CCTV video processing metadata security scheme using character order preserving-transformation in the emerging multimedia J Kim, N Park, G Kim, S Jin Electronics 8 (4), 412, 2019 | 68 | 2019 |
Blockchain-based data-preserving AI learning environment model for AI cybersecurity systems in IoT service environments J Kim, N Park Applied Sciences 10 (14), 4718, 2020 | 55 | 2020 |
Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing J Kim, N Park Personal and Ubiquitous Computing 26 (2), 345-353, 2022 | 53 | 2022 |
Development of a board game-based gamification learning model for training on the principles of artificial intelligence learning in elementary courses J Kim, N Park Journal of The Korean Association of Information Education 23 (3), 229-235, 2019 | 52 | 2019 |
A Mechanism of Masking Identification Information regarding Moving Objects Recorded on Visual Surveillance Systems by Differentially Implementing Access Permission N Park, BG Kim, J Kim Electronics 8 (7), 735, 2019 | 44 | 2019 |
A face image virtualization mechanism for privacy intrusion prevention in healthcare video surveillance systems J Kim, N Park Symmetry 12 (6), 891, 2020 | 34 | 2020 |
Network log-based SSH brute-force attack detection model. J Park, J Kim, BB Gupta, N Park Computers, Materials & Continua 68 (1), 2021 | 32 | 2021 |
CCTV-RFID enabled multifactor authentication model for secure differential level video access control J Kim, D Lee, N Park Multimedia Tools and Applications 79, 23461-23481, 2020 | 23 | 2020 |
Role‐based Access Control Video Surveillance Mechanism Modeling in Smart Contract Environment J Kim, N Park Transactions on Emerging Telecommunications Technologies 33 (4), e4227, 2022 | 19 | 2022 |
Blockchain technology core principle education of elementary school student using gamification J Kim, N Park Journal of The Korean Association of Information Education 23 (2), 141-148, 2019 | 17 | 2019 |
De-identification mechanism of user data in video systems according to risk level for preventing leakage of personal healthcare information J Kim, N Park Sensors 22 (7), 2589, 2022 | 14 | 2022 |
초등과정 인공지능 학습 원리 이해를 위한 보드게임 기반 게이미피케이션 교육 실증 김진수, 박남제 정보교육학회논문지 23 (3), 229-235, 2019 | 12 | 2019 |
Intelligent Video Surveillance Incubating Security Mechanism in Open Cloud Environments J Kim, N Park The Journal of Korean Institute of Information Technology 17 (5), 105-116, 2019 | 9 | 2019 |
Privacy-Enhanced Data Deduplication Computational Intelligence Technique for Secure Healthcare Applications. J Kim, S Ryu, N Park Computers, Materials & Continua 70 (2), 2022 | 8 | 2022 |
Dynamic/Static Object Segmentation and Visual Encryption Mechanism for Storage Space Management of Image Information J Kim, N Park Journal of Korea Multimedia Society 22 (10), 1199-1207, 2019 | 8 | 2019 |
An Analysis of the Demonstration of Five-Year-Long Creative ICT Education Based on a Hyper-Blended Practical Model in the Era of Intelligent Information Technologies E Choi, J Kim, N Park Applied Sciences 13 (17), 9718, 2023 | 7 | 2023 |
Web-browsing application using web scraping technology in korean network separation application WC Jung, J Kim, N Park Symmetry 13 (8), 1550, 2021 | 7 | 2021 |
Face Information Conversion Mechanism to Prevent Privacy Infringement J Kim, S Kim, N Park The Journal of Korean Institute of Information Technology 17 (6), 115-122, 2019 | 7 | 2019 |
Study on Trends and Predictions of Convergence in Cybersecurity Technology Using Machine Learning S Ryu, J Kim, N Park Journal of Internet Technology 24 (3), 709-725, 2023 | 6 | 2023 |
Block Chain Based CCTV Image Forgery· Modulation Verification Mechanism J Kim, J Cho, N Park The Journal of Korean Institute of Information Technology 17 (8), 107-114, 2019 | 6 | 2019 |