 2019: 28:1-28:4 - [c23]Junho Choi, Chang Choi, Sunghwan Kim, Hoon Ko:
Medical Information Protection Frameworks for Smart Healthcare based on IoT. WIMS 2019: 29:1-29:5 - [p2]Hoon Ko, Libor Mesicek, Sung Bum Pan:
ECG Security Challenges: Case Study on Change of ECG According to Time for User Identification. Handbook of Multimedia Information Security 2019: 619-628 - 2018
- [j22]Marek R. Ogiela, Hoon Ko:
Cognitive systems and operations research in big data and cloud computing. Ann. Oper. Res. 265(2): 183-186 (2018) - [j21]Song Ko, Hyunki Lim, Hoon Ko, Dae-Won Kim:
Experimental comparisons with respect to the usage of the promising relations in EDA-based causal discovery. Ann. Oper. Res. 265(2): 241-255 (2018) - [j20]Marek R. Ogiela, Hoon Ko:
Bio-inspired and cognitive approaches in cryptography and security applications. Concurr. Comput. Pract. Exp. 30(2) (2018) - [j19]Saraswathi Sivamani, Jongsun Choi, Kitae Bae, Hoon Ko, Yongyun Cho:
A smart service model in greenhouse environment using event-based security based on wireless sensor network. Concurr. Comput. Pract. Exp. 30(2) (2018) - [j18]Jeong-Hun Park, Seunggye Hwang, Janghoon Yang, Kitae Bae, Hoon Ko, Dong Ku Kim:
Generalized distributed compressive sensing with security challenges for linearly correlated information sources. Concurr. Comput. Pract. Exp. 30(3) (2018) - [j17]Hoon Ko:
A Study on Secure Contents Strategies for Applications With DRM on Cloud Computing. Int. J. Cloud Appl. Comput. 8(1): 143-153 (2018) - [j16]Hoon Ko, Seogchan Hwang, Libor Mesicek, Jongsun Choi, Junho Choi, Pankoo Kim:
A Study on Context-Relationship with Context-Attributes for a Smart Service Generation in Smart City. J. Univers. Comput. Sci. 24(3): 249-260 (2018) - [c22]Hoon Ko, Batenkina Oksana, In Seop Na, Sung Bum Pan:
Analysis an identification with ECG base in augmented-reality. RACS 2018: 62-63 - 2017
- [j15]Mahdi Daghmehchi Firoozjaei, Jaehoon (Paul) Jeong, Hoon Ko, Hyoungshick Kim:
Security challenges with network functions virtualization. Future Gener. Comput. Syst. 67: 315-324 (2017) - [j14]Hoon Ko, Chang-Hoon Lee, Kwanmoon Jeong, Myeung Su Lee, Yunyoung Nam, Kwon-Ha Yoon, Jinseok Lee:
A Pilot Study on Hip Bone Mineral Densities Estimation from Forearm CBCT images. KSII Trans. Internet Inf. Syst. 11(12): 6054-6068 (2017) - [j13]Joonghwan Lee, Jae Woo Seo, Hoon Ko, Hyoungshick Kim:
TARD: Temporary Access Rights Delegation for guest network devices. J. Comput. Syst. Sci. 86: 59-69 (2017) - [c21]Sanghak Oh, Eunsoo Kim, Jaehoon (Paul) Jeong, Hoon Ko, Hyoungshick Kim:
A flexible architecture for orchestrating network security functions to support high-level security policies. IMCOM 2017: 44 - [p1]Carlos Ramos, Diogo Martinho, Goreti Marreiros, Gabriel Villarrubia, Juan F. De Paz, Juan M. Corchado, Hoon Ko, Haeng-Kon Kim, Hyun Yoe:
EKRUCAmI Architecture - Applications in Healthcare Domain. State of the Art in AI Applied to Ambient Intelligence 2017: 140-152 - 2016
- [j12]Hooseok Lee, Hoon Ko, Jinseok Lee:
Reflectance pulse oximetry: Practical issues and limitations. ICT Express 2(4): 195-198 (2016) - [j11]Hoon Ko, MoonBae Song:
A Study on the Secure User Profiling Structure and Procedure for Home Healthcare Systems. J. Medical Syst. 40(1): 1:1-1:9 (2016) - [j10]Junho Choi, Chang Choi, Hoon Ko, Pankoo Kim:
Intelligent Healthcare Service Using Health Lifelog Analysis. J. Medical Syst. 40(8): 188:1-188:10 (2016) - [j9]Hoon Ko, Kitae Bae, Jongsun Choi, Sang Heon Kim, Jongmyung Choi:
Similarity recognition using context-based pattern for cyber-society. Soft Comput. 20(11): 4565-4573 (2016) - [c20]Jeong-Hun Park, Seunggye Hwang, Janghoon Yang, Kitae Bae, Hoon Ko, Dong Ku Kim:
Distributed Compressive Sensing for Correlated Information Sources. BDTA 2016: 130-137 - [c19]Hooseok Lee, Hoon Ko, Tharoeun Thap, Jinseok Lee:
Multiple switching light sources based motion artifacts reduction in reflectance photoplethysmography. EMBC 2016: 3398-3401 - 2015
- [c18]Donggyu Kwak, Jongsun Choi, Jaeyoung Choi, Hoon Ko:
Design on the BPEL Engine Generator for Adding New Functions. HCI (23) 2015: 605-612 - 2014
- [j8]Jongsun Choi, Jaeyoung Choi, Hoon Ko, Kitae Bae, Kyung Jin An, Choong Sik Kim, Jongmyung Choi:
A Smart Service Robot Middleware on Ubiquitous Network Environments. Intell. Autom. Soft Comput. 20(1): 47-59 (2014) - [j7]Jong-Myoung Choi, Hoon Ko, Marek R. Ogiela, Goreti Marreiros:
Advance in Safe and Useful Social Network Services with Context-Sensitive Data in Cyber-Physical System. Int. J. Distributed Sens. Networks 10 (2014) - [j6]Hoon Ko, Kitae Bae, Sang Heon Kim, Kyung Jin An:
A Study on the Security Algorithm for Contexts in Smart Cities. Int. J. Distributed Sens. Networks 10 (2014) - 2013
- [c17]Hoon Ko:
Analysis on Smart Warning System for Home Network in Smart Grid. IMIS 2013: 714-718 - 2012
- [j5]Marek R. Ogiela, Ilsun You, Fatos Xhafa, Hoon Ko:
Towards context, cognitive, and secure computing. Comput. Math. Appl. 63(2): 337-338 (2012) - [j4]Hoon Ko, Kyung-jin An, Tai-Hoon Kim, Goreti Marreiros, Zita A. Vale, Jong-Myoung Choi:
A study on dynamic state information (DSI) around users for safe urban life. Comput. Math. Appl. 63(2): 554-563 (2012) - [j3]Hoon Ko, Goreti Marreiros, Hugo Morais, Zita A. Vale, Carlos Ramos:
Intelligent supervisory control system for home devices using a cyber physical approach. Integr. Comput. Aided Eng. 19(1): 67-79 (2012) - [j2]MoonBae Song, Goreti Marreiros, Hoon Ko, Jae-Ho Choi:
Context-Enriched and Location-Aware Services. J. Comput. Networks Commun. 2012: 649584:1-649584:2 (2012) - [c16]Minkyu Choi, Goreti Marreiros, Myunggwon Hwang, Zita A. Vale, Hoon Ko:
Secure Contents Design and Implement of Smart Home Management System in OISCS. FGIT 2012: 216-223 - [c15]Kyung Jin An, Hoon Ko:
Environmental Impact Assessment (EIA) and Photo-Manipulation Techniques. FGIT-MulGraB/BSBT/IUrC 2012: 360-368 - [c14]Myunggwon Hwang, Donald J. Kim, Do-Heon Jeong, Sa-Kwang Song, Hanmin Jung, Hoon Ko:
Horizontal Search Method for Wikipedia Category Grouping. GreenCom 2012: 717-721 - 2011
- [c13]Hoon Ko, Goreti Marreiros, Zita A. Vale, Jongmyung Choi:
A Study on Context Services Model with Location Privacy. ARES 2011: 321-329 - [c12]Hoon Ko, Goreti Marreiros, Kyung-jin An, Zita A. Vale, Tai-Hoon Kim, Jong-Myoung Choi:
Contexts-Management Strategy in Considering the Security in Urban Computing Based on Urban Design. IMIS 2011: 65-72 - [c11]Jeong-Hyo Park, Yong-Hoon Jung, Hoon Ko, Jeong-Jai Kim, Moon-Seog Jun:
A Privacy Technique for Providing Anonymity to Sensor Nodes in a Sensor Network. UCMA (1) 2011: 327-335 - [c10]Seung-Jae Jang, Young-Gu Lee, Hoon Ko, Moon-Seog Jun:
Study on Group Key Agreement Using Two-Dimensional Array in Sensor Network Environment. UCMA (1) 2011: 336-349 - 2010
- [c9]Hoon Ko, Carlos Ramos:
A Survey of Context Classfication for Intelligent Systems Research for Ambient Intelligence. CISIS 2010: 746-751 - [c8]Hoon Ko, Zita A. Vale:
Optimal Intelligent Supervisory Control System in Cyber-Physical Intelligence. FGIT-SecTech/DRBC 2010: 171-178
2000 – 2009
- 2009
- [j1]Hoon Ko, Carlos Filipe Freitas, Goreti Marreiros, Carlos Ramos:
A Study on Users Authentication Method for Safety Group Decision System in Dynamic Small Group. J. Convergence Inf. Technol. 4(4): 68-76 (2009) - [c7]Hoon Ko, Jongmyung Choi, Carlos Ramos:
A Study on Secure Contents Using in Urban Computing. FGIT-SecTech 2009: 26-34 - [c6]Jongmyung Choi, Sangjoon Park, Hoon Ko, Hyun-Joo Moon, Jongchan Lee:
Issues for Applying Instant Messaging to Smart Home Systems. ICCSA (1) 2009: 649-661 - [c5]Hoon Ko, Carlos Ramos:
A study on Security Status Matrix (SSM) in Urban Computing. ICITST 2009: 1-6 - [c4]Hoon Ko, Ning Chen, Goreti Marreiros, Carlos Ramos:
Safety High Accuracy Context-Aware Matrix (CAM) Making Based on X.509 Proxy Certificate. ISA 2009: 829-837 - 2007
- [c3]Ji-Yeon Kim, Jongjin Jung, Hoon Ko, Boyeon Kim, Susan Joe, Yongjun Lee, Yunseok Chang, Kyoon Ha Lee:
A Design of Authentication Protocol for Multi-key RFID Tag. APWeb/WAIM Workshops 2007: 644-653 - 2005
- [c2]Baehyun Kim, Hoon Ko, Intae Ryoo:
A Study on Secure Group Transmission in Group Environment. ACIS-ICIS 2005: 139-143 - [c1]Hoon Ko, Bangyong Sohn, Hayoung Park, Yongtae Shin:
Safe Authentication Method for Security Communication in Ubiquitous. ICCSA (2) 2005: 442-448
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-22 20:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint