Browse > Article List

논문
1 Joint Beamforming and Power Splitting Design for Physical Layer Security in Cognitive SWIPT Decode-and-Forward Relay Networks
Xu, Xiaorong;Hu, Andi;Yao, Yingbiao;Feng, Wei; / Korean Society for Internet Information , v.14, no.1, pp.1-19,
2 Resource allocation in downlink SWIPT-based cooperative NOMA systems
Wang, Longqi;Xu, Ding; / Korean Society for Internet Information , v.14, no.1, pp.20-39,
3 SLNR-based Precoder Design in Multiuser Interference Channel with Channel Estimation Error
Seo, Bangwon; / Korean Society for Internet Information , v.14, no.1, pp.40-52,
4 Dynamic Synchronous Phasor Measurement Algorithm Based on Compressed Sensing
Yu, Huanan;Li, Yongxin;Du, Yao; / Korean Society for Internet Information , v.14, no.1, pp.53-76,
5 Knowledge Transfer Using User-Generated Data within Real-Time Cloud Services
Zhang, Jing;Pan, Jianhan;Cai, Zhicheng;Li, Min;Cui, Lin; / Korean Society for Internet Information , v.14, no.1, pp.77-92,
6 Joint Space-time Coding and Power Domain Non-orthogonal Multiple Access for Future Wireless System
Xu, Jin;Ding, Hanqing;Yu, Zeqi;Zhang, Zhe;Liu, Weihua;Chen, Xueyan; / Korean Society for Internet Information , v.14, no.1, pp.93-113,
7 Multi Parameter Design in AIML Framework for Balinese Calendar Knowledge Access
Sukarsa, I Made;Buana, Putu Wira;Yogantara, Urip; / Korean Society for Internet Information , v.14, no.1, pp.114-130,
8 An Innovative Approach to Track Moving Object based on RFID and Laser Ranging Information
Liang, Gaoli;Liu, Ran;Fu, Yulu;Zhang, Hua;Wang, Heng;Rehman, Shafiq ur;Guo, Mingming; / Korean Society for Internet Information , v.14, no.1, pp.131-147,
9 Consumers' Device Choice in E-Retail: Do Regulatory Focus and Chronotype Matter?
Haider, Syed Waqar;Guijun, Zhuang;Ikram, Amir;Anwar, Bilal; / Korean Society for Internet Information , v.14, no.1, pp.148-167,
10 A Robust Method for Speech Replay Attack Detection
Lin, Lang;Wang, Rangding;Yan, Diqun;Dong, Li; / Korean Society for Internet Information , v.14, no.1, pp.168-182,
11 An Interactive Perspective Scene Completion Framework Guided by Complanate Mesh
Hao, Chuanyan;Jin, Zilong;Yang, Zhixin;Chen, Yadang; / Korean Society for Internet Information , v.14, no.1, pp.183-200,
12 Efficient Parallel TLD on CPU-GPU Platform for Real-Time Tracking
Chen, Zhaoyun;Huang, Dafei;Luo, Lei;Wen, Mei;Zhang, Chunyuan; / Korean Society for Internet Information , v.14, no.1, pp.201-220,
13 A Visualization Jump Lists tool for Digital Forensics of Windows
Weng, Shiuh-Ku;Tu, Jung-Yi; / Korean Society for Internet Information , v.14, no.1, pp.221-239,
14 FAFS: A Fuzzy Association Feature Selection Method for Network Malicious Traffic Detection
Feng, Yongxin;Kang, Yingyun;Zhang, Hao;Zhang, Wenbo; / Korean Society for Internet Information , v.14, no.1, pp.240-259,
15 Cyber-attack group analysis method based on association of cyber-attack information
Son, Kyung-ho;Kim, Byung-ik;Lee, Tae-jin; / Korean Society for Internet Information , v.14, no.1, pp.260-280,
16 Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing
Tang, Wenyi;Qin, Bo;Li, Yanan;Wu, Qianhong; / Korean Society for Internet Information , v.14, no.1, pp.281-298,
17 Revocation Protocol for Group Signatures in VANETs: A Secure Construction
Shari, Nur Fadhilah Mohd;Malip, Amizah;Othman, Wan Ainun Mior; / Korean Society for Internet Information , v.14, no.1, pp.299-322,
18 An Adaptive Watermark Detection Algorithm for Vector Geographic Data
Wang, Yingying;Yang, Chengsong;Ren, Na;Zhu, Changqing;Rui, Ting;Wang, Dong; / Korean Society for Internet Information , v.14, no.1, pp.323-343,
19 Elliptic Curve Signcryption Based Security Protocol for RFID
Singh, Anuj Kumar;Patro, B.D.K.; / Korean Society for Internet Information , v.14, no.1, pp.344-365,
20 High-Capacity Robust Image Steganography via Adversarial Network
Chen, Beijing;Wang, Jiaxin;Chen, Yingyue;Jin, Zilong;Shim, Hiuk Jae;Shi, Yun-Qing; / Korean Society for Internet Information , v.14, no.1, pp.366-381,
21 UN-Substituted Video Steganography
Maria, Khulood Abu;Alia, Mohammad A.;Alsarayreh, Maher A.;Maria, Eman Abu; / Korean Society for Internet Information , v.14, no.1, pp.382-403,
22 A reversible data hiding scheme in JPEG bitstreams using DCT coefficients truncation
Zhang, Mingming;Zhou, Quan;Hu, Yanlang; / Korean Society for Internet Information , v.14, no.1, pp.404-421,
23 Multiple Eavesdropper-Based Physical Layer Security in SIMO System With Antenna Correlation
Sun, Gangcan;Liu, Mengge;Han, Zhuo;Zhao, Chuanyong; / Korean Society for Internet Information , v.14, no.1, pp.422-436,
24 Biometric-based key management for satisfying patient's control over health information in the HIPAA regulations
Bui, Quy-Anh;Lee, Wei-Bin;Lee, Jung-San;Wu, Hsiao-Ling;Liu, Jo-Yun; / Korean Society for Internet Information , v.14, no.1, pp.437-454,
25 A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing
Hundera, Negalign Wake;Mei, Qian;Xiong, Hu;Geressu, Dagmawit Mesfin; / Korean Society for Internet Information , v.14, no.1, pp.455-472,