Publications
International Journals
2024
"Ghost in the radio: An audio adversarial attack using environmental noise through radio" [link]
Hyoungjun Choi, Jihyuk Jung, and Ji Won Yoon, IEEE Access, 2024
Detection of Defects on Cut-out Switches in High-resolution images Based on YOLOv5 Algorithm [link]
Youngjun Kim, Sung Soo Lim, Se-Yeong and Ji Won Yoon, Journal of Electrical Engineering & Technology, 06 March 2024
An Analysis of GPS Spoofing Attack and Efficient Approach to Spoofing Detection in PX4 [link]
Ji Hyuk Jung, Mi Yeon Hong, Hyeongjun Choi, and Ji Won Yoon, IEEE Access, Volume 12
2023
BAN: Predicting APT Attack Based on Bayesian Network With MITRE ATT&CK Framework [link]
Youngjoon Kim, Insup Lee, Hyuk Kwon, Kyeongsik Lee, and Ji Won Yoon, IEEE Access, Volume 11, Page(s): 91949 - 91968, 18 August 2023, Electronic ISSN: 2169-3536, DOI: 10.1109/ACCESS.2023.3306593
Voice Spoofing Detection Through Residual Network, Max Feature Map, and Depthwise Separable Convolution [link]
I.-Y. Kwak, S. Kwag, J. Lee, Youngbae Jeon, Jeonghwan Hwang, H.-J. Choi, J.-H. Yang, S.-Y. Han, J. H. Huh, C.-H. Lee, Ji Won Yoon, IEEE Access, Volume 11, Page(s): 49140-49152, 12 May 2023, Electronic ISSN: 2169-3536, DOI: 10.1109/ACCESS.2023.3275790
CASPER: Covert Channel Using Internal Speakers [link]
Hyeongjun Choi, Ji Hyuk Jung, and Ji Won Yoon. 2023. Sensors 23, no. 6: 2970. https://doi.org/10.3390/s23062970
** This paper is cited from various mass media in online as follows!
bleepingcomputer [link], bitdefender [link], heimdalsecurity [link], goincognito [link], latesthackingnews [link], and extra
Clock Offset Estimation for Systems with Asymmetric Packet Delays [link]
Y.M. Ha, U.J. Pak, J.K, T.H. Kim and Ji Won Yoon, IEEE/ACM Transactions on Networking , Volume: 31, Issue: 4, pp. 1838 - 1853, 03 January 2023, DOI: 10.1109/TNET.2022.3229407
2022
A Phase-Based Approach for ENF Signal Extraction From Rolling Shutter Videos [link]
Hyekyung Han, Youngbae Jeon, Baek-kyung Song and Ji Won Yoon, IEEE Signal Processing Letters, Volume 29, Pages 1724-1728, 08 July, 2022 DOI: 10.1109/LSP.2022.3189306
The impact of COVID-19 on cryptocurrency markets: A network analysis based on mutual information [link]
Mi Yeon Hong, Ji Won Yoon, PLOS ONE 17.2 (2022)
2021
t-BMPNet: Trainable Bitwise Multilayer Perceptron Neural Network over Fully Homomorphic Encryption Scheme [link]
J. S. Yoo, J.W. Yoon, Security and Communication Networks (2021)
A new approach to training more interpretable model with additional segmentation [link]
Sunguk Shin, Youngjoon Kim, and Ji Won Yoon, Pattern Recognition Letters, Volume 152, December 2021, Pages 188-194 (2021)
Efficient Correlation Power Analysis (CPA) Focusing on Byte-Wise Calculation Points [link]
Youngbae Jeon, Ji Hyeok Jung, Ji Won Yoon, IEEE Access 9, 74275-74285
2020
Maxafl: Maximizing code coverage with a gradient-based optimization technique, [link]
Y Kim, J Yoon, Electronics 10 (1), 11
Homomorphic Model Selection for Data Analysis in an Encrypted Domain [link]
M.Y. Hong, J.S. Yoo, and J. W. Yoon, Applied Sciences 10.18 (2020): 6174
An Automated End-to-End Side Channel Analysis Based on Probabilistic Model [link]
J. Hwang and J. W. Yoon, Applied Science, 30 March 2020 [area: signal processing and information security]
2019
The power grid estimation using Electric Network Frequency signals [link]
W. Bang, and J. W. Yoon, Security and Communication Networks 2019, [area: signal processing and information security]
A global sampler of single particle tracking solutions for single molecule microscopy [link]
PLOS ONE 2019, October 28, 2019, https://doi.org/10.1371/journal.pone.0221865 [area: statistical signal processing]
A Bitwise Design and Implementation for Privacy Preserving Data Mining: From Atomic Operations to Advanced Algorithms
B. K. Song, J. S. Yoo, M. Hong, and J. W. Yoon, Security and Communication Networks 2019, (Accepted for publication) [area: cryptography and security]
2017
The vulnerability exploitation conveying digital data over mobile voice call channels [link]
S.J. Lee, Y.M. Ha, S.J. Yoon, H.J. Jo, S.H. Jang, J.Y. Lee, Y.A. Kim and J. W. Yoon, Wireless Personal Communications, 25, May, 2017 [area: AI, Communication and security]
2016
A new Bayesian edge linking algorithm using single target tracking techniques [link matlab_code]
J. W. Yoon, Symmetry 2016, 8(12), 143
Bayesian Interpretation to Generalize Adaptive Mean Shift Algorithm [link]
J. W. Yoon, Journal of Intelligent and Fuzzy Systems, 2016
2015
J. W. Yoon, IET Electronics Letters, 2015, Vol. 51, No. 6, pp. 484-486 [area: statistical signal processing]
A novel statistical approach to detect card frauds using transaction patterns [link]
C. C. Lee and J. W. Yoon, IEICE Transactions on Information and Systems, Vol.E98-D, No.3,pp.649-660, Mar. 2015.[area: signal processing and information security]
A new countermeasure against brute force attacks that use high performance computers for big data analysis [link]
H.-J. Jo and J. W. Yoon, International Journal of Distributed Sensor Networks, 2015 [area: cryptography and security]
2014
Efficient model selection for probabilistic K nearest neighbour classification [link]
J. W. Yoon and Nial Friel, Neurocomputing, 2014[area: signal processing]
Bayesian reconstruction of Projection Reconstruction NMR (PR-NMR) [link]
J. W. Yoon, 2014, Computers in Biology and Medicine, Volume 54, Pages 89–99, November 1, 2014.(Selected as a Honorable Mention Paper) [area: signal processing and medicine
Statistical Denoising Scheme for single molecule fluorescence microscopic images [link]
J. W. Yoon, Biomedical Signal Processing and Control, Volume 10, March 2014, Pages 11–20, [area: signal processing and applied mathematics]
2012
Network analysis of temporal trends in scholarly research productivity [link]
H. Kim, J. W. Yoon and J. Crowcroft, Journal of Informetrics, 2012, Volume 6, no. 1, pp. 97--110
2011
Bayesian inference for an adaptive ordered probit model: An application to brain computer interfacing [link]
J. W. Yoon, S. J. Roberts, M. Dyson and J. Q. Gan, Neural Networks, 2011, v. 24, no. 7, pp. 726--734
A perfect collision-free pseudonym system [link]
J. W. Yoon and H. S. Kim, IEEE Communications letters, 2011, vol 15, no. 6, pp. 686--688
2010
An image encryption scheme with a pseudorandom permutation based on chaotic maps [link]
J. W. Yoon and H. S. Kim, (2010), Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 12, pp. 3998--4006
Hybrid spam filtering fro mobile communication [link]
J. W. Yoon and H. S. Kim, and J. H. Hur, (2010), Computers & Security, vol. 29, no. 4, pp. 446--459
Robust measurement validation in target tracking using geometric structure [link]
J. W. Yoon and S. J. Roberts, (2010), IEEE Signal Processing Letters, vol 17, no. 5, pp. 493--496
2009
Adaptive classification for brain computer interface systems using sequential Monte Carlo sampling [link]
J. W. Yoon, S. J. Roberts, M. Dyson and J. Q. Gan, (2009), Neural Networks, vol. 22, no. 9, pp. 1286--1294
DySCo: quantitating associations of membrane proteins using two-color single molecule tracking [link]
P. D. Dunne, R. A. Fenandes, J. McColl, J. W. Yoon, J. R. James, S. J. Dvis, D. Klenerman, 2009, Biophysical Journal, Vol 97, No. 4, pp. L5--L7
2008
Bayesian inference for improved single molecule fluorescence tracking [link]
J. W. Yoon, A. Bruckbauer, W. J. Fitzgerald, D. Klenerman, 2008, Biophysical Journal, vol 94, No. 12, pp. 4932--4947
2007
Nanopipette delivery of individual molecules to cellular compartments for single molecule fluorescence tracking [link]
A. Bruckbauer, P. James, D. Zhou, J. W. Yoon, D. Excell, Y. Korchev, R. Jones, D. Klenerman, 2007, Biophysical Journal, Vol. 93, No. 9, pp. 3120--3131
2006
Deterministic and Statistical methods for reconstructing multidimensiional NMR spectra [link]
J. W. Yoon, S. Godsill, E. Kupce, R. Freeman, 2006, Magnetic Resonance in Chemistry, Vol 44, No 3, pp. 197--209