default search action
Deokjai Choi 0001
Person information
- affiliation: Chonnam National University, Department of Artificial Intelligence Convergence, Korea
- affiliation (PhD 1995): University of Missouri-Kansas City, Department of Computer Science and Telecommunications, Kansas City, MO, USA
Other persons with the same name
- Deokjai Choi — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j25]Ruturaj Mahadshetti, Guee-Sang Lee, Deok-Jai Choi:
RMFPN: End-to-End Scene Text Recognition Using Multi-Feature Pyramid Network. IEEE Access 11: 61892-61900 (2023) - [j24]My-Tham Dinh, Deok-Jai Choi, Guee-Sang Lee:
DenseTextPVT: Pyramid Vision Transformer with Deep Multi-Scale Feature Refinement Network for Dense Text Detection. Sensors 23(13): 5889 (2023) - [j23]Thao M. Dang, Thuc Dinh Nguyen, Thang Hoang, Hyunseok Kim, Andrew Beng Jin Teoh, Deokjai Choi:
AVET: A Novel Transform Function to Improve Cancellable Biometrics Security. IEEE Trans. Inf. Forensics Secur. 18: 758-772 (2023) - 2022
- [j22]Lam Tran, Thuc Dinh Nguyen, Hyunil Kim, Deokjai Choi:
Security and privacy enhanced smartphone-based gait authentication with random representation learning and digital lockers. Pattern Recognit. 129: 108765 (2022) - [i10]Lam Tran, Thuc Nguyen, Changho Seo, Hyunil Kim, Deokjai Choi:
A Survey on Password Guessing. CoRR abs/2212.08796 (2022) - 2021
- [j21]Lam Tran, Thang Hoang, Thuc Dinh Nguyen, Hyunil Kim, Deokjai Choi:
Multi-Model Long Short-Term Memory Network for Gait Recognition Using Window-Based Data Segment. IEEE Access 9: 23826-23839 (2021) - [j20]Tam T. Huynh, Thuc Dinh Nguyen, Thang Hoang, Lam Tran, Deokjai Choi:
A Reliability Guaranteed Solution for Data Storing and Sharing. IEEE Access 9: 108318-108328 (2021) - [c41]Ardiansyah, Yeong-Hyeon Kim, Deokjai Choi:
LSTM-based Multi-Step SOC Forecasting of Battery Energy Storage in Grid Ancillary Services. SmartGridComm 2021: 276-281 - [i9]Lam Tran, Thuc Dinh Nguyen, Hyunil Kim, Deokjai Choi:
Security and Privacy Enhanced Gait Authentication with Random Representation Learning and Digital Lockers. CoRR abs/2108.02400 (2021) - 2020
- [j19]Ardiansyah, Yonghoon Choi, Muhammad Reza Kahar Aziz, Kang-Wook Chon, Deokjai Choi:
Latency-Optimal Network Intelligence Services in SDN/NFV-Based Energy Internet Cyberinfrastructure. IEEE Access 8: 4485-4499 (2020) - [j18]Lam Tran, Deokjai Choi:
Data Augmentation for Inertial Sensor-Based Gait Deep Neural Network. IEEE Access 8: 12364-12378 (2020) - [c40]Thao M. Dang, Lam Tran, Thuc Dinh Nguyen, Deokjai Choi:
FEHash: Full Entropy Hash for Face Template Protection. CVPR Workshops 2020: 3527-3536
2010 – 2019
- 2019
- [j17]Ardiansyah Musa Efendi, I Gde Dharma Nugraha, Hyojeong Han, Deokjai Choi, Seongho Seo, Juseok Kim:
A decision tree-based NLOS detection method for the UWB indoor location tracking accuracy improvement. Int. J. Commun. Syst. 32(13) (2019) - [c39]Ardiansyah, Yonghoon Choi, Muhammad Reza Kahar Aziz, Deokjai Choi:
Latency Minimization for Energy Internet Communications with SDN Virtualization Infrastructure. SmartGridComm 2019: 1-7 - 2018
- [j16]Muhammad Fiqri Muthohar, I Gde Dharma Nugraha, Deokjai Choi:
Significant Motion-Based Adaptive Sampling Module for Mobile Sensing Framework. J. Inf. Process. Syst. 14(4): 948-960 (2018) - [c38]Ardiansyah Musa Efendi, I Gde Dharma Nugraha, Kalamullah Ramli, Deokjai Choi:
A design of data-driven energy-use profiling in residential buildings: poster abstract. BuildSys@SenSys 2018: 200-201 - [c37]Lam Tran, Thao M. Dang, Deokjai Choi:
A Binarization Method for Extracting High Entropy String in Gait Biometric Cryptosystem. SoICT 2018: 273-280 - 2017
- [c36]Van-Quyet Nguyen, Sinh-Ngoc Nguyen, Deokjai Choi, Kyungbaek Kim:
Location-aware dynamic network provisioning. APNOMS 2017: 239-242 - [c35]Seung-Joon Seok, Muhammad Afaq, Kyungbaek Kim, Deokjai Choi, Youn-Hee Han, Woojin Seok, Wang-Cheol Song:
multiFIA Multi-dimensional future Internet architecture. ICUFN 2017: 87-92 - [c34]Lam Tran, Thang Hoang, Thuc Dinh Nguyen, Deokjai Choi:
Improving Gait Cryptosystem Security Using Gray Code Quantization and Linear Discriminant Analysis. ISC 2017: 214-229 - 2016
- [j15]Long D. Tran, Thu D. Tran, Deokjai Choi, Thuc Dinh Nguyen:
RSA-type Algebra Structures. KSII Trans. Internet Inf. Syst. 10(6): 2835-2850 (2016) - [c33]I Gde Dharma Nugraha, Quyet Nguyen-Van, Duc Tiep Vu, Ngoc Nguyen-Sinh, J. D. Alvin Prayuda, Kyungbaek Kim, Deokjai Choi:
Design of service abstraction model for enhancing network provision in future network. APNOMS 2016: 1-4 - [i8]Thang Hoang, Deokjai Choi, Thuc Dinh Nguyen:
On the Instability of Sensor Orientation in Gait Verification on Mobile Phone. CoRR abs/1602.03199 (2016) - 2015
- [j14]Rischan Mafrur, I Gde Dharma Nugraha, Deokjai Choi:
Modeling and discovering human behavior from smartphone sensing life-log data for identification purpose. Hum. centric Comput. Inf. Sci. 5: 31 (2015) - [j13]Thang Hoang, Deokjai Choi, Thuc Dinh Nguyen:
Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme. Int. J. Inf. Sec. 14(6): 549-560 (2015) - [c32]I Gde Dharma Nugraha, Fiqri Muthohar, J. D. Alvin Prayuda, Priagung Khusumanegara, Deokjai Choi:
Time-based DDoS detection and mitigation for SDN controller. APNOMS 2015: 550-553 - [c31]Muhammad Fiqri Muthohar, I Gde Dharma Nugraha, Deokjai Choi:
Mobile application access design for user-defined network infrastructure. APNOMS 2015: 577-579 - [c30]Huan Nguyen, Huy H. Nguyen, Thang Hoang, Deokjai Choi, Thuc Dinh Nguyen:
A Generalized Authentication Scheme for Mobile Phones Using Gait Signals. ICETE (Selected Papers) 2015: 386-407 - [c29]Priagung Khusumanegara, Rischan Mafrur, Deokjai Choi:
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomerative Clustering Algorithm Based on Browsing History. ICT-EurAsia/CONFENIS 2015: 89-96 - [c28]Rischan Mafrur, I Gde Dharma Nugraha, Deokjai Choi:
Concept, design and implementation of sensing as a service framework. IMCOM 2015: 86:1-86:4 - [c27]Thang Hoang, Deokjai Choi, Thuc Dinh Nguyen:
On the Instability of Sensor Orientation in Gait Verification on Mobile Phone. SECRYPT 2015: 148-159 - 2014
- [c26]Ardiansyah Musa Efendi, Sungmin Hwang, Fiqri Muthohar, Gihyun Bang, Deokjai Choi, Kyungbaek Kim, Wang-Cheol Song, Seung-Joon Seok, Seunghae Kim:
Aggregation management design for user-defined network infrastructure. APNOMS 2014: 1-4 - 2013
- [j12]Ardiansyah Musa Efendi, Seungkyo Oh, Ali Fahmi Perwira Negera, Deokjai Choi:
Battery-Less 6LoWPAN-Based Wireless Home Automation by Use of Energy Harvesting. Int. J. Distributed Sens. Networks 9 (2013) - [j11]Quang Viet Vo, Hoang Minh Thang, Deokjai Choi:
Personalization in Mobile Activity Recognition System Using K-Medoids Clustering Algorithm. Int. J. Distributed Sens. Networks 9 (2013) - [j10]Quang Viet Vo, Ali Fahmi Perwira Negera, Hoang Minh Thang, Deokjai Choi:
Energy Saving in Forward Fall Detection using Mobile Accelerometer. Int. J. Distributed Syst. Technol. 4(1): 78-94 (2013) - [j9]Thang Hoang, Thuc Dinh Nguyen, Chuyen Luong, Son Do, Deokjai Choi:
Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer. J. Inf. Process. Syst. 9(2): 333 (2013) - [j8]Ardiansyah Musa Efendi, Seungkyo Oh, Deokjai Choi:
6LoWPAN-based Wireless Home Automation: From Secure System Development to Building Energy Management. Smart Comput. Rev. 3(2): 123-138 (2013) - [c25]P. N. Ali Fahmi, Prayoga Budhi, Jongmin Song, Ardiansyah, Deokjai Choi, Youngchul Kim:
3D-to-2D Projection Algorithm for Remote Control Using Smartphone: Enhancing Smartphone Capability for Costless Wireless Audio Visual Consumer Appliance Control. AINA Workshops 2013: 1044-1049 - [c24]Elyor Kodirov, P. N. Ali Fahmi, Gueesang Lee, Deok-Jai Choi, In Seop Na:
Robust real time face tracking in mobile devices. ICUIMC 2013: 88 - [c23]Thang Hoang, Deokjai Choi, Quang Viet Vo, Huy Anh Nguyen, Thuc Dinh Nguyen:
A Lightweight Gait Authentication on Mobile Phone Regardless of Installation Error. SEC 2013: 83-101 - 2012
- [j7]Kyoung-Ju Lee, Deok-Jai Choi:
Mobile Junk Message Filter Reflecting User Preference. KSII Trans. Internet Inf. Syst. 6(11): 2849-2865 (2012) - [j6]Muhammad Taufiq Nuruzzaman, Changmoo Lee, Mohd. Fikri Azli bin Abdullah, Deokjai Choi:
Simple SMS spam filtering on independent mobile phone. Secur. Commun. Networks 5(10): 1209-1220 (2012) - [c22]Vo Quang Viet, Hoang Minh Thang, Deokjai Choi:
Balancing Precision and Battery Drain in Activity Recognition on Mobile Phone. ICPADS 2012: 712-713 - [c21]P. N. Ali Fahmi, Vo Quang Viet, Deokjai Choi:
Semi-supervised fall detection algorithm using fall indicators in smartphone. ICUIMC 2012: 122:1-122:9 - [c20]Vo Quang Viet, Hoang Minh Thang, Deokjai Choi:
Adaptive energy-saving strategy for activity recognition on mobile phone. ISSPIT 2012: 95-100 - [c19]Quang Viet Vo, Gueesang Lee, Deokjai Choi:
Fall Detection Based on Movement and Smart Phone Technology. RIVF 2012: 1-4 - [c18]P. N. Ali Fahmi, Elyor Kodirov, Deok-Jai Choi, Gueesang Lee, Mohd Fikri Azli Abdullah, Md Shohel Sayeed:
Implicit authentication based on ear shape biometrics using smartphone camera during a call. SMC 2012: 2272-2276 - [c17]Thuc Dinh Nguyen, Thach V. Bui, Van H. Dang, Deokjai Choi:
Efficiently Preserving Data Privacy Range Queries in Two-Tiered Wireless Sensor Networks. UIC/ATC 2012: 973-978 - 2011
- [j5]Muhammad Taufiq Nuruzzaman, Mohd. Fikri Azli bin Abdullah, Deokjai Choi:
Wireless LAN Access Point Placement Based on User Mobility. Wirel. Pers. Commun. 60(3): 431-440 (2011) - [j4]Mohd. Fikri Azli bin Abdullah, Muhammad Taufiq Nuruzzaman, Deokjai Choi:
Erratum to: Wireless LAN Access Point Placement Based on User Mobility. Wirel. Pers. Commun. 60(3): 441 (2011) - [c16]Muhammad Taufiq Nuruzzaman, Changmoo Lee, Deokjai Choi:
Independent and Personal SMS Spam Filtering. CIT 2011: 429-435 - [c15]Eung Jun Cho, Choong Seon Hong, Deokjai Choi:
Distributed IDS for efficient resource management in wireless sensor network. APNOMS 2011: 1-5 - 2010
- [j3]Seung-Joon Seok, Wang-Cheol Song, Deokjai Choi:
Implementation of Pastry-based P2P system to share sensor data. Int. J. Sens. Networks 8(3/4): 125-135 (2010) - [j2]Gicheol Wang, Seunghae Kim, Daewook Kang, Deokjai Choi, Gihwan Cho:
Lightweight Key Renewals for Clustered Sensor Networks. J. Networks 5(3): 300-312 (2010) - [i7]Huy Anh Nguyen, Tam Van Nguyen, Dong Il Kim, Deokjai Choi:
Network Traffic Anomalies Detection and Identification with Flow Monitoring. CoRR abs/1007.1264 (2010) - [i6]Tam Van Nguyen, Wontaek Lim, Huy Anh Nguyen, Deokjai Choi:
Context Awareness Framework Based on Contextual Graph. CoRR abs/1007.1265 (2010) - [i5]Huy Anh Nguyen, Deokjai Choi:
Network Anomaly Detection: Flow-based or Packet-based Approach? CoRR abs/1007.1266 (2010) - [i4]Huy Anh Nguyen, Deokjai Choi:
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model. CoRR abs/1007.1268 (2010) - [i3]Huy Anh Nguyen, Tam Van Nguyen, Deokjai Choi:
How to Maximize User Satisfaction Degree in Multi-service IP Networks. CoRR abs/1007.1270 (2010) - [i2]Tam Van Nguyen, Wontaek Lim, Huy Anh Nguyen, Deokjai Choi, Chilwoo Lee:
Context Ontology Implementation for Smart Home. CoRR abs/1007.1273 (2010) - [i1]Tam Van Nguyen, Huy Anh Nguyen, Deokjai Choi:
Development of a Context Aware Virtual Smart Home Simulator. CoRR abs/1007.1274 (2010)
2000 – 2009
- 2009
- [j1]Guangjie Han, Deokjai Choi, Wontaek Lim:
Reference node placement and selection algorithm based on trilateration for indoor sensor networks. Wirel. Commun. Mob. Comput. 9(8): 1017-1027 (2009) - [c14]Tam Van Nguyen, Yi Chang Woo, Deokjai Choi:
CCBR: Chaining Case Based Reasoning in Context-Aware Smart Home. ACIIDS 2009: 453-458 - [c13]Huy Anh Nguyen, Tam Van Nguyen, Deokjai Choi:
How to Maximize User Satisfaction Degree in Multi-service IP Networks. ACIIDS 2009: 471-476 - [c12]Seung-Joon Seok, Nam-Gon Kim, Deokjai Choi, Wang-Cheol Song:
An Implementation of P2P System for Sharing Sensory Information. APNOMS 2009: 191-200 - [c11]Wang-Cheol Song, Sung-Su Kim, Seung-Joon Seok, Deokjai Choi:
Pastry Based Sensor Data Sharing. ICCCN 2009: 1-6 - 2008
- [c10]Huy Anh Nguyen, Deokjai Choi:
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model. APNOMS 2008: 399-408 - 2007
- [c9]Guangjie Han, Deokjai Choi, Wontaek Lim:
A Novel Reference Node Selection Algorithm Based on Trilateration for Indoor Sensor Networks. CIT 2007: 1003-1008 - [c8]Bao Nguyen Nguyen, Deokjai Choi:
A Two Base Stations Algorithm for Energy Balanced Data Propagation in Smart Home Sensor Networks. CIT 2007: 1009-1014 - [c7]Bao Nguyen Nguyen, Deokjai Choi:
FECP Protocol for Energy Balanced Data Propagation in Smart Home Sensor Networks. APNOMS 2007: 175-184 - 2006
- [c6]Deokjai Choi, Hongseok Jang, Kugsang Jeong, Punghyeok Kim, Soo-Hyung Kim:
Delivery and Storage Architecture for Sensed Information Using SNMP. APNOMS 2006: 582-585 - [c5]Kugsang Jeong, Deokjai Choi, Gueesang Lee:
Context Communication for Providing Context-Aware Application's Independency. HPCC 2006: 581-590 - [c4]Hwa Jeong Son, Sang-Cheol Park, Soo-Hyung Kim, Ji Soo Kim, Gueesang Lee, DeokJai Choi:
Text Image Spotting Using Local Crowdedness and Hausdorff Distance. ICADL 2006: 333-339 - [c3]Kugsang Jeong, Deokjai Choi, Soo-Hyung Kim, Gueesang Lee:
A Middleware Architecture Determining Application Context Using Shared Ontology. ICCSA (4) 2006: 128-137 - 2005
- [c2]Kiwon Hong, Kugsang Jeong, Deokjai Choi, Choong Seon Hong:
A Performance Improvement Scheme of Stream Control Transmission Protocol over Wireless Networks. ICCSA (1) 2005: 195-203 - 2004
- [c1]Hyo Sun Yoon, Gueesang Lee, Soo-Hyung Kim, Deokjai Choi:
Fast Half Pixel Motion Estimation Based on Spatio-temporal Correlations. ICONIP 2004: 732-737
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint