default search action
Jaehong Park
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j32]Smriti Bhatt, Thanh Kim Pham, Maanak Gupta, James O. Benson, Jaehong Park, Ravi S. Sandhu:
Attribute-Based Access Control for AWS Internet of Things and Secure Industries of the Future. IEEE Access 9: 107200-107223 (2021) - [j31]Myung-Sun Baek, Wonjoo Park, Jaehong Park, Kwang-Ho Jang, Yong-Tae Lee:
Smart Policing Technique With Crime Type and Risk Score Prediction Based on Machine Learning for Early Awareness of Risk Situation. IEEE Access 9: 131906-131915 (2021) - [j30]Jaehong Park, Ravi S. Sandhu, Maanak Gupta, Smriti Bhatt:
Activity Control Design Principles: Next Generation Access Control for Smart and Collaborative Systems. IEEE Access 9: 151004-151022 (2021) - [j29]Rohit Srivastava, Ravi Tomar, Maanak Gupta, Anuj Kumar Yadav, Jaehong Park:
Image Watermarking Approach Using a Hybrid Domain Based on Performance Parameter Analysis. Inf. 12(8): 310 (2021) - [j28]Jonathan Ebert, Ohad Newton, Jeffery O'Rear, Scott Riley, Jaehong Park, Maanak Gupta:
Leveraging Aviation Risk Models to Combat Cybersecurity Threats in Vehicular Networks. Inf. 12(10): 390 (2021) - [c47]Taejoong Song, Woojin Rim, Hoonki Kim, Keun Hwi Cho, Taeyeong Kim, Taejung Lee, Geumjong Bae, Dong-Won Kim, S. D. Kwon, Sanghoon Baek, Jonghoon Jung, Jongwook Kye, Hakchul Jung, Hyungtae Kim, Soon-Moon Jung, Jaehong Park:
24.3 A 3nm Gate-All-Around SRAM Featuring an Adaptive Dual-BL and an Adaptive Cell-Power Assist Circuit. ISSCC 2021: 338-340 - 2020
- [j27]Jooseok Lee, Maengkyu Kim, Jaehong Park, Jongwon Lee:
225 GHz triple-push RTD oscillator with 0.5 mW dc-power consumption. IET Circuits Devices Syst. 14(2): 209-215 (2020) - [j26]Steven G. Murray, Bradley Greig, Andrei Mesinger, Julian Muñoz, Yuxiang Qin, Jaehong Park, Catherine Watkinson:
21cmFAST v3: A Python-integrated C code for generating 3D realizations of the cosmic 21cm signal. J. Open Source Softw. 5(54): 2582 (2020) - [c46]Soo-Min Lee, Kihwan Seong, Joohee Shin, Hyoungjoong Kim, Jaehyun Jeong, Shinyoung Yi, Juyoung Kim, Eunsu Kim, Sukhyun Jung, Sangyun Hwang, Jihun Oh, Kwanyeob Chae, Kyounghoi Koo, Sanghune Park, Jongshin Shin, Jaehong Park:
22.5 An 8nm 18Gb/s/pin GDDR6 PHY with TX Bandwidth Extension and RX Training Technique. ISSCC 2020: 338-340 - [i4]Jonathan Pilault, Jaehong Park, Christopher J. Pal:
On the impressive performance of randomly weighted encoders in summarization tasks. CoRR abs/2002.09084 (2020) - [i3]Jaehong Park, Jonathan Pilault, Christopher Joseph Pal:
Learning to Summarize Long Texts with Memory Compression and Transfer. CoRR abs/2010.11322 (2020)
2010 – 2019
- 2019
- [j25]Gang Wang, Jaehong Park, Ravi S. Sandhu, Jun Wang, Xiaolin Gui:
Dynamic trust evaluation model based on bidding and multi-attributes for social networks. Int. J. High Perform. Comput. Netw. 13(4): 436-454 (2019) - [c45]Adam Alexander, Paul Graham, Eric Jackson, Bryant Johnson, Tania Williams, Jaehong Park:
An Analysis of Cybersecurity Legislation and Policy Creation on the State Level. NCS 2019: 30-43 - 2018
- [j24]Seil Lee, Hanjoo Kim, Jaehong Park, Jaehee Jang, Chang-Sung Jeong, Sungroh Yoon:
TensorLightning: A Traffic-Efficient Distributed Deep Learning on Commodity Spark Clusters. IEEE Access 6: 27671-27680 (2018) - [j23]HyunMo Kim, Sunho Jung, Jaehong Park:
The impact of past performance on information valuation in virtual communities: Empirical study in online stock message boards. Inf. Process. Manag. 54(4): 740-753 (2018) - [c44]Yongseok Lee, Jaehong Park, Mohamed A. Elsayed, Maged E. Gadallah, Mohamed Alimam:
DRC code coverage test a novel QA methodology. ICICDT 2018: 93-96 - [c43]Kwanyeob Chae, Billy Koo, Jihun Oh, Sanghune Park, Jongshin Shin, Jaehong Park:
Digital PHY Design Methodologies for High-Speed and Low-Power Memory Interface. ISOCC 2018: 140-141 - 2017
- [j22]Jonghyup Lee, Sunho Jung, Jaehong Park:
The role of entropy of review text sentiments on online WOM and movie box office sales. Electron. Commer. Res. Appl. 22: 42-52 (2017) - [c42]Tahmina Ahmed, Ravi S. Sandhu, Jaehong Park:
Classifying and Comparing Attribute-Based and Relationship-Based Access Control. CODASPY 2017: 59-70 - [i2]Jaehong Park, Jongyoon Song, Sungroh Yoon:
Building a Neural Machine Translation System Using Only Synthetic Parallel Data. CoRR abs/1704.00253 (2017) - 2016
- [j21]Lianshan Sun, Jaehong Park, Dang Nguyen, Ravi S. Sandhu:
A Provenance-Aware Access Control Framework with Typed Provenance. IEEE Trans. Dependable Secur. Comput. 13(4): 411-423 (2016) - [j20]Yuan Cheng, Jaehong Park, Ravi S. Sandhu:
An Access Control Model for Online Social Networks Using User-to-User Relationships. IEEE Trans. Dependable Secur. Comput. 13(4): 424-436 (2016) - [i1]Hanjoo Kim, Jaehong Park, Jaehee Jang, Sungroh Yoon:
DeepSpark: Spark-Based Deep Learning Supporting Asynchronous Updates and Caffe Compatibility. CoRR abs/1602.08191 (2016) - 2015
- [j19]Taejoong Song, Woojin Rim, Jonghoon Jung, Giyong Yang, Jaeho Park, Sunghyun Park, Yongho Kim, Kang-Hyun Baek, Sanghoon Baek, Sang-Kyu Oh, Jinsuk Jung, Sungbong Kim, Gyu-Hong Kim, Jintae Kim, Young-Keun Lee, Sang-Pil Sim, Jong Shik Yoon, Kyu-Myung Choi, Hyo-Sig Won, Jaehong Park:
A 14 nm FinFET 128 Mb SRAM With VMIN Enhancement Techniques for Low-Power Applications. IEEE J. Solid State Circuits 50(1): 158-169 (2015) - [c41]Jonghyup Lee, Jaehong Park, Sunho Jung:
The impact of the Entropy of review text sentiments on movie box office sales. ICEC 2015: 19:1-19:11 - [c40]HyunMo Kim, Jaehong Park:
The Impact of Past Performance on Information Valuation in Virtual Communities: Empirical Study in Online Stock Message Board. ICEC 2015: 23:1-23:9 - [c39]Jianfeng Liu, Mi-Suk Hong, Kyung Tae Do, Jung Yun Choi, Jaehong Park, Mohit Kumar, Manish Kumar, Nikhil Tripathi, Abhishek Ranjan:
Clock domain crossing aware sequential clock gating. DATE 2015: 1-6 - [c38]Sungmin Bae, Hyung-Ock Kim, Jung Yun Choi, Jaehong Park:
Coarse-grained Structural Placement for a Synthesized Parallel Multiplier. ISPD 2015: 17-24 - [e3]Jaehong Park, Anna Cinzia Squicciarini:
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, San Antonio, TX, USA, March 2-4, 2015. ACM 2015, ISBN 978-1-4503-3191-3 [contents] - 2014
- [c37]Lianshan Sun, Jaehong Park:
A Process-Oriented Conceptual Framework on Non-Functional Requirements. APRES 2014: 1-15 - [c36]Yuan Cheng, Jaehong Park, Ravi S. Sandhu:
Attribute-Aware Relationship-Based Access Control for Online Social Networks. DBSec 2014: 292-306 - [c35]Dang Nguyen, Jaehong Park, Ravi S. Sandhu:
Adopting Provenance-Based Access Control in OpenStack Cloud IaaS. NSS 2014: 15-27 - [e2]Elisa Bertino, Ravi S. Sandhu, Jaehong Park:
Fourth ACM Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, USA - March 03 - 05, 2014. ACM 2014, ISBN 978-1-4503-2278-2 [contents] - 2013
- [j18]Jaehong Park, Wonsang Hwang, Hyun-il Kwon, Kwangsoo Kim, Dong-Il Cho:
A novel line of sight control system for a robot vision tracking system, using vision feedback and motion-disturbance feedforward compensation. Robotica 31(1): 99-112 (2013) - [c34]Lianshan Sun, Jaehong Park, Ravi S. Sandhu:
Engineering access control policies for provenance-aware systems. CODASPY 2013: 285-292 - [c33]Dang Nguyen, Jaehong Park, Ravi S. Sandhu:
A provenance-based access control model for dynamic separation of duties. PST 2013: 247-256 - [c32]Yuan Cheng, Jaehong Park, Ravi S. Sandhu:
Preserving user privacy from third-party applications in online social networks. WWW (Companion Volume) 2013: 723-728 - [e1]Elisa Bertino, Ravi S. Sandhu, Lujo Bauer, Jaehong Park:
Third ACM Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013. ACM 2013, ISBN 978-1-4503-1890-7 [contents] - 2012
- [c31]Yuan Cheng, Jaehong Park, Ravi S. Sandhu:
A User-to-User Relationship-Based Access Control Model for Online Social Networks. DBSec 2012: 8-24 - [c30]Dang Nguyen, Jaehong Park, Ravi S. Sandhu:
Integrated provenance data for access control in group-centric collaboration. IRI 2012: 255-262 - [c29]Jaehong Park, Dang Nguyen, Ravi S. Sandhu:
A provenance-based access control model. PST 2012: 137-144 - [c28]Yuan Cheng, Jaehong Park, Ravi S. Sandhu:
Relationship-Based Access Control for Online Social Networks: Beyond User-to-User Relationships. SocialCom/PASSAT 2012: 646-655 - [c27]Dang Nguyen, Jaehong Park, Ravi S. Sandhu:
Dependency Path Patterns as the Foundation of Access Control in Provenance-aware Systems. TaPP 2012 - 2011
- [j17]Jaehong Park, Ravi S. Sandhu, Yuan Cheng:
A User-Activity-Centric Framework for Access Control in Online Social Networks. IEEE Internet Comput. 15(5): 62-65 (2011) - [c26]Jaehong Park, Ravi S. Sandhu, Yuan Cheng:
ACON: Activity-Centric Access Control for Social Computing. ARES 2011: 242-247 - [c25]Kwangsoo Kim, Yongsoon Eun, Jaehong Park, Chang-hun Lee, Dong-Il Cho:
A VOR-based vision tracking system using fuzzy logic control. CCECE 2011: 516-519 - [c24]Jaehong Park, Dang Nguyen, Ravi S. Sandhu:
On data provenance in group-centric secure collaboration. CollaborateCom 2011: 221-230 - [c23]Jaehong Park, Sangmin Lee, Dong-Il Cho:
Comparative study of the wafer bonding processes for MEMS devices. NEMS 2011: 638-641 - [c22]Wook Bahn, Jaehong Park, Chang-hun Lee, Tae-Il Kim, Teajae Lee, Muhammad Muneeb Shaikh, Kwangsoo Kim, Dong-Il Cho:
A motion-information-based vision-tracking system with a stereo camera on mobile robots. RAM 2011: 252-257 - [c21]Jaehong Park, Wook Bahn, Chang-hun Lee, Tae-Il Kim, Kwangsoo Kim, Dong-Il Cho:
A novel method for vision tracking with line of sight control, using a fuzzy logic controller and Euler angle orientation in the feedforward loop. URAI 2011: 148-152 - 2010
- [c20]Jaehong Park, Yuan Cheng, Ravi S. Sandhu:
Towards a framework for cyber social status based trusted open collaboration. CollaborateCom 2010: 1-8 - [c19]Hyun-il Kwon, Jaehong Park, Wonsang Hwang, Jong-hyeon Kim, Chang-hun Lee, Muhammad Latif Anjum, Kwangsoo Kim, Dong-Il Cho:
Sensor data fusion using fuzzy control for VOR-based vision tracking system. IROS 2010: 2920-2925 - [c18]Jaehong Park, Wonsang Hwang, Hyun-il Kwon, Jong-hyeon Kim, Chang-hun Lee, Muhammad Latif Anjum, Kwangsoo Kim, Dong-Il Cho:
High performance vision tracking system for mobile robot using sensor data fusion with Kalman filter. IROS 2010: 3778-3783
2000 – 2009
- 2008
- [j16]Yongmin Kim, Jinho Sung, Sung Ryul Hong, Jaehong Park:
Analyzing OTDR Measurement Data Using the Kalman Filter. IEEE Trans. Instrum. Meas. 57(5): 947-951 (2008) - 2007
- [j15]DaeEun Kim, Jaehong Park:
Application of adaptive control to the fluctuation of engine speed at idle. Inf. Sci. 177(16): 3341-3355 (2007) - [j14]Hansang Lim, Jaehong Park:
Inspection of a Plasma Display Panel (PDP) Using Frequency Domain Analysis. IEEE Trans. Instrum. Meas. 56(1): 140-145 (2007) - 2006
- [j13]Donghyun Kim, Kyusik Chung, Chang-Hyo Yu, Chun-Ho Kim, Inho Lee, Jaewan Bae, Young-Jun Kim, Jae-Hyeon Park, Sungbeen Kim, Yong-Ha Park, Nak Hee Seong, Jin-Aeon Lee, Jaehong Park, Stephen Oh, Seh-Woong Jeong, Lee-Sup Kim:
An SoC with 1.3 gtexels/s 3-D graphics full pipeline for consumer applications. IEEE J. Solid State Circuits 41(1): 71-84 (2006) - [j12]Hansang Lim, Jaehong Park:
Frequency-Domain Analysis of Effects of the Location of a Feedback Resistor in a Current Feedback Amplifier. IEEE Trans. Circuits Syst. II Express Briefs 53-II(8): 687-691 (2006) - [j11]Hansang Lim, Jaehong Park:
Modified electric current perturbation (ECP) characterization for a circular aperture. IEEE Trans. Instrum. Meas. 55(1): 212-218 (2006) - 2005
- [j10]Yongmin Kim, Jaehong Park:
On the approximation of fault directions for mutual detectability: an invariant zero approach. IEEE Trans. Autom. Control. 50(6): 851-855 (2005) - [j9]Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu, Jaehong Park:
Formal model and policy specification of usage control. ACM Trans. Inf. Syst. Secur. 8(4): 351-387 (2005) - 2004
- [j8]Jaehong Park, Ravi S. Sandhu:
The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1): 128-174 (2004) - [c17]Jaehong Park, Xinwen Zhang, Ravi S. Sandhu:
Attribute Mutability in Usage Control. DBSec 2004: 15-29 - [c16]Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi S. Sandhu:
A logical specification for usage control. SACMAT 2004: 1-10 - 2003
- [j7]Dong-Il Cho, Byoung-Doo Choi, Sangwoo Lee, Seung Joon Paik, Sangjun Park, Jaehong Park, Yonghwa Park, Jongpal Kim, Il-Woo Jung:
Dry And Wet Etching With (111) Silicon For High-Performance Micro And Nano Systems. Int. J. Comput. Eng. Sci. 4(2): 181-187 (2003) - [j6]Jaehong Park, Kidong Park, Seung Joon Paik, Kyo-In Koo, Byoung-Doo Choi, Jongpal Kim, Sangjun Park, Il-Woo Jung, Hyoungho Ko, Dong-Il Cho:
Extremely Sharp {111}-Bound, Single-Crystalline Silicon Nano Tips. Int. J. Comput. Eng. Sci. 4(2): 327-330 (2003) - [j5]Il-Woo Jung, Jaehong Park, Byoung-Doo Choi, Jongpal Kim, Sangjun Park, Seung Joon Paik, Dong-Il Cho:
New Vertical Array Actuators Using Extended Sbm And Deep Pn Junction Isolation. Int. J. Comput. Eng. Sci. 4(3): 589-592 (2003) - [c15]Yongmin Kim, Jaehong Park:
A condition of the eigenvalues of detection filters for disturbance attenuation: an invariant zero approach. CDC 2003: 475-479 - [c14]Xinwen Zhang, Jaehong Park, Ravi S. Sandhu:
Schema Based XML Security: RBAC Approach. DBSec 2003: 330-343 - [c13]Ravi S. Sandhu, Jaehong Park:
Usage Control: A Vision for Next Generation Access Control. MMM-ACNS 2003: 17-31 - 2002
- [c12]Jaehong Park, Ravi S. Sandhu:
Originator Control in Usage Control. POLICY 2002: 60-66 - [c11]Jaehong Park, Ravi S. Sandhu:
Towards usage control models: beyond traditional access control. SACMAT 2002: 57-64 - 2000
- [j4]Jaehong Park, Carl Pixley, Michael Burns, Hyunwoo Cho:
An Efficient Logic Equivalence Checker for Industrial Circuits. J. Electron. Test. 16(1-2): 91-106 (2000) - [c10]Jaehong Park, Ravi S. Sandhu, J. Schifalacqua:
Security Architectures for Controlled Digital Information Dissemination. ACSAC 2000: 224-
1990 – 1999
- 1999
- [c9]DaeEun Kim, Jaehong Park:
Frequency selection with oscillatory neurons for engine misfire detection. IJCNN 1999: 2649-2652 - [c8]Michael R. Grimaila, Sooryong Lee, Jennifer Dworak, Kenneth M. Butler, Bret Stewart, Hari Balachandran, Bryan Houchins, Vineet Mathur, Jaehong Park, Li-C. Wang, M. Ray Mercer:
REDO - Probabilistic Excitation and Deterministic Observation - First Commercial Experimen. VTS 1999: 268-274 - 1996
- [j3]Duk-Sun Shim, Jaehong Park, Pramod P. Khargonekar, W. B. Ribbns:
Reducing automotive engine speed fluctuation at idle. IEEE Trans. Control. Syst. Technol. 4(4): 404-410 (1996) - [c7]Jaehong Park, M. Ray Mercer:
Using Functional Information and Strategy Switching in Sequential ATPG. ICCD 1996: 254-260 - [c6]Carl Pixley, Noel R. Strader, William C. Bruce, Jaehong Park, Matt Kaufmann, Kurt Shultz, Michael Burns, Jainendra Kumar, Jun Yuan, Janet Nguyen:
Commercial Design Verification: Methodology and Tools. ITC 1996: 839-848 - 1995
- [c5]Jaehong Park, Chanhee Oh, M. Ray Mercer:
Improved sequential ATPG using functional observation information and new justification methods. ED&TC 1995: 262-266 - 1994
- [j2]Jaehong Park, Giorgio Rizzoni, William B. Ribbens:
On the representation of sensor faults in fault detection filters. Autom. 30(11): 1793-1795 (1994) - [j1]Jaehong Park, Giorgio Rizzoni:
An eigenstructure assignment algorithm for the design of fault detection filters. IEEE Trans. Autom. Control. 39(7): 1521-1524 (1994) - [c4]William B. Ribbens, Jaehong Park, DaeEun Kim:
Application of neural networks to detecting misfire in automotive engines. ICASSP (2) 1994: 593-596 - [c3]Jaehong Park, Mark Naivar, Rohit Kapur, M. Ray Mercer, Thomas W. Williams:
Limitations in predicting defect level based on stuck-at fault coverage. VTS 1994: 186-191 - 1993
- [c2]Jaehong Park, M. Ray Mercer:
An Efficient Symbolic Design Verification System. ICCD 1993: 294-298 - 1992
- [c1]Rohit Kapur, Jaehong Park, M. Ray Mercer:
All Tests for a Fault Are Not Equally Valuable for Defect Detection. ITC 1992: 762-769
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint