Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Early Wildfire Detection Using Convolutional Neural Network

    Wildfires are one of the disasters that are difficult to detect early and cause significant damage to human life, ecological systems, and infrastructure. There have been several research attempts to detect wi...

    Seon Ho Oh, Sang Won Ghyme, Soon Ki Jung, Geon-Woo Kim in Frontiers of Computer Vision (2020)

  2. No Access

    Chapter and Conference Paper

    Design Considerations for an Intelligent Video Surveillance System Using Cloud Computing

    Recently, deep neural network and cloud computing based intelligent video surveillance technology are growing interests in the industrial and academia. The synergy with both technologies emerges as a key role ...

    Kyung-Soo Lim, Seoung-Hyeon Lee in Parallel and Distributed Computing, Applic… (2019)

  3. No Access

    Article

    Deep feature learning for person re-identification in a large-scale crowdsourced environment

    Finding the same individual across cameras in disjoint views at different locations and times, which is known as person re-identification (re-id), is an important but difficult task in intelligent visual surve...

    Seon Ho Oh, Seung-Wan Han, Bum-Suk Choi, Geon-Woo Kim in The Journal of Supercomputing (2018)

  4. No Access

    Article

    Compact deep learned feature-based face recognition for Visual Internet of Things

    The Visual Internet of Things has received much attention in recent years due to its ability to get the object location via image information of the scene, attach the visual label to the object, and then retur...

    Seon Ho Oh, Geon-Woo Kim, Kyung-Soo Lim in The Journal of Supercomputing (2018)

  5. Chapter and Conference Paper

    Security Technologies Based on Home Gateway for Making Smart Home Secure

    As home network is expanding into ubiquitous computing environment and lots of private information is accessible, it is required to protect home network system from illegal accesses and security threats in ope...

    Geon Woo Kim, Deok Gyu Lee, Jong Wook Han in Emerging Directions in Embedded and Ubiqui… (2007)

  6. No Access

    Chapter and Conference Paper

    Security Framework for Home Network: Authentication, Authorization, and Security Policy

    As a number of home network services are available and home network is expanding into ubiquitous computing environment, we need to protect home network system from illegal accesses and a variety of threats. Ho...

    Geon Woo Kim, Deok Gyu Lee, Jong Wook Han in Emerging Technologies in Knowledge Discove… (2007)

  7. No Access

    Chapter and Conference Paper

    Security Policy Deployment in IPsec

    Security policy system defines the basic rules and strategies for information security systems, e.g., IPsec, IKE, and Firewalls. But due to the heterogeneous network security systems and the corresponding appl...

    Geon Woo Kim, So Hee Park, Jae Hoon Nah in Information Networking: Wireless Communica… (2002)