default search action
ByungRae Cha
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c37]ByungRae Cha, YoonSeok Cha, SeongYeol An, Eunjin Jeon, Sun Park, JongWon Kim:
Experimental Design for Multi-task Deep Learning toward Intelligence Augmented Visual AI. ICTC 2021: 1735-1737 - 2020
- [c36]YoonSeok Cha, TaeHong Kim, DaeKyu Kim, ByungRae Cha:
Draft Design of Fruit Object Recognition using Transfer Learning in Smart Farm. SMA 2020: 117-120 - [c35]TaeHong Kim, YoonSeok Cha, SooHee Oh, ByungRae Cha, Sun Park, JaeHyun Seo:
Prototype of Strawberry Maturity-level Classification to Determine Harvesting Time of Strawberry. SMA 2020: 126-129 - [c34]TaeHong Kim, YoonSeok Cha, ByeongChun Shin, ByungRae Cha:
Survey and Performance Test of Python-based Libraries for Parallel Processing. SMA 2020: 154-157
2010 – 2019
- 2019
- [c33]Sun Park, ByungRae Cha, JongWon Kim:
Enhancing Red Tide Image Recognition using Hierarchical Learning Approach based on Semantic Feature. ICECC 2019: 25-28 - [c32]ByungRae Cha, Sun Park, ByeongChun Shin, JongWon Kim:
Draft Design of Li-Fi Based Acquisition Layer of DataLake Framework for IIoT and Smart Factory. NBiS 2019: 317-324 - 2018
- [j7]ByungRae Cha, Sun Park, JongWon Kim, Sung Bum Pan, Juhyun Shin:
International Network Performance and Security Testing Based on Distributed Abyss Storage Cluster and Draft of Data Lake Framework. Secur. Commun. Networks 2018: 1746809:1-1746809:14 (2018) - [c31]ByungRae Cha, Sun Park, ByeongChun Shin, JongWon Kim:
Draft Design of Distributed Ledger Based Peer-to-Peer Business Platform. CISIS 2018: 865-872 - [c30]Sun Park, JongWon Kim, ByungRae Cha:
Design of marine environment monitoring system based on open source softwares. ICOIN 2018: 492-494 - [c29]ByungRae Cha, Sun Park, JongWon Kim:
Design and Interface Testing of Connected Data Architecture of DataLake. ICTC 2018: 780-782 - [c28]Sun Park, ByungRae Cha, Yunseok Cha, Jaeyun Mo, Suhui Oh, JongWon Kim:
Design of Connected Data Lake System based on Micro Cloud Storage. ICTC 2018: 917-918 - 2017
- [j6]ByungRae Cha, JongWon Kim, Hae-Min Moon, Sung Bum Pan:
Global experimental verification of Docker-based secured mVoIP to protect against eavesdropping and DoS attacks. EURASIP J. Wirel. Commun. Netw. 2017: 63 (2017) - [c27]ByungRae Cha, YoonSeok Cha, Sun Park, JongWon Kim:
Performance Testing of Mass Distributed Abyss Storage Prototype for SMB. CISIS 2017: 762-767 - 2016
- [j5]Sun Park, ByungRae Cha, JongWon Kim:
Document Summarization Using NMF and Pseudo Relevance Feedback Based on K-Means Clustering. Comput. Informatics 35(3): 744-760 (2016) - [j4]ByungRae Cha, Sun Park, JongWon Kim:
Availability analysis and case study of mobile-OTP key generation using skip sampling of voice. Clust. Comput. 19(4): 1865-1878 (2016) - [c26]ByungRae Cha, Sun Park, JongWon Kim:
Experimental Verification of Docker-Based Distributed Cloud Applications for Secured Mobile VoIP. CISIS 2016: 585-589 - [c25]Jin Su Kim, Min-Gu Kim, ByungRae Cha, Sung Bum Pan:
A Study of Determining Abnormal Behaviors by Using System for Preventing Agricultural Product Theft. CSA/CUTE 2016: 937-943 - [c24]ByungRae Cha, Sun Park, JongWon Kim:
Design and Verification of Software-Defined RAID for Hybrid Cloud Storage. ICCCRI 2016: 128-133 - 2015
- [c23]Sun Park, ByungRae Cha, JongWon Kim:
Preparing and Inter-Connecting Hyper-Converged SmartX Boxes for IoT-Cloud Testbed. AINA 2015: 695-697 - [c22]ByungRae Cha, Sun Park, Sujeong Shim, JongWon Kim:
Secured mVoIP Service over Cloud and Container-Based Improvement. AINA 2015: 791-795 - 2014
- [j3]ByungRae Cha, JongWon Kim:
Concept and prototype design of NFC-based micro-payment ecosystem. Int. J. Space Based Situated Comput. 4(3/4): 127-142 (2014) - [c21]JongWon Kim, Taeheum Na, Aris Cahyadi Risdianto, ByungRae Cha, Sun Park:
Agile and economic media-centric service realization over Software-Defined Infrastructure. APSIPA 2014: 1-4 - 2013
- [j2]ByungRae Cha, JongWon Kim:
Handling and analysis of fake multimedia contents threats with collective intelligence in P2P file sharing environments. Int. J. Grid Util. Comput. 4(1): 1-9 (2013) - [j1]ByungRae Cha, Yong Il Kim, JongWon Kim:
Design of new P2P-enabled Mobile-OTP system using fingerprint features. Telecommun. Syst. 52(4): 2221-2236 (2013) - [c20]ByungRae Cha, JongWon Kim:
Design of NFC Based Micro-payment to Support MD Authentication and Privacy for Trade Safety in NFC Applications. CISIS 2013: 710-713 - [c19]ByungRae Cha, JongWon Kim:
Security tactics for secured cloud computing resources. ICOIN 2013: 473-475 - 2011
- [c18]ByungRae Cha, JongWon Kim:
Study of Multistage Anomaly Detection for Secured Cloud Computing Resources in Future Internet. DASC 2011: 1046-1050 - [c17]Sun-Kuk Noh, ByungRae Cha, Dong-You Choi, Jung Jin Park, Guen Sik Kim, Yoo Kang Ji:
Idea Sketch of Application Service of e-Business Card and NFC Based on Mobile. FGIT-UNESST 2011: 66-74 - [c16]ByungRae Cha, JaeHyun Seo, JongWon Kim:
Design of Attribute-Based Access Control in Cloud Computing Environment. ICITCS 2011: 41-50 - 2010
- [c15]ByungRae Cha, JongWon Kim:
Handling Fake Multimedia Contents Threat with Collective Intelligence in P2P File Sharing Environments. 3PGCIC 2010: 258-263
2000 – 2009
- 2009
- [c14]ByungRae Cha, YoungIl Kim:
CRYPTEX Model for E-Commercial Contract of Software Source Code Using Secrete Sharing Scheme. ISA 2009: 662-671 - 2008
- [c13]ByungRae Cha, Kyungjun Kim, HyunShik Na:
Random password generation of OTP system using changed location and angle of fingerprint features. CIT 2008: 420-425 - [c12]Haewon Choi, ByungRae Cha, Kyungjun Kim:
Energy Efficient Location-Based Clustering for Skewed-Topology Wireless Sensor Networks. GPC Workshops 2008: 376-381 - [c11]ByungRae Cha:
Access Control of Software Source Code by CRYPTEX Model. ICCSA Workshops 2008: 167-173 - [c10]ByungRae Cha, Sun Park:
Copyrights Expression and Secure Container of Software Source Code. NCM (2) 2008: 325-332 - [c9]Sun Park, ByungRae Cha:
Query-Based Multi-Document Summarization Using Non-Negative Semantic Feature and NMF Clustering. NCM (2) 2008: 609-614 - 2007
- [c8]ByungRae Cha, Kyungjun Kim, Dongseob Lee:
Study of Digital License Search for Intellectual Property Rights of S/W Source Code. ICCSA (3) 2007: 201-212 - [c7]Kyungjun Kim, ByungRae Cha:
A Topology Control Scheme for Avoiding Sensing Hole in Wireless Sensor Networks. ICCSA Workshops 2007: 405-408 - [c6]ByungRae Cha, JongGeun Jeong:
Improvement of Anomaly Intrusion Detection Performance by Indirect Relation for FTP Service. IWANN 2007: 895-902 - [c5]ByungRae Cha, Dongseob Lee:
Network-Based Anomaly Intrusion Detection Improvement by Bayesian Network and Indirect Relation. KES (2) 2007: 141-148 - [c4]ByungRae Cha:
Business Model and Comparasion of S/W Source Code vs. Digital License for IPRs. KES-AMSTA 2007: 825-832 - 2005
- [c3]ByungRae Cha, Kyung-Woo Park, JaeHyun Seo:
Neural Network Techniques for Host Anomaly Intrusion Detection Using Fixed Pattern Transformation. ICCSA (2) 2005: 254-263 - [c2]ByungRae Cha:
Host Anomaly Detection Performance Analysis Based on System Call of Neuro-Fuzzy Using Soundex Algorithm and N-gram Technique. Systems Communications 2005: 116-121 - [c1]ByungRae Cha, Binod Vaidya, Seung Jo Han:
Anomaly Intrusion Detection for System Call Using the Soundex Algorithm and Neural Networks. ISCC 2005: 427-433
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint