연구성과로 돌아가기

2021 연구성과 (143 / 281)

※ 컨트롤 + 클릭으로 열별 다중 정렬 가능합니다.
Excel 다운로드
WoS SCOPUS Document Type Document Title Abstract Authors Affiliation ResearcherID (WoS) AuthorsID (SCOPUS) Author Email(s) Journal Name JCR Abbreviation ISSN eISSN Volume Issue WoS Edition WoS Category JCR Year IF JCR (%) FWCI FWCI Update Date WoS Citation SCOPUS Citation Keywords (WoS) KeywordsPlus (WoS) Keywords (SCOPUS) KeywordsPlus (SCOPUS) Language Publication Stage Publication Year Publication Date DOI JCR Link DOI Link WOS Link SCOPUS Link
Article iGCACS-IoD: An Improved Certificate-Enabled Generic Access Control Scheme for Internet of Drones Deployment Due to wide-spread use of the Information and Communications Technology (ICT) and Internet of Things (IoT) enabled smart devices, called unmanned aerial vehicles (UAVs) (popularly known as drones), a lot of potential applications of Internet of Drones (IoD) are available ranging from the military to civilian applications. Access control mechanism is an important potential security service that is needed to secure communication among the drones in their respective flying zones, and also among the drones and the Ground Service Station (GSS). In 2021, Chaudhry et al. proposed a certificate based generic access control scheme for IoD environment, called GCACS-IoD. Their claims about the possible security attacks resistant of GCACS-IoD is not justified. In fact, we first prove that GCACS-IoD is unable to protect the disclosure of the private key r(CR) of the trusted control room (CR), which is extremely unfortunate careless design flaw and it leads to compromise the entire network. Using the disclosed private key r(CR), we further show that GCACS-IoD is completely insecure against other serious attacks, such as malicious drones deployment attack, drone/GSS impersonation attacks and Ephemeral Secret Leakage (ESL) attack, which lead to compromise the session key between any two drones communicating in a particular flying zone. We thus feel that there is a strong need to remedy such serious weaknesses found in Chaudhry et al.'s GCACS-IoD. An improved certificate-enabled generic access control scheme for IoD deployment, called as iGCACS-IoD, has been suggested, which overcomes the weaknesses found in the previous GCACS-IoD. The practical demonstration of iGCACS-IoD has been done through formal security verification and also through NS2 simulation study. Das, Ashok Kumar; Bera, Basudeb; Wazid, Mohammad; Jamal, Sajjad Shaukat; Park, Youngho Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India; Graph Era Deemed Be Univ, Dept Comp Sci & Engn, Dehra Dun 248002, Uttarakhand, India; King Khalid Univ, Coll Sci, Dept Math, Abha 61413, Saudi Arabia; Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea wazid, mohammad/X-4211-2018; WAZID, MOHAMMAD/X-4211-2018; Jamal, Sajjad/AHE-6498-2022; Das, Ashok Kumar/U-2790-2019; Bera, Basudeb/ACC-6233-2022 55450732800; 57214777647; 55480987400; 57198092048; 56962990300 itkgp.akdas@gmail.com;parkyh@knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 9 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2021 3.476 37.9 1.67 2025-07-30 15 25 Internet of Drones (IoD); cryptanalysis; access control; key establishment; security; NS2 simulation KEY AGREEMENT SCHEME; REMOTE USER AUTHENTICATION; LIGHTWEIGHT AUTHENTICATION; SECURE; PROTOCOL; BLOCKCHAIN; EXCHANGE; SURVEILLANCE; FRAMEWORK; ANONYMITY access control; cryptanalysis; Internet of Drones (IoD); key establishment; NS2 simulation; security Antennas; Drones; Internet of things; Military applications; Access control schemes; Cryptanalyse; Information and Communication Technologies; Internet of drone; Key establishments; NS2 simulation; Private key; Security; Smart devices; Wide spreads; Access control English 2021 2021 10.1109/access.2021.3089871 바로가기 바로가기 바로가기 바로가기
Article Implementation and Performance Evaluation for DSRC-Based Vehicular Communication System Traffic accidents and congestion are the most common on-road problems that might be anywhere and anytime. Recently, to deal with such problems, well-coordinated wireless communication system between vehicles, road side units (RSU), drones, etc., namely vehicle-to-everything (V2X) communication system, has been considered as a key technology enabling on-road human safety and convenience. One of the well-known building blocks of the V2X communication system is Wi-Fi based Dedicated Short Range Communication (DSRC) which performs stably, owing to a long year of study, simplicity and capability of distributed operation. In spite of promising opportunities brought by DSRC, its elaborate performance evaluation must be done under real-world scenarios, in advance to the actual use, since its performance is directly related to human and vehicle safety. In this context, this article presents field test results of DSRC-based V2X communication system we implemented. As a result of the line-of-sight (LoS) test, the distance represented by 90% or more of packet reception rate (PRR) was 720 meters at 5 dBm, and 1,035 meters at 11 dBm. In Non-LoS (NLOS) shadowing test, the distance represented by 90% or more of PRR was 175 meters at 5 dBm, and 520 meters at 11 dBm. And in NLoS intersection test, the distance represented by 90% or more of PRR was 320 meters at 5 dBm, and 515 meters at 11 dBm. Meanwhile, the distance for PRR 90% was up to 520 meters at urban environment, 1,219 meters on highway, and 1,700 meters inside a tunnel. Bae, Jeong-Kyu; Park, Myung-Chul; Yang, Eun-Ju; Seo, Dae-Wha CEST Co Ltd, Res Dept, Daegu 41566, South Korea; Ctr Embedded Software Technol, Daegu 41566, South Korea; Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea 57221303372; 56313821300; 57190139832; 35782242600 dwseo@ee.knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 9 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2021 3.476 37.9 1.82 2025-07-30 19 28 Vehicle-to-everything; Communication systems; Meters; Testing; Safety; Protocols; Performance evaluation; Vehicular communication; V2X; DSRC; C-V2X; performance evaluation C-V2X; DSRC; performance evaluation; V2X; Vehicular communication Roads and streets; Vehicles; Distributed operations; Intersection test; Key technologies; Packet Reception Rate; Real-world scenario; Urban environments; Vehicular communications; Wireless communication system; Dedicated short range communications English 2021 2021 10.1109/access.2020.3044358 바로가기 바로가기 바로가기 바로가기
Article iSPLInception: An Inception-ResNet Deep Learning Architecture for Human Activity Recognition Advances in deep learning (DL) model design have pushed the boundaries of the areas in which it can be applied. The fields with an immense availability of complex big data have been big beneficiaries of these advances. One such field is human activity recognition (HAR). HAR is a popular area of research in a connected world because internet-of-things (IoT) devices and smartphones are becoming more prevalent. A major research goal of recent research work has been to improve predictive accuracy for devices with limited computational resources. In this paper, we propose iSPLInception, a DL model motivated by the Inception-ResNet architecture from Google, that not only achieves high predictive accuracy but also uses fewer device resources. We evaluate the proposed model's performance on four public HAR datasets from the University of California, Irvine (UCI) machine learning repository. The proposed model's performance is compared to that of existing DL architectures that have been proposed in the recent past to solve the HAR problem. The proposed model outperforms these approaches on several metrics of accuracy, cross-entropy loss, and F-1 score on all the four datasets. The performance of the proposed iSPLInception model is validated on the UCI HAR using smartphones dataset, Opportunity activity recognition dataset, Daphnet freezing of gait dataset, and PAMAP2 physical activity monitoring dataset. The experiments and result analysis indicate that the proposed iSPLInception model achieves remarkable performance for HAR applications. Ronald, Mutegeki; Poulose, Alwin; Han, Dong Seog Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu 41566, South Korea; Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea , ALWIN POULOSE/S-4914-2018; Han, Dong Seog/N-8949-2018; POULOSE, ALWIN/S-4914-2018 57224199608; 57205504085; 7403219442 dshan@knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 9 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2021 3.476 37.9 9.92 2025-07-30 122 159 Human activity recognition; deep learning; inception module; Inception-ResNet; time-series classification FRAMEWORK; PLATFORM; LIFE deep learning; Human activity recognition; inception module; Inception-ResNet; time-series classification Architecture; Internet of things; Learning systems; Pattern recognition; Smartphones; Activity recognition; Computational resources; Human activity recognition; Internet of Things (IOT); Learning architectures; Machine learning repository; Physical activity monitoring; University of California; Deep learning English 2021 2021 10.1109/access.2021.3078184 바로가기 바로가기 바로가기 바로가기
Article Learning-Based Illuminant Estimation Model With a Persistent Memory Residual Network (PMRN) Architecture Since AlexNet, large deep convolutional neural networks (DCNNs) have been one of the major topics of interest in the field of computer vision, as well as bringing remarkable progress to the field. However, there has been little effort to use the DCNNs in realizing the mechanism of human memory. The human memory can be classified into three types: sensory memory, short-term memory and long-term memory. The short-term memory, also known as primary memory or active memory, is the information that humans are presently perceiving or thinking about, whereas the long-term memory refers to the persistent storage of information. In the mechanism of the human brain, the long-term memory enables the human vision to identify the actual color of an object effortlessly. In the computer vision, the DCNN-based illuminant estimation models are facing the long-term dependency problem as deeper networks encounter widening gaps between their earlier layers and later layers. Therefore, it is highly inspiring to apply the human long-term memory to the DCNN-based illuminant estimation models. The natural motivation of this article is to present a novel persistent memory residual network (PMRN) model which provides the DCNN with explicit access to persistent memory. The proposed PMRN architecture has two distinct units: a recursive unit and a gate unit. The two units combined serve to facilitate persistent memory access in a non-recursive fashion. The recursive unit has four residual blocks which are trained on the multiple-level image features on diverse receptive fields. The residual block outputs are concatenated and then fed into the gate unit. The proposed architecture keeps track of the recursive unit, deciding on how many of the earlier blocks to keep in reserve and how much of the image features to let the present block store. In this way, the proposed architecture contributes to solving the long-term dependency problem of conventional DCNNs. Comprehensive experiments support unparalleled performance of the proposed architecture in comparison to its counterparts and its potential to meet the needs of illumination estimation applications. Choi, Ho-Hyoung; Yun, Byoung-Ju Kyungpook Natl Univ, Adv Dent Device Dev Inst, Sch Dent, Daegu 41940, South Korea; Kyungpook Natl Univ, Coll IT Engn, Sch Elect Engn, Daegu 41566, South Korea 37048369000; 7006416932 bjisyun@ee.knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 9 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2021 3.476 37.9 0.15 2025-07-30 4 3 Image color analysis; Estimation; Computer architecture; Lighting; Logic gates; Semantics; Reflectivity; Human memory; long-term dependency problem; short-term memory; long-term memory; illumination estimation; persistent memory residual network (PMRN) COLOR CONSTANCY; RETINEX THEORY Human memory; illumination estimation; long-term dependency problem; long-term memory; persistent memory residual network (PMRN); short-term memory Brain; Convolutional neural networks; Deep neural networks; Network architecture; Illuminant estimation; Illumination estimation; Long-term dependencies; Persistent memory; Persistent storage; Proposed architectures; Receptive fields; Short term memory; Memory architecture English 2021 2021 10.1109/access.2021.3059914 바로가기 바로가기 바로가기 바로가기
Article Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes Smart homes are an emerging paradigm of Internet of Things (IoT) in which users can remotely control various home devices via the internet anytime and anywhere. However, smart home environments are vulnerable to security attacks because an attacker can inject, insert, intercept, delete, and modify transmitted messages over an insecure channel. Thus, secure and lightweight authentication protocols are essential to ensure useful services in smart home environments. In 2021, Kaur and Kumar presented a two-factor based user authentication protocol for smart homes using elliptic curve cryptosystems (ECC). Unfortunately, we demonstrate that their scheme cannot resist security attacks such as impersonation and session key disclosure attacks, and also ensure secure user authentication. Moreover, their scheme is not suitable in smart home environments because it utilizes public-key cryptosystems such as ECC. Hence, we design a secure and lightweight three-factor based privacy-preserving authentication scheme for IoT-enabled smart home environments to overcome the security problems of Kaur and Kumar's protocol. We prove the security of the proposed scheme by using informal and formal security analyses such as the ROR model and AVISPA simulation. In addition, we compare the performance and security features between the proposed scheme and related schemes. The proposed scheme better provides security and efficiency compared with the previous schemes and is more suitable than previous schemes for IoT-enabled smart home environments. Yu, Sungjin; Jho, Namsu; Park, Youngho Elect & Telecommun Res Inst, Daejeon 34129, South Korea; Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea; Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea 57203974524; 8976178000; 56962990300 parkyh@knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 9 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2021 3.476 37.9 3.71 2025-07-30 42 56 Security; Smart homes; Authentication; Smart devices; Protocols; Elliptic curve cryptography; Password; Smart homes; privacy-preserving; authentication; security protocol PROTOCOL; SECURE; CARD authentication; privacy-preserving; security protocol; Smart homes Ambient intelligence; Authentication; Automation; Intelligent buildings; Privacy by design; Public key cryptography; Security systems; Elliptic Curve cryptosystems; Formal security analysis; Internet of Things (IOT); Lightweight authentication protocols; Privacy-preserving authentication; Public key cryptosystems; User authentication; User authentication protocols; Internet of things English 2021 2021 10.1109/access.2021.3111443 바로가기 바로가기 바로가기 바로가기
Article Linguistic-Coupled Age-to-Age Voice Translation to Improve Speech Recognition Performance in Real Environments We address a low-performance problem of the elderly in automatic speech recognition (ASR) through feature adaptation agnostic to the ASR. Most of the datasets for speech recognition models consist of datasets collected from adult speakers. Consequently, the majority of commercial speech recognition systems typically tend to perform well on adult speakers. In other words, the limited diversity of speakers in the training datasets yields unreliable performance for minority (e.g., elderly) speakers due to the infeasible acquisition of training data. In response, this paper suggests a neural network-based voice conversion framework to enhance speech recognition of the minority. To this end, we propose a voice translation model including an unsupervised phonology clustering to extract linguistic information to fit the minority's speech to a current acoustic model frame. Our proposal is a spectral feature adaptation method that can be placed in front of any commercial or open ASR system, avoiding directly modifying the speech recognizer. The experimental results and analysis demonstrate the effectiveness of our proposed method through improvement in elderly speech recognition accuracy. Kim, June-Woo; Yoon, Hyekyung; Jung, Ho-Young Kyungpook Natl Univ, Grad Sch, Dept Artificial Intelligence, Daegu 41566, South Korea 57219550643; 57273359500; 57198760619 hoyjung@knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 9 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2021 3.476 37.9 0.82 2025-07-30 2 11 Speech recognition; Senior citizens; Linguistics; Hidden Markov models; Feature extraction; Bridges; Adaptation models; Speech recognition; voice translation; spectral feature transform; age-on-demand speech recognition TRANSFORMER; MODEL age-on-demand speech recognition; spectral feature transform; Speech recognition; voice translation Linguistics; Speech processing; Translation (languages); Age-on-demand speech recognition; Automatic speech recognition; Feature adaptation; Feature transform; On demands; Real environments; Spectral feature; Spectral feature transform; Speech recognition performance; Voice translation; Speech recognition English 2021 2021 10.1109/access.2021.3115608 바로가기 바로가기 바로가기 바로가기
Article Low-Power Cross-Layer Error Management Using MIMO-LDPC Iterative Decoding for Video Processing This paper presents a novel low-power joint decoding system composed of a multiple-input multiple-output (MIMO) detector, low-density parity-check (LDPC) channel decoder, and H.264 source decoder for energy-aware and cross-layer source-channel transmission systems. Our aim is to achieve a minimum power design that meets the expected quality of service (QoS) at the application layer. This design includes an iterative MIMO-LDPC decoder for minimizing communication errors and an unequal error protection scheme for reducing energy consumption in transmission. The experiment results reveal that our proposed iterative MIMO-LDPC-H.264 joint decoder achieved up to 66% energy reduction with only 0.09 dB peak signal-to-noise ratio degradation when compared to a non-UEP based joint source-channel decoding system. Yang, Yoon Seok; Kim, Yongtae Intel Corp, Intel Labs, Santa Clara, CA 95054 USA; Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu 41566, South Korea Yang, Yoon/AGQ-1174-2022 36162192400; 55699627900 yongtae@knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 9 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2021 3.476 37.9 0.07 2025-07-30 0 1 Iterative decoding; MIMO communication; Streaming media; Wireless communication; Quality of service; Maximum likelihood decoding; Detectors; MIMO; LDPC; iterative decoding; unequal error protection; H264; H265 data partitioning; joint source-channel decoding; low-power design; error resilience; energy-aware communication system; QoS for video processing SCALABLE VIDEO; TRANSMISSION; DESIGN; COMMUNICATION; OPTIMIZATION; ALLOCATION; CRITERION Energy-aware communication system; Error resilience; H264/H265 data partitioning; Iterative decoding; Joint source-channel decoding; LDPC; Low-power design; MIMO; QoS for video processing; Unequal error protection Channel coding; Electric power supplies to apparatus; Electric power transmission; Energy utilization; Errors; Image coding; Iterative decoding; Power management; Satellite communication systems; Signal to noise ratio; Video signal processing; Communications systems; Data partitioning; Energy aware communication; Energy-aware communication system; Error resilience; H.264/h.265 data partitioning; Iterative decodings; Joint source channel decoding; Low-density parity-check; Low-power design; Quality of service for video processing; Quality-of-service; Unequal error protections; Video processing; Quality of service English 2021 2021 10.1109/access.2021.3115671 바로가기 바로가기 바로가기 바로가기
Article Multi-Saliency Map and Machine Learning Based Human Detection for the Embedded Top-View Imaging System Compared to the side view, a top-view is robust against occlusion generated by objects located indoors. It offers a better wide view angle and much visibility of a scene. However, there are still problems to be handled. The top-view image shows asymmetrical features and radially distorted scenes around the corners, such as omnidirectional view images and self-occlusion. Conventional human detection methods are suitable for finding moving objects in front view imaging systems. And there are some limitations, such as slow execution speed due to computational complexity. In this paper, we propose an efficient method. A static saliency map with low activity and a dynamic saliency map with a lot of movement are respectively detected. These two models were fused to create a multi-saliency map, and both characteristics were used simultaneously to improve detection rates. To handle problems such as asymmetry, a rotation matrix was calculated around the center, and Histogram of Oriented Gradient (HOG) features descriptor were extracted from the multi-saliency map to create an image patch (a small image region of interest containing human candidates). For the classification of image patches, we used machine learning-based supervised learning models support-vector machine (SVM) algorithm to improve performance. As a result of the proposed algorithm, it showed low resource occupancy and achieved Average Precision of 92.3% and 96.12% when Intersection over Union were 50% and 45% respectively. Lee, Seung Jun; Kim, Byeong Hak; Kim, Min Young Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea; Korea Inst Ind Technol, Daegu 42990, South Korea; Kyungpook Natl Univ, Res Ctr Neurosurg Robot Syst, Daegu 41566, South Korea 57365596600; 56406686400; 56739349100 minykim@knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 9 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2021 3.476 37.9 0.3 2025-07-30 3 4 Feature extraction; Head; Cameras; Support vector machines; Classification algorithms; Shape; Principal component analysis; Top-view; human detection; image subtraction; saliency map; clustering; classification; machine learning algorithms classification; clustering; human detection; image subtraction; machine learning algorithms; saliency map; Top-view Image enhancement; Image segmentation; Imaging systems; Support vector machines; Detection rates; Histogram of oriented gradients (HOG); Human detection; Improve performance; Omni-directional view; Rotation matrices; Static saliency map; Support vector machine algorithm; Learning systems English 2021 2021 10.1109/access.2021.3078623 바로가기 바로가기 바로가기 바로가기
Article On the Design of Lightweight and Secure Mutual Authentication System for Global Roaming in Resource-Limited Mobility Networks A secure authentication protocol plays a crucial role in securing communications over wireless and mobile networks. Due to resource-limitations and the nature of the wireless channel, the global mobile networks are highly susceptible to various attacks. Recently, an efficient authentication system for global roaming has been proposed in the literature. In this article, we first show that the analyzed authentication system is vulnerable man-in-the-middle attack, replay attack and Denial-of-Service (DoS) attack, and it does not ensure untraceability and local password-verification process to identify wrong passwords. To fix these security flaws, we propose a more efficient and robust authentication system for roaming in mobility networks. We use the formal verification tools like ProVerif, Automated Validation of Internet Security Protocols and Applications (AVISPA) and Burrows-Abadi-Needham (BAN) logic to check the regularity of the authentication protocol. Moreover, we prove the secrecy of a session key through the formal security using the random oracle model, known as Real-Or-Random (ROR) model. Finally, a detailed performance evaluation proves that the security protocol not only provides a security strength, but also preserves the low computational overhead. Thus, the proposed authentication protocol is secure and computationally efficient as compared to other relevant schemes. Shashidhara, R.; Nayak, Sanjeet Kumar; Das, Ashok Kumar; Park, Youngho Bennett Univ, Dept Comp Sci Engn, Greater Noida 201310, India; Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India; Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea; Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea Das, Ashok Kumar/U-2790-2019; Shashidhara, R/ABG-7111-2021 57211937805; 55811613100; 55450732800; 56962990300 parkyh@knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 9 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2021 3.476 37.9 0.98 2025-07-30 7 13 Authentication; Security; Protocols; Roaming; Password; Cryptography; Wireless sensor networks; Global roaming; authentication; key establishment; cryptanalysis; security; BAN logic; AVISPA authentication; AVISPA; BAN logic; cryptanalysis; Global roaming; key establishment; security Authentication; Cellular radio systems; Computation theory; Cryptography; Denial-of-service attack; Formal verification; Internet protocols; Mobile security; Mobile telecommunication systems; Wireless networks; Authentication protocols; Authentication systems; Computational overheads; Computationally efficient; Efficient authentication; Formal verification tools; Man in the middle attacks; Password verifications; Network security English 2021 2021 10.1109/access.2021.3050402 바로가기 바로가기 바로가기 바로가기
Article On the Security of a Secure and Lightweight Authentication Scheme for Next Generation IoT Infrastructure In recent years, the Internet of things (IoT) has become an encouraging communication paradigm that has numerous applications including smart city, smart home and intelligent transportation system. The information sensed by several IoT smart devices can be security stored at the (cloud) servers. An external user, being a client, can access the services from a server for the sensing information, provided that a mutual authentication happens among them. Using the established session key among the user and the server, encrypted information with the help of session key can be delivered to the user by the server securely. Recently, Rana et al. proposed a smart-card based remote user authentication scheme using user password. In this comment paper, we carefully analyzed the scheme of Rana et al. and tracked down that their scheme is insecure against serious attacks, including stolen smart card attack, privileged-insider attack, user impersonation attack, password change attack and Ephemeral Secret Leakage (ESL) attack. Furthermore, their scheme does not preserve untraceability feature. To remedy these security pitfalls, we also provide some remedies that can help in building more secure and effective user authentication scheme to apply in securing next generation IoT infrastructure. Das, Ashok Kumar; Bera, Basudeb; Wazid, Mohammad; Jamal, Sajjad Shaukat; Park, Youngho Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India; Graph Era, Dept Comp Sci & Engn, Dehra Dun 248002, Uttarakhand, India; King Khalid Univ, Dept Math, Abha 61413, Saudi Arabia; Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea Das, Ashok Kumar/U-2790-2019; Jamal, Sajjad/AHE-6498-2022; WAZID, MOHAMMAD/X-4211-2018; Bera, Basudeb/ACC-6233-2022; wazid, mohammad/X-4211-2018 55450732800; 57214777647; 55480987400; 57198092048; 56962990300 iitkgp.akdas@gmail.com;parkyh@knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 9 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2021 3.476 37.9 2.88 2025-07-30 16 41 Servers; Security; Internet of Things; Authentication; Smart cards; Password; Licenses; Internet of Things (IoT); cryptanalysis; authentication; key agreement; security KEY AGREEMENT SCHEME; PASSWORD AUTHENTICATION; USER ANONYMITY; INTERNET; ENHANCEMENT; PROTOCOL; IMPROVEMENT authentication; cryptanalysis; Internet of Things (IoT); key agreement; security Authentication; Automation; Cryptography; Intelligent systems; Smart cards; Authentication scheme; Communication paradigm; Encrypted informations; Intelligent transportation systems; Internet of thing (IOT); Remote user authentication schemes; User authentication scheme; User impersonation attacks; Internet of things English 2021 2021 10.1109/access.2021.3079312 바로가기 바로가기 바로가기 바로가기
Article Polycrystalline-Silicon-MOSFET-Based Capacitorless DRAM With Grain Boundaries and Its Performances In this work, a capacitorless one-transistor dynamic random access memory (1T-DRAM) based on a polycrystalline silicon (poly-Si) metal-oxide-semiconductor field-effect transistor was designed and analyzed through a technology computer-aided design (TCAD) simulation. A poly-Si thin film was utilized within the device because of several advantages, including its low fabrication cost and the feasibility of its use in high-density three-dimensional (3D) memory arrays. An asymmetric dual-gate structure is proposed to perform the write "1" operation and achieve high retention characteristics. The proposed 1T-DRAM cell demonstrates a high sensing margin of 8.73 fiA/fim and a high retention time of 704.4 ms compared to previously reported 1T-DRAMs, even at a high temperature. In addition, the effect of grain boundaries on the memory performance of the proposed device was investigated, and the results validated the excellent reliability of its retention characteristics even in the presence of grain boundaries (>64 ms at T D 358 K). Lee, Sang Ho; Jang, Won Douk; Yoon, Young Jun; Seo, Jae Hwa; Mun, Hye Jin; Cho, Min Su; Jang, Jaewon; Bae, Jin-Hyuk; Kang, In Man Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 702201, South Korea; Samsung Elect Co Ltd, Hwasung Si 445701, South Korea; Korea Atom Energy Res Inst, Korea Multipurpose Accelerator Complex, Gyeongju 38180, South Korea Lee, Sang Ho/MCX-8396-2025; Seo, Jae Hwa/KYP-7367-2024 57416738400; 57211978212; 57218864885; 55516610100; 57219936994; 57188742288; 57194107504; 35326180700; 7203062678 imkang@ee.knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 9 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2021 3.476 37.9 0.98 2025-07-30 12 14 Polycrystalline silicon; one-transistor dynamic random access memory; grain boundaries; metal-oxide-semiconductor field-effect transistor; one transistor dynamic random access memory; dualgate dualgate; grain boundaries; metal-oxide-semiconductor field-effect transistor; one transistor dynamic random access memory; one-transistor dynamic random access memory; Polycrystalline silicon Electronic design automation; Field effect transistors; Grain boundaries; Polycrystalline materials; Polysilicon; Static random access storage; Capacitorless drams; Dual-gate structure; One-transistor dynamic random access memory (1t-dram); Polycrystalline silicon (poly-Si); Retention characteristics; Semiconductor field-effect transistors; Technology computer aided design; Three-dimensional (3D) memory; Dynamic random access storage English 2021 2021 10.1109/access.2021.3068987 바로가기 바로가기 바로가기 바로가기
Article Power Flow Analysis of Islanded Microgrids: A Differential Evolution Approach Power flow (PF) analysis of microgrids (MGs) has been gaining a lot of attention due to the evolution of islanded MGs. To calculate islanded MGs' PF solution, a globally convergent technique is proposed using Differential Evolution (DE)- a popular optimization algorithm for global non-convex optimization. This paper formulates the PF problem as a constrained optimization problem (COP) considering all the operating conditions of the Droop Controlled Islanded MGs (DCIMGs). To solve the proposed COP, epsilon DE-NGM, (Epsilon based Differential Evolution with Newton-Gauss-based mutation) is proposed. The proposed algorithm, epsilon DE-NGM, is a novel variant of DE since it comprises a novel mutation operator, Newton-Gauss-based mutation (NGM). NGM includes all the important features of DE's mutation strategies as well as reduces the constraint violation by utilizing the information of constraint-space. Numerical experiments validate that the global convergence ability of proposed algorithms in solving COPs than existing state-of-the-art algorithms. Furthermore, the proposed algorithm as a PF tool has better robustness than existing tools on ill- and well-conditioned systems with heavy loads, different limit violations, and inappropriate final solutions (far from the flat start). The performed comparative analysis confirms good agreement of accuracy and efficacy with the existing method for islanded MG's PF. Kumar, Abhishek; Jha, Bablesh Kumar; Das, Swagatam; Mallipeddi, Rammohan Indian Inst Technol BHU, Dept Elect Engn, Varanasi 221005, Uttar Pradesh, India; Indian Inst Technol Gandhinagar, Dept Elect Engn, Gandhinagar 382355, India; Indian Stat Inst, Elect & Commun Sci Unit, Kolkata 700108, India; Kyungpook Natl Univ, Sch Elect Engn, Dept Artificial Intelligence, Daegu 702701, Daegu 702701, South Korea Jha, Bablesh/B-2801-2019; Mallipeddi, Rammohan/AAL-5306-2020; Kumar, Abhishek/ABA-5251-2021; Das, Swagatam/AAG-6753-2019 57206266703; 57197764988; 24729258600; 25639919900 mallipeddi.ram@gmail.com; IEEE ACCESS IEEE ACCESS 2169-3536 9 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2021 3.476 37.9 2.42 2025-07-30 28 35 Constrained optimization problem; differential evolution; islanded microgrid; power flow; distributed generation BACKWARD/FORWARD SWEEP ALGORITHM; CONSTRAINT-HANDLING METHOD; DYNAMIC ECONOMIC-DISPATCH; NEWTON-RAPHSON; OPTIMIZATION; OPERATION; STRATEGIES; SYSTEMS; HYBRID; MODES Constrained optimization problem; differential evolution; distributed generation; islanded microgrid; power flow Constrained optimization; Convex optimization; Genetic algorithms; Microgrids; Constrained optimi-zation problems; Constraint violation; Differential Evolution; Global convergence ability; Nonconvex optimization; Numerical experiments; Optimization algorithms; State-of-the-art algorithms; Electric load flow English 2021 2021 10.1109/access.2021.3073509 바로가기 바로가기 바로가기 바로가기
Article REF-Net: Robust, Efficient, and Fast Network for Semantic Segmentation Applications Using Devices With Limited Computational Resources Considering importance of the autonomous driving applications for mobile devices, it is imperative to develop both fast and accurate semantic segmentation models. Thanks to emergence of Deep Learning (DL) techniques, the segmentation models enhanced their accuracy. However, this improved performance of currently popular DL models for self-driving car applications come at the cost of time and computational efficiency. Moreover, networks with efficient model architecture experience lack of accuracy. Therefore, in this study, we propose robust, efficient, and fast network (REF-Net) that combines carefully formulated encoding and decoding paths. Specifically, the contraction path uses mixture of dilated and asymmetric convolution layers with skip connections and bottleneck layers, while the decoding path benefits from nearest neighbor interpolation method that demands no trainable parameters to restore original image size. This model architecture considerably reduces the number of trainable parameters, required memory space, training, and inference time. In fact, the proposed model required nearly 90 times fewer trainable parameters and approximately 4 times less memory space that allowed 3-fold faster training runtime and 2-fold inference speedup in the conducted experiments using Cambridge-driving Labeled Video Database (CamVid) and Cityscapes datasets. Moreover, despite its notable efficiency in terms of memory and time, the REF-Net attained superior results in several segmentation evaluation metrics that showed roughly 2%, 4%, and 3% increase in pixel accuracy, Dice coefficient, and Jaccard Index, respectively. Olimov, Bekhzod; Kim, Jeonghong; Paul, Anand Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu 41566, South Korea ; Paul, Anand/V-6724-2017; Olimov, Bekhzod/AAA-9362-2021 57220579660; 55138548100; 56650522400 jhk@knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 9 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2021 3.476 37.9 1.36 2025-07-30 19 21 Semantics; Autonomous vehicles; Computational modeling; Image segmentation; Decoding; Training; Convolution; Autonomous driving; deep convolutional neural networks; nearest neighbor interpolation; semantic segmentation IMAGE SEGMENTATION; POINT CLOUD Autonomous driving; Deep convolutional neural networks; Nearest neighbor interpolation; Semantic segmentation Autonomous vehicles; Computational efficiency; Decoding; Deep learning; Efficiency; Memory architecture; Semantic Web; Semantics; Autonomous driving; Computational resources; Encoding and decoding; Model architecture; Nearest neighbor interpolation; Segmentation evaluation metrics; Segmentation models; Semantic segmentation; Network architecture English 2021 2021 10.1109/access.2021.3052791 바로가기 바로가기 바로가기 바로가기
Article Resource-Optimized Design of Bit-Shuffle Block Coding for MIMO-VLC Designing a run-length-limited (RLL) code for a visible light communication (VLC) system requires consideration of several performance factors including hardware overhead, transmission efficiency, and direct current (DC) balance. This paper proposes a novel RLL code called bit-shuffle block codes for high-rate multiple-input multiple-output (MIMO)-VLC systems that can offer excellent constant illumination and transmission efficiency with extensively-optimized hardware resources. Due to the structure of the Omega network, the proposed bit-shuffle block coding method can increase transmission efficiency and significantly reduce hardware overhead. In addition, it can generate codewords dynamically, which guarantees DC balance with multiple LEDs to serve the dual purpose of illumination and communication. Experimental results confirm that the proposed bit-shuffle block coding demonstrate excellent performance in resource optimization, and can be a viable solution for MIMO-VLC applications that can send large volumes data with limited hardware resources. Han, Youngsun; Lee, Sanghyeon; Kim, Byung Wook; Kim, Yongtae Pukyong Natl Univ, Dept Comp Engn, Busan 48513, South Korea; Changwon Natl Univ, Dept Informat & Commun Engn, Chang Won 51140, Gyeongnam, South Korea; Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu 41566, South Korea 7404096461; 59951851100; 57195558142; 55699627900 bwkim@changwon.ac.kr;yongtae@knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 9 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2021 3.476 37.9 0.23 2025-07-30 4 3 Multiple-input multiple-output (MIMO); visible light communication (VLC); run-length-limited (RLL) codes; hardware resource optimization; bit-shuffling VISIBLE-LIGHT COMMUNICATION; CONSTELLATION DESIGN bit-shuffling; hardware resource optimization; Multiple-input multiple-output (MIMO); run-length-limited (RLL) codes; visible light communication (VLC) Efficiency; MIMO systems; Hardware overheads; Hardware resources; Optimized designs; Performance factors; Resource optimization; Run length limited code; Transmission efficiency; Visible light communications (VLC); Visible light communication English 2021 2021 10.1109/access.2021.3095514 바로가기 바로가기 바로가기 바로가기
Article Reverberation Suppression Method for Active Sonar Systems Using Non-Negative Matrix Factorization With Pre-Trained Frequency Basis Matrix In active sonar systems, detection always suffers from reverberation interference from multiple scatterers in oceanic environments; therefore, numerous studies have been conducted on reverberation suppression. Recently, a non-negative matrix factorization (NMF)-based method was proposed and successfully applied to reverberation suppression. However, the conventional NMF-based method makes convergence challenging because the frequency basis matrix is initialized without considering reverberation characteristic information from oceanic environments. To solve these problems, We propose an improved NMF-based reverberation suppression method adopting a pre-trained reverberation basis matrix and modified sparse update rule. The proposed method is evaluated by analyzing simulation and sea experiment data and the study confirmed that the detection performance was improved compared to the conventional method under various signal-to-reverberation ratio conditions. Several topics are also discussed to analyze the proposed method in detail. Kim, Geunhwan; Lee, Seokjin Kyungpook Natl Univ, Coll IT Engn, Elect & Elect Engn, Daegu 41566, South Korea 57214800540; 36174416200 sjlee6@knu.ac.kr; IEEE ACCESS IEEE ACCESS 2169-3536 9 SCIE COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS 2021 3.476 37.9 0.45 2025-07-30 3 6 Reverberation; Spectrogram; Time-frequency analysis; Sonar; Matrix decomposition; Sparse matrices; Support vector machines; Active sonar; non-negative matrix factorization; reverberation suppression; pre-trained basis matrix; sparseness Active sonar; Non-negative matrix factorization; Pre-trained basis matrix; Reverberation suppression; Sparseness Factorization; Matrix algebra; Sonar; Active sonar; Base matrix; Matrix decomposition; Nonnegative matrix factorization; Pre-trained base matrix; Reverberation suppressions; Sparse matrices; Sparseness; Spectrograms; Support vectors machine; Time-frequency Analysis; Reverberation English 2021 2021 10.1109/access.2021.3124509 바로가기 바로가기 바로가기 바로가기
페이지 이동:

논문 데이터 용어 설명

용어 설명
WoS Web of Science. Clarivate Analytics에서 제공하는 학술 데이터베이스입니다. 해당 논문이 WoS에 수록되어 있는지 여부를 표시합니다 (○: 수록됨).
SCOPUS Elsevier에서 제공하는 세계 최대 규모의 초록 및 인용 데이터베이스입니다. 해당 논문이 SCOPUS에 수록되어 있는지 여부를 표시합니다 (○: 수록됨).
Document Type 문헌의 유형을 나타냅니다. Article(원저), Review(리뷰), Proceeding Paper(학회논문), Editorial Material(편집자료), Letter(레터) 등으로 분류됩니다.
Title 논문의 제목입니다.
Abstract 논문의 초록(요약)입니다. 연구의 목적, 방법, 결과, 결론을 간략히 요약한 내용입니다.
Authors 논문의 저자 목록입니다. 공동 저자가 여러 명인 경우 세미콜론(;)으로 구분됩니다.
Affiliation 저자들의 소속 기관 정보입니다. 대학, 연구소, 기업 등 저자가 소속된 기관명이 표시됩니다.
ResearcherID (WoS) Web of Science의 고유 연구자 식별번호입니다. 동명이인을 구분하고 연구자의 업적을 정확하게 추적할 수 있습니다.
AuthorsID (SCOPUS) SCOPUS의 고유 저자 식별번호입니다. 연구자의 모든 출판물을 추적하고 관리하는 데 사용됩니다.
Journal 논문이 게재된 학술지의 정식 명칭입니다.
JCR Abbreviation Journal Citation Reports에서 사용하는 저널의 공식 약어입니다. 저널을 간략하게 표기할 때 사용됩니다.
ISSN International Standard Serial Number. 국제표준연속간행물번호로, 인쇄본 저널에 부여되는 고유 식별번호입니다.
eISSN Electronic ISSN. 전자 버전 저널에 부여되는 고유 식별번호입니다.
Volume 저널의 권(Volume) 번호입니다. 보통 연도별로 하나의 권이 부여됩니다.
Issue 저널의 호(Issue) 번호입니다. 한 권 내에서 여러 호로 나누어 출판되는 경우가 많습니다.
WoS Edition Web of Science의 에디션입니다. SCIE(Science Citation Index Expanded), SSCI(Social Sciences Citation Index), AHCI(Arts & Humanities Citation Index) 등으로 구분됩니다.
WoS Category Web of Science의 주제 분류 카테고리입니다. 저널과 논문이 속한 학문 분야를 나타냅니다.
JCR Year 해당 저널의 JCR(Journal Citation Reports) 지표가 산출된 연도입니다.
IF (Impact Factor) 저널 영향력 지수. 최근 2년간 발표된 논문이 해당 연도에 평균적으로 인용된 횟수를 나타냅니다. 저널의 학술적 영향력을 나타내는 대표적인 지표입니다.
JCR (%) 해당 카테고리에서 저널이 위치하는 상위 백분율입니다. 값이 낮을수록 우수한 저널임을 의미합니다 (예: 5%는 상위 5%를 의미).
FWCI Field-Weighted Citation Impact. 분야별 가중 인용 영향력 지수입니다. 논문이 받은 인용을 동일 분야, 동일 연도, 동일 문헌 유형의 평균과 비교한 값입니다. 1.0이 평균이며, 1.0보다 높으면 평균 이상의 인용을 받았음을 의미합니다.
FWCI UpdateDate FWCI 값이 마지막으로 업데이트된 날짜입니다. FWCI는 인용이 누적됨에 따라 주기적으로 업데이트됩니다.
WOS Citation Web of Science에서 집계된 해당 논문의 총 인용 횟수입니다.
SCOPUS Citation SCOPUS에서 집계된 해당 논문의 총 인용 횟수입니다.
Keywords (WoS) 저자가 논문에서 직접 지정한 키워드입니다. Web of Science에 등록된 저자 키워드 목록입니다.
KeywordsPlus (WoS) Web of Science에서 자동으로 추출한 추가 키워드입니다. 논문의 참고문헌 제목에서 자주 등장하는 단어들로 생성됩니다.
Keywords (SCOPUS) 저자가 논문에서 직접 지정한 키워드입니다. SCOPUS에 등록된 저자 키워드 목록입니다.
KeywordsPlus (SCOPUS) SCOPUS에서 자동으로 추출하거나 추가한 색인 키워드입니다.
Language 논문이 작성된 언어입니다. 대부분 English이며, 그 외 다양한 언어로 작성된 논문이 포함될 수 있습니다.
Publication Year 논문이 출판된 연도입니다.
Publication Date 논문의 정확한 출판 날짜입니다 (년-월-일 형식).
DOI Digital Object Identifier. 디지털 객체 식별자로, 논문을 고유하게 식별하는 영구적인 식별번호입니다. 이를 통해 논문의 온라인 위치를 찾을 수 있습니다.