<?xml version="1.0"?>
<dblpperson name="Cheonshik Kim" pid="69/2139" n="69">
<person key="homepages/69/2139" mdate="2022-02-15">
<author pid="69/2139">Cheonshik Kim</author>
<note type="affiliation">Sejong University, Seoul, Republic of Korea</note>
<note type="uname">&#37329;&#21315;&#26893;</note>
<url>http://mipsan.wix.com/ckim</url>
<url>https://scholar.google.com/citations?user=WHAKH90AAAAJ</url>
<url>https://zbmath.org/authors/?q=ai:kim.cheonshik</url>
<url>https://orcid.org/0000-0002-5847-6736</url>
<url>https://www.wikidata.org/entity/Q57422180</url>
</person>
<r><article key="journals/istr/KimYL24" mdate="2024-11-30">
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author orcid="0000-0002-3881-7329" pid="21/1931">Ching-Nung Yang</author>
<author orcid="0009-0003-8609-9274" pid="390/1400">Yu-Quan Lu</author>
<title>Reversible data hiding in encrypted images using Pixel Shifting Approach (PSA).</title>
<pages>103909</pages>
<year>2024</year>
<volume>87</volume>
<journal>J. Inf. Secur. Appl.</journal>
<ee>https://doi.org/10.1016/j.jisa.2024.103909</ee>
<url>db/journals/istr/istr87.html#KimYL24</url>
<stream>streams/journals/istr</stream>
</article>
</r>
<r><article key="journals/mta/XiongZYK24" mdate="2024-04-01">
<author orcid="0000-0001-8612-1222" pid="143/9229">Lizhi Xiong</author>
<author pid="189/1343">Mengtao Zhang</author>
<author pid="21/1931">Ching-Nung Yang</author>
<author pid="69/2139">Cheonshik Kim</author>
<title>An enhanced AMBTC for color image compression using color palette.</title>
<pages>31783-31803</pages>
<year>2024</year>
<month>March</month>
<volume>83</volume>
<journal>Multim. Tools Appl.</journal>
<number>11</number>
<ee>https://doi.org/10.1007/s11042-023-16734-7</ee>
<url>db/journals/mta/mta83.html#XiongZYK24</url>
</article>
</r>
<r><article key="journals/cee/YuZK23" mdate="2023-09-20">
<author pid="79/6142">Huan Yu</author>
<author pid="80/446">Ru Zhang</author>
<author pid="69/2139">Cheonshik Kim</author>
<title>Intelligent analysis system of college students' employment and entrepreneurship situation: Big data and artificial intelligence-driven approach.</title>
<pages>108823</pages>
<year>2023</year>
<month>September</month>
<volume>110</volume>
<journal>Comput. Electr. Eng.</journal>
<ee>https://doi.org/10.1016/j.compeleceng.2023.108823</ee>
<url>db/journals/cee/cee110.html#YuZK23</url>
</article>
</r>
<r><article key="journals/istr/KimYZJ23" mdate="2025-09-15">
<author pid="69/2139">Cheonshik Kim</author>
<author orcid="0000-0002-3881-7329" pid="21/1931">Ching-Nung Yang</author>
<author orcid="0000-0002-5641-7169" pid="91/3541-1">Zhili Zhou 0001</author>
<author orcid="0000-0002-0662-8355" pid="56/4620">Ki-Hyun Jung</author>
<title>Dual efficient reversible data hiding using Hamming code and OPAP.</title>
<pages>103544</pages>
<year>2023</year>
<month>August</month>
<volume>76</volume>
<journal>J. Inf. Secur. Appl.</journal>
<ee>https://doi.org/10.1016/j.jisa.2023.103544</ee>
<url>db/journals/istr/istr76.html#KimYZJ23</url>
</article>
</r>
<r><article key="journals/jnca/NguyenNKD23" mdate="2023-09-30">
<author orcid="0000-0002-5290-2554" pid="332/3762">The-Vinh Nguyen</author>
<author pid="253/2574">Ngoc Phi Nguyen</author>
<author pid="69/2139">Cheonshik Kim</author>
<author orcid="0000-0003-1565-4376" pid="160/2661">Nhu-Ngoc Dao</author>
<title>Intelligent aerial video streaming: Achievements and challenges.</title>
<pages>103564</pages>
<year>2023</year>
<month>February</month>
<volume>211</volume>
<journal>J. Netw. Comput. Appl.</journal>
<ee>https://doi.org/10.1016/j.jnca.2022.103564</ee>
<url>db/journals/jnca/jnca211.html#NguyenNKD23</url>
</article>
</r>
<r><article key="journals/istr/YangWLK21" mdate="2025-01-19">
<author pid="21/1931">Ching-Nung Yang</author>
<author pid="99/2474">Xiaotian Wu</author>
<author pid="45/6163">Hsuan-Yu Lin</author>
<author pid="69/2139">Cheonshik Kim</author>
<title>Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolation.</title>
<pages>102910</pages>
<year>2021</year>
<volume>61</volume>
<journal>J. Inf. Secur. Appl.</journal>
<ee>https://doi.org/10.1016/j.jisa.2021.102910</ee>
<ee>https://www.wikidata.org/entity/Q123142344</ee>
<url>db/journals/istr/istr61.html#YangWLK21</url>
</article>
</r>
<r><article key="journals/jrtip/ZhouYKC20" mdate="2025-09-15">
<author pid="91/3541-1">Zhili Zhou 0001</author>
<author pid="21/1931">Ching-Nung Yang</author>
<author pid="69/2139">Cheonshik Kim</author>
<author orcid="0000-0003-1737-6218" pid="60/3624">Stelvio Cimato</author>
<title>Introduction to the special issue on deep learning for real-time information hiding and forensics.</title>
<pages>1-5</pages>
<year>2020</year>
<volume>17</volume>
<journal>J. Real Time Image Process.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s11554-020-00947-2</ee>
<url>db/journals/jrtip/jrtip17.html#ZhouYKC20</url>
</article>
</r>
<r><article key="journals/sensors/LengYKZ20" mdate="2025-03-07">
<author orcid="0000-0001-6858-424X" pid="97/9765">Lu Leng</author>
<author orcid="0000-0002-0275-4098" pid="160/1058-1">Ziyuan Yang 0001</author>
<author pid="69/2139">Cheonshik Kim</author>
<author orcid="0000-0002-6563-5168" pid="47/722-40">Yue Zhang 0040</author>
<title>A Light-Weight Practical Framework for Feces Detection and Trait Recognition.</title>
<pages>2644</pages>
<year>2020</year>
<volume>20</volume>
<journal>Sensors</journal>
<number>9</number>
<ee type="oa">https://doi.org/10.3390/s20092644</ee>
<ee>https://www.wikidata.org/entity/Q94566426</ee>
<url>db/journals/sensors/sensors20.html#LengYKZ20</url>
</article>
</r>
<r><article key="journals/itiis/KimSYCW19" mdate="2023-02-15">
<author pid="69/2139">Cheonshik Kim</author>
<author pid="57/2855">Dongkyoo Shin</author>
<author pid="21/1931">Ching-Nung Yang</author>
<author pid="54/6164">Yi-Cheng Chen</author>
<author pid="222/7732">Song-Yu Wu</author>
<title>Data Hiding Using Sequential Hamming + k with m Overlapped Pixels.</title>
<pages>6159-6174</pages>
<year>2019</year>
<volume>13</volume>
<journal>KSII Trans. Internet Inf. Syst.</journal>
<number>12</number>
<ee type="oa">https://doi.org/10.3837/tiis.2019.12.020</ee>
<url>db/journals/itiis/itiis13.html#KimSYCW19</url>
</article>
</r>
<r><article key="journals/jrtip/YangCLK19" mdate="2020-06-18">
<author pid="21/1931">Ching-Nung Yang</author>
<author pid="212/9570">Yung-Shun Chou</author>
<author pid="74/11326-1">Yan-Xiao Liu 0001</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<title>Exploiting error control in matrix coding-based data hiding over lossy channel.</title>
<pages>577-588</pages>
<year>2019</year>
<volume>16</volume>
<journal>J. Real Time Image Process.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s11554-018-0829-1</ee>
<ee>https://www.wikidata.org/entity/Q57849669</ee>
<url>db/journals/jrtip/jrtip16.html#YangCLK19</url>
</article>
</r>
<r><article key="journals/monet/KimKR19" mdate="2020-09-24">
<author pid="69/2139">Cheonshik Kim</author>
<author pid="78/1177">Byung-Gyu Kim</author>
<author pid="25/3419">Joel J. P. C. Rodrigues</author>
<title>Editorial: Recent Advances in Mining Intelligence and Context-Awareness on IoT-Based Platforms.</title>
<pages>160-162</pages>
<year>2019</year>
<volume>24</volume>
<journal>Mob. Networks Appl.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.1007/s11036-018-1172-2</ee>
<url>db/journals/monet/monet24.html#KimKR19</url>
</article>
</r>
<r><article key="journals/mta/KimSYC19" mdate="2020-05-11">
<author pid="69/2139">Cheonshik Kim</author>
<author pid="57/2855">Dongkyoo Shin</author>
<author pid="21/1931">Ching-Nung Yang</author>
<author pid="212/9570">Yung-Shun Chou</author>
<title>Generalizing Hamming+k data hiding by overlapped pixels.</title>
<pages>17995-18015</pages>
<year>2019</year>
<volume>78</volume>
<journal>Multim. Tools Appl.</journal>
<number>13</number>
<ee>https://doi.org/10.1007/s11042-018-7101-3</ee>
<url>db/journals/mta/mta78.html#KimSYC19</url>
</article>
</r>
<r><article key="journals/mta/YangWCK19" mdate="2020-05-11">
<author pid="21/1931">Ching-Nung Yang</author>
<author pid="222/7732">Song-Yu Wu</author>
<author pid="212/9570">Yung-Shun Chou</author>
<author pid="69/2139">Cheonshik Kim</author>
<title>Enhanced stego-image quality and embedding capacity for the partial reversible data hiding scheme.</title>
<pages>18595-18616</pages>
<year>2019</year>
<volume>78</volume>
<journal>Multim. Tools Appl.</journal>
<number>13</number>
<ee>https://doi.org/10.1007/s11042-019-7220-5</ee>
<url>db/journals/mta/mta78.html#YangWCK19</url>
</article>
</r>
<r><article key="journals/displays/KimSLY18" mdate="2023-08-28">
<author pid="69/2139">Cheonshik Kim</author>
<author pid="57/2855">Dongkyoo Shin</author>
<author pid="97/9765">Lu Leng</author>
<author pid="21/1931">Ching-Nung Yang</author>
<title>Separable reversible data hiding in encrypted halftone image.</title>
<pages>71-79</pages>
<year>2018</year>
<volume>55</volume>
<journal>Displays</journal>
<ee>https://doi.org/10.1016/j.displa.2018.04.002</ee>
<ee>https://www.wikidata.org/entity/Q115044835</ee>
<url>db/journals/displays/displays55.html#KimSLY18</url>
</article>
</r>
<r><article key="journals/dsp/KimSYC18" mdate="2020-02-20">
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author pid="57/2855">Dongkyoo Shin</author>
<author pid="21/1931">Ching-Nung Yang</author>
<author pid="212/9570">Yung-Shun Chou</author>
<title>Improving capacity of Hamming (<i>n</i>, <i>k</i>)+1 stego-code by using optimized Hamming +&#8239;<i>k</i>.</title>
<pages>284-293</pages>
<year>2018</year>
<volume>78</volume>
<journal>Digit. Signal Process.</journal>
<ee>https://doi.org/10.1016/j.dsp.2018.03.016</ee>
<ee>https://www.wikidata.org/entity/Q57849679</ee>
<url>db/journals/dsp/dsp78.html#KimSYC18</url>
</article>
</r>
<r><article key="journals/jrtip/KimCYZB18" mdate="2021-11-12">
<author pid="69/2139">Cheonshik Kim</author>
<author pid="c/ChinChenChang">Chin-Chen Chang 0001</author>
<author pid="21/1931">Ching-Nung Yang</author>
<author pid="01/3442-1">Xinpeng Zhang 0001</author>
<author pid="27/4896">Jinsuk Baek</author>
<title>Special Issue: Real-Time Data Hiding and Visual Cryptography.</title>
<pages>1-4</pages>
<year>2018</year>
<volume>14</volume>
<journal>J. Real Time Image Process.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.1007/s11554-018-0749-0</ee>
<url>db/journals/jrtip/jrtip14.html#KimCYZB18</url>
</article>
</r>
<r><article key="journals/jrtip/LeeYKY18" mdate="2020-06-18">
<author pid="45/3014">Gil-Je Lee</author>
<author pid="08/7017">Eun-Jun Yoon</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author pid="92/553">Kee-Young Yoo</author>
<title>A real-time secret image sharing with fairness.</title>
<pages>5-12</pages>
<year>2018</year>
<volume>14</volume>
<journal>J. Real Time Image Process.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s11554-015-0558-7</ee>
<ee>https://www.wikidata.org/entity/Q57849717</ee>
<url>db/journals/jrtip/jrtip14.html#LeeYKY18</url>
</article>
</r>
<r><article key="journals/jrtip/KimSLY18" mdate="2020-06-18">
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author pid="57/2855">Dongkyoo Shin</author>
<author pid="97/9765">Lu Leng</author>
<author orcid="0000-0002-3881-7329" pid="21/1931">Ching-Nung Yang</author>
<title>Lossless data hiding for absolute moment block truncation coding using histogram modification.</title>
<pages>101-114</pages>
<year>2018</year>
<volume>14</volume>
<journal>J. Real Time Image Process.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s11554-016-0641-8</ee>
<ee>https://www.wikidata.org/entity/Q57849698</ee>
<url>db/journals/jrtip/jrtip14.html#KimSLY18</url>
</article>
</r>
<r><article key="journals/jrtip/KimSKY18" mdate="2020-06-18">
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author pid="57/2855">Dongkyoo Shin</author>
<author pid="78/1177">Byung-Gyu Kim</author>
<author pid="21/1931">Ching-Nung Yang</author>
<title>Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP.</title>
<pages>115-126</pages>
<year>2018</year>
<volume>14</volume>
<journal>J. Real Time Image Process.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s11554-017-0674-7</ee>
<ee>https://www.wikidata.org/entity/Q57849688</ee>
<url>db/journals/jrtip/jrtip14.html#KimSKY18</url>
</article>
</r>
<r><article key="journals/jrtip/KimYKY18" mdate="2020-06-18">
<author pid="56/7238">Dae-Soo Kim</author>
<author pid="08/7017">Eun-Jun Yoon</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author pid="92/553">Kee-Young Yoo</author>
<title>Reversible data hiding scheme with edge-direction predictor and modulo operation.</title>
<pages>137-145</pages>
<year>2018</year>
<volume>14</volume>
<journal>J. Real Time Image Process.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s11554-015-0548-9</ee>
<ee>https://www.wikidata.org/entity/Q57849799</ee>
<url>db/journals/jrtip/jrtip14.html#KimYKY18</url>
</article>
</r>
<r><article key="journals/jrtip/YangKL18" mdate="2020-06-18">
<author orcid="0000-0002-3881-7329" pid="21/1931">Ching-Nung Yang</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author pid="214/1562">Yen-Hung Lo</author>
<title>Adaptive real-time reversible data hiding for JPEG images.</title>
<pages>147-157</pages>
<year>2018</year>
<volume>14</volume>
<journal>J. Real Time Image Process.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s11554-015-0555-x</ee>
<ee>https://www.wikidata.org/entity/Q57849708</ee>
<url>db/journals/jrtip/jrtip14.html#YangKL18</url>
</article>
</r>
<r><article key="journals/puc/KimKRY18" mdate="2020-07-09">
<author pid="69/2139">Cheonshik Kim</author>
<author pid="213/9080">Bryan Kim</author>
<author pid="25/3419">Joel J. P. C. Rodrigues</author>
<author pid="21/1931">James C. N. Yang</author>
<title>Special issue: Advanced technology for smart home automation and entertainment.</title>
<pages>1-2</pages>
<year>2018</year>
<volume>22</volume>
<journal>Pers. Ubiquitous Comput.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s00779-017-1102-5</ee>
<ee>https://www.wikidata.org/entity/Q60536880</ee>
<url>db/journals/puc/puc22.html#KimKRY18</url>
</article>
</r>
<r><article key="journals/puc/KimSY18" mdate="2022-08-16">
<author pid="69/2139">Cheonshik Kim</author>
<author pid="57/2855">Dongkyoo Shin</author>
<author pid="21/1931">Ching-Nung Yang</author>
<title>Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC.</title>
<pages>11-22</pages>
<year>2018</year>
<volume>22</volume>
<journal>Pers. Ubiquitous Comput.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s00779-017-1061-x</ee>
<ee>https://www.wikidata.org/entity/Q113107536</ee>
<url>db/journals/puc/puc22.html#KimSY18</url>
</article>
</r>
<r><article key="journals/puc/LeeBKY18" mdate="2022-04-09">
<author orcid="0000-0002-4655-0302" pid="60/7293">Yong-Joon Lee</author>
<author pid="132/0353">Namkyun Baik</author>
<author pid="69/2139">Cheonshik Kim</author>
<author pid="21/1931">Ching-Nung Yang</author>
<title>Study of detection method for spoofed IP against DDoS attacks.</title>
<pages>35-44</pages>
<year>2018</year>
<volume>22</volume>
<journal>Pers. Ubiquitous Comput.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s00779-017-1097-y</ee>
<url>db/journals/puc/puc22.html#LeeBKY18</url>
</article>
</r>
<r><article key="journals/puc/LengGCK18" mdate="2020-07-09">
<author pid="97/9765">Lu Leng</author>
<author pid="213/8822">Fumeng Gao</author>
<author pid="66/6320">Qi Chen</author>
<author pid="69/2139">Cheonshik Kim</author>
<title>Palmprint recognition system on mobile devices with double-line-single-point assistance.</title>
<pages>93-104</pages>
<year>2018</year>
<volume>22</volume>
<journal>Pers. Ubiquitous Comput.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s00779-017-1105-2</ee>
<url>db/journals/puc/puc22.html#LengGCK18</url>
</article>
</r>
<r><article key="journals/puc/FisherJBK18" mdate="2020-07-09">
<author pid="78/6339">Paul S. Fisher</author>
<author pid="213/9034">Jimmy James II</author>
<author orcid="0000-0003-4848-4772" pid="27/4896">Jinsuk Baek</author>
<author pid="69/2139">Cheonshik Kim</author>
<title>Mining intelligent solution to compensate missing data context of medical IoT devices.</title>
<pages>219-224</pages>
<year>2018</year>
<volume>22</volume>
<journal>Pers. Ubiquitous Comput.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s00779-017-1106-1</ee>
<url>db/journals/puc/puc22.html#FisherJBK18</url>
</article>
</r>
<r><article key="journals/csi/YangHK17" mdate="2020-02-20">
<author orcid="0000-0002-3881-7329" pid="21/1931">Ching-Nung Yang</author>
<author pid="191/1697">Shen-Chieh Hsu</author>
<author pid="69/2139">Cheonshik Kim</author>
<title>Improving stego image quality in image interpolation based data hiding.</title>
<pages>209-215</pages>
<year>2017</year>
<volume>50</volume>
<journal>Comput. Stand. Interfaces</journal>
<ee>https://doi.org/10.1016/j.csi.2016.10.005</ee>
<url>db/journals/csi/csi50.html#YangHK17</url>
</article>
</r>
<r><article key="journals/csi/YangWYWK17" mdate="2020-02-20">
<author orcid="0000-0002-3881-7329" pid="21/1931">Ching-Nung Yang</author>
<author pid="194/8035">Chihi-Han Wu</author>
<author pid="194/8078">Zong-Xuan Yeh</author>
<author pid="72/2314">Daoshun Wang</author>
<author pid="69/2139">Cheonshik Kim</author>
<title>A new sharing digital image scheme with clearer shadow images.</title>
<pages>118-131</pages>
<year>2017</year>
<volume>51</volume>
<journal>Comput. Stand. Interfaces</journal>
<ee>https://doi.org/10.1016/j.csi.2016.11.015</ee>
<url>db/journals/csi/csi51.html#YangWYWK17</url>
</article>
</r>
<r><article key="journals/mta/LengLKB17" mdate="2025-03-03">
<author pid="97/9765">Lu Leng</author>
<author pid="181/2821-56">Ming Li 0056</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author orcid="0000-0003-3620-1675" pid="35/9361">Xue Bi</author>
<title>Dual-source discrimination power analysis for multi-instance contactless palmprint recognition.</title>
<pages>333-354</pages>
<year>2017</year>
<volume>76</volume>
<journal>Multim. Tools Appl.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s11042-015-3058-7</ee>
<ee>https://www.wikidata.org/entity/Q57849725</ee>
<url>db/journals/mta/mta76.html#LengLKB17</url>
</article>
</r>
<r><article key="journals/ijdsn/KimSSY16" mdate="2020-06-21">
<author pid="69/2139">Cheonshik Kim</author>
<author pid="57/2855">Dongkyoo Shin</author>
<author pid="85/2364">Dongil Shin</author>
<author orcid="0000-0002-3881-7329" pid="21/1931">Ching-Nung Yang</author>
<title>Secure protection of video recorder video in smart car.</title>
<year>2016</year>
<volume>12</volume>
<journal>Int. J. Distributed Sens. Networks</journal>
<number>12</number>
<ee type="oa">https://doi.org/10.1177/1550147716681792</ee>
<url>db/journals/ijdsn/ijdsn12.html#KimSSY16</url>
</article>
</r>
<r><article key="journals/jrtip/BaekK16" mdate="2020-06-18">
<author pid="27/4896">Jinsuk Baek</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<title>An energy-efficient video transport protocol for personal cloud-based computing.</title>
<pages>303-310</pages>
<year>2016</year>
<volume>12</volume>
<journal>J. Real Time Image Process.</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s11554-014-0475-1</ee>
<ee>https://www.wikidata.org/entity/Q57849851</ee>
<url>db/journals/jrtip/jrtip12.html#BaekK16</url>
</article>
</r>
<r><article key="journals/jrtip/YangSYK16" mdate="2020-06-18">
<author orcid="0000-0002-3881-7329" pid="21/1931">Ching-Nung Yang</author>
<author pid="172/3628">Li-Zhe Sun</author>
<author orcid="0000-0001-6388-1720" pid="54/7663">Xuehu Yan</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<title>Design a new visual cryptography for human-verifiable authentication in accessing a database.</title>
<pages>483-494</pages>
<year>2016</year>
<volume>12</volume>
<journal>J. Real Time Image Process.</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s11554-015-0511-9</ee>
<ee>https://www.wikidata.org/entity/Q57849762</ee>
<url>db/journals/jrtip/jrtip12.html#YangSYK16</url>
</article>
</r>
<r><article key="journals/mta/KimY16a" mdate="2020-05-11">
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author orcid="0000-0002-3881-7329" pid="21/1931">Ching-Nung Yang</author>
<title>Data hiding based on overlapped pixels using hamming code.</title>
<pages>15651-15663</pages>
<year>2016</year>
<volume>75</volume>
<journal>Multim. Tools Appl.</journal>
<number>23</number>
<ee>https://doi.org/10.1007/s11042-014-2355-x</ee>
<ee>https://www.wikidata.org/entity/Q57849818</ee>
<url>db/journals/mta/mta75.html#KimY16a</url>
</article>
</r>
<r><inproceedings key="conf/bdcloud/LiuD0WBK16" mdate="2025-10-14">
<author pid="16/1272">Chun-Chi Liu</author>
<author pid="85/2037">Rong Du</author>
<author pid="79/5305-1">Shengling Wang 0001</author>
<author orcid="0000-0003-3187-9444" pid="98/10212">Chenyu Wang</author>
<author pid="54/830">Rongfang Bie</author>
<author pid="69/2139">Cheonshik Kim</author>
<title>Crowdsourcing Framework for Acoustic Sound Based Obstacle Echolocation through Smartphones for Visually Impaired.</title>
<pages>185-192</pages>
<year>2016</year>
<booktitle>BDCloud-SocialCom-SustainCom</booktitle>
<ee>https://doi.org/10.1109/BDCloud-SocialCom-SustainCom.2016.38</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/BDCloud-SocialCom-SustainCom.2016.38</ee>
<crossref>conf/bdcloud/2016</crossref>
<url>db/conf/bdcloud/bdcloud2016.html#LiuD0WBK16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iiki/XuZBLKS16" mdate="2023-03-24">
<author pid="152/6112">Shuaijing Xu</author>
<author pid="139/4143">Guangzhi Zhang</author>
<author pid="54/830">Rongfang Bie</author>
<author pid="147/1569">Wenshuang Liang</author>
<author pid="69/2139">Cheonshik Kim</author>
<author pid="57/2855">Dongkyoo Shin</author>
<title>Implicit Correlation Intensity Mining Based on the Monte Carlo Method with Attenuation.</title>
<pages>275-278</pages>
<year>2016</year>
<booktitle>IIKI</booktitle>
<ee>https://doi.org/10.1109/IIKI.2016.23</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/IIKI.2016.23</ee>
<crossref>conf/iiki/2016</crossref>
<url>db/conf/iiki/iiki2016.html#XuZBLKS16</url>
</inproceedings>
</r>
<r><article key="journals/mta/KimY15a" mdate="2020-05-11">
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author orcid="0000-0002-3881-7329" pid="21/1931">Ching-Nung Yang</author>
<title>Watermark with DSA signature using predictive coding.</title>
<pages>5189-5203</pages>
<year>2015</year>
<volume>74</volume>
<journal>Multim. Tools Appl.</journal>
<number>14</number>
<ee type="oa">https://doi.org/10.1007/s11042-013-1667-6</ee>
<ee>https://www.wikidata.org/entity/Q57849909</ee>
<url>db/journals/mta/mta74.html#KimY15a</url>
</article>
</r>
<r><article key="journals/vjcs/HoaTKY15" mdate="2020-09-17">
<author pid="126/2225">Le Quang Hoa</author>
<author pid="168/4086">Nguyen Huy Truong</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author pid="21/1931">Ching-Nung Yang</author>
<title>(1, 7, 4) Data hiding scheme for searching in hidden text with automata.</title>
<pages>257-265</pages>
<year>2015</year>
<volume>2</volume>
<journal>Vietnam. J. Comput. Sci.</journal>
<number>4</number>
<ee type="oa">https://doi.org/10.1007/s40595-015-0050-0</ee>
<ee>https://www.wikidata.org/entity/Q57849744</ee>
<url>db/journals/vjcs/vjcs2.html#HoaTKY15</url>
</article>
</r>
<r><article key="journals/jim/KimSSTY14" mdate="2020-09-24">
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author pid="57/2855">Dongkyoo Shin</author>
<author pid="85/2364">Dongil Shin</author>
<author orcid="0000-0003-1485-0164" pid="73/5733">Raylin Tso</author>
<author orcid="0000-0002-3881-7329" pid="21/1931">Ching-Nung Yang</author>
<title>A secret sharing scheme for EBTC using steganography.</title>
<pages>241-249</pages>
<year>2014</year>
<volume>25</volume>
<journal>J. Intell. Manuf.</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s10845-012-0660-7</ee>
<ee>https://www.wikidata.org/entity/Q57849978</ee>
<url>db/journals/jim/jim25.html#KimSSTY14</url>
</article>
</r>
<r><article key="journals/mta/Kim14" mdate="2020-05-11">
<author pid="69/2139">Cheonshik Kim</author>
<title>Data hiding by an improved exploiting modification direction.</title>
<pages>569-584</pages>
<year>2014</year>
<volume>69</volume>
<journal>Multim. Tools Appl.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s11042-012-1114-0</ee>
<url>db/journals/mta/mta69.html#Kim14</url>
</article>
</r>
<r><inproceedings key="conf/fcc/KimY14" mdate="2019-06-02">
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author orcid="0000-0002-3881-7329" pid="21/1931">Ching-Nung Yang</author>
<title>Improving Data Hiding Capacity Based on Hamming Code.</title>
<pages>697-706</pages>
<year>2014</year>
<booktitle>FCC</booktitle>
<ee>https://doi.org/10.1007/978-94-017-8798-7_80</ee>
<ee>https://www.wikidata.org/entity/Q57849858</ee>
<crossref>conf/fcc/2014</crossref>
<url>db/conf/fcc/fcc2014.html#KimY14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icisc/KimBF14" mdate="2018-11-14">
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author pid="27/4896">Jinsuk Baek</author>
<author pid="78/6339">Paul S. Fisher</author>
<title>Lossless Data Hiding for Binary Document Images Using n n -Pairs Pattern.</title>
<pages>317-327</pages>
<year>2014</year>
<booktitle>ICISC</booktitle>
<ee>https://doi.org/10.1007/978-3-319-15943-0_19</ee>
<ee>https://www.wikidata.org/entity/Q57849791</ee>
<crossref>conf/icisc/2014</crossref>
<url>db/conf/icisc/icisc2014.html#KimBF14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iwdw/KimY14" mdate="2018-11-14">
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author orcid="0000-0002-3881-7329" pid="21/1931">Ching-Nung Yang</author>
<title>Steganography Based on Grayscale Images Using (5, 3) Hamming Code.</title>
<pages>588-598</pages>
<year>2014</year>
<booktitle>IWDW</booktitle>
<ee>https://doi.org/10.1007/978-3-319-19321-2_45</ee>
<ee>https://www.wikidata.org/entity/Q57849809</ee>
<crossref>conf/iwdw/2014</crossref>
<url>db/conf/iwdw/iwdw2014.html#KimY14</url>
</inproceedings>
</r>
<r><article key="journals/ijdsn/HuyK13" mdate="2020-06-21">
<author orcid="0000-0002-4412-4959" pid="98/3522">Phan Trung Huy</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<title>Binary Image Data Hiding Using Matrix Encoding Technique in Sensors.</title>
<year>2013</year>
<volume>9</volume>
<journal>Int. J. Distributed Sens. Networks</journal>
<ee type="oa">https://doi.org/10.1155/2013/340963</ee>
<ee>https://www.wikidata.org/entity/Q57849885</ee>
<url>db/journals/ijdsn/ijdsn9.html#HuyK13</url>
</article>
</r>
<r><article key="journals/itiis/HuyTKY13" mdate="2021-02-16">
<author pid="98/3522">Phan Trung Huy</author>
<author pid="91/8238">Nguyen Hai Thanh</author>
<author pid="69/2139">Cheonshik Kim</author>
<author orcid="0000-0002-3881-7329" pid="21/1931">Ching-Nung Yang</author>
<title>Data-Hiding for Halftone Images Using an Improved CPT scheme.</title>
<pages>405-424</pages>
<year>2013</year>
<volume>7</volume>
<journal>KSII Trans. Internet Inf. Syst.</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.3837/tiis.2013.02.013</ee>
<url>db/journals/itiis/itiis7.html#HuyTKY13</url>
</article>
</r>
<r><article key="journals/puc/YangCSK13" mdate="2020-07-09">
<author orcid="0000-0002-3881-7329" pid="21/1931">Ching-Nung Yang</author>
<author pid="133/5270">Pin-Wei Chen</author>
<author pid="96/11304">Hsiang-Wen Shih</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<title>Aspect ratio invariant visual cryptography by image filtering and resizing.</title>
<pages>843-850</pages>
<year>2013</year>
<volume>17</volume>
<journal>Pers. Ubiquitous Comput.</journal>
<number>5</number>
<ee>https://doi.org/10.1007/s00779-012-0535-0</ee>
<ee>https://www.wikidata.org/entity/Q57849992</ee>
<url>db/journals/puc/puc17.html#YangCSK13</url>
</article>
</r>
<r><inproceedings key="conf/gpc/OpuBHK13" mdate="2018-11-14">
<author pid="130/1631">Md. Fazla Rabbi Opu</author>
<author pid="130/1681">Emon Biswas</author>
<author pid="130/1646">Mansura Habiba</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<title>Architecture of a Context Aware Framework for Automated Mobile Device Configuration.</title>
<pages>299-308</pages>
<year>2013</year>
<booktitle>GPC</booktitle>
<ee>https://doi.org/10.1007/978-3-642-38027-3_32</ee>
<ee>https://www.wikidata.org/entity/Q57849936</ee>
<crossref>conf/gpc/2013</crossref>
<url>db/conf/gpc/gpc2013.html#OpuBHK13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gpc/HuyKAHY13" mdate="2018-11-14">
<author pid="98/3522">Phan Trung Huy</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author pid="130/1650">Nguyen Tuan Anh</author>
<author pid="126/2225">Le Quang Hoa</author>
<author orcid="0000-0002-3881-7329" pid="21/1931">Ching-Nung Yang</author>
<title>Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules.</title>
<pages>649-658</pages>
<year>2013</year>
<booktitle>GPC</booktitle>
<ee>https://doi.org/10.1007/978-3-642-38027-3_70</ee>
<ee>https://www.wikidata.org/entity/Q57849947</ee>
<crossref>conf/gpc/2013</crossref>
<url>db/conf/gpc/gpc2013.html#HuyKAHY13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gpc/YoonCK13" mdate="2022-06-11">
<author pid="08/7017">Eun-Jun Yoon</author>
<author pid="71/10488">Yong Soo Choi</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<title>New ID-Based Proxy Signature Scheme with Message Recovery.</title>
<pages>945-951</pages>
<year>2013</year>
<booktitle>GPC</booktitle>
<ee>https://doi.org/10.1007/978-3-642-38027-3_111</ee>
<ee>https://www.wikidata.org/entity/Q57849968</ee>
<crossref>conf/gpc/2013</crossref>
<url>db/conf/gpc/gpc2013.html#YoonCK13</url>
</inproceedings>
</r>
<r><proceedings key="conf/gpc/2013" mdate="2025-01-11">
<editor pid="p/JongHyukPark">James J. Park 0001</editor>
<editor pid="a/HRArabnia">Hamid R. Arabnia</editor>
<editor orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</editor>
<editor pid="s/WeisongShi">Weisong Shi</editor>
<editor pid="91/2995">Joon-Min Gil</editor>
<title>Grid and Pervasive Computing - 8th International Conference, GPC 2013 and Colocated Workshops, Seoul, Korea, May 9-11, 2013. Proceedings</title>
<year>2013</year>
<publisher>Springer</publisher>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>7861</volume>
<ee>https://doi.org/10.1007/978-3-642-38027-3</ee>
<ee>https://www.wikidata.org/entity/Q57849957</ee>
<isbn>978-3-642-38026-6</isbn>
<booktitle>GPC</booktitle>
<url>db/conf/gpc/gpc2013.html</url>
</proceedings>
</r>
<r><article key="journals/spl/YangWLK12" mdate="2018-11-14">
<author orcid="0000-0002-3881-7329" pid="21/1931">Ching-Nung Yang</author>
<author pid="79/8278">Chih-Cheng Wu</author>
<author pid="83/540-1">Yi-Chin Lin 0001</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<title>Enhanced Matrix-Based Secret Image Sharing Scheme.</title>
<pages>789-792</pages>
<year>2012</year>
<volume>19</volume>
<journal>IEEE Signal Process. Lett.</journal>
<number>12</number>
<ee>https://doi.org/10.1109/LSP.2012.2220348</ee>
<ee>https://www.wikidata.org/entity/Q57850023</ee>
<url>db/journals/spl/spl19.html#YangWLK12</url>
</article>
</r>
<r><inproceedings key="conf/aciids/KimSSY12" mdate="2018-11-14">
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author pid="57/2855">Dongkyoo Shin</author>
<author pid="85/2364">Dongil Shin</author>
<author orcid="0000-0002-3881-7329" pid="21/1931">Ching-Nung Yang</author>
<title>A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC.</title>
<pages>129-139</pages>
<year>2012</year>
<booktitle>ACIIDS (2)</booktitle>
<ee>https://doi.org/10.1007/978-3-642-28490-8_14</ee>
<ee>https://www.wikidata.org/entity/Q57850002</ee>
<crossref>conf/aciids/2012-2</crossref>
<url>db/conf/aciids/aciids2012-2.html#KimSSY12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/npc/HongKKL12" mdate="2018-11-14">
<author pid="57/4436">YouSik Hong</author>
<author pid="61/10172">Hongkyun Kim</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author pid="82/129">Geuk Lee</author>
<title>New Electronic Acupuncture System Using Intelligence.</title>
<pages>524-531</pages>
<year>2012</year>
<booktitle>NPC</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-35606-3_62</ee>
<ee>https://www.wikidata.org/entity/Q57850034</ee>
<crossref>conf/npc/2012</crossref>
<url>db/conf/npc/npc2012.html#HongKKL12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/npc/LeeKC12" mdate="2018-11-14">
<author pid="21/7164">Sangyong Lee</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author pid="32/6572">Seongah Chin</author>
<title>An Optimized Sub-texture Mapping Technique for an Arbitrary Texture Considering Topology Relations.</title>
<pages>559-564</pages>
<year>2012</year>
<booktitle>NPC</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-35606-3_66</ee>
<ee>https://www.wikidata.org/entity/Q57850013</ee>
<crossref>conf/npc/2012</crossref>
<url>db/conf/npc/npc2012.html#LeeKC12</url>
</inproceedings>
</r>
<r><article key="journals/itiis/YangYK11" mdate="2021-02-16">
<author orcid="0000-0002-3881-7329" pid="21/1931">Ching-Nung Yang</author>
<author pid="11/9707">Guo-Cin Ye</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<title>Data Hiding in Halftone Images by XOR Block-Wise Operation with Difference Minimization.</title>
<pages>457-476</pages>
<year>2011</year>
<volume>5</volume>
<journal>KSII Trans. Internet Inf. Syst.</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.3837/tiis.2011.02.013</ee>
<ee>https://www.wikidata.org/entity/Q57850055</ee>
<url>db/journals/itiis/itiis5.html#YangYK11</url>
</article>
</r>
<r><inproceedings key="conf/aciids/KimSS11" mdate="2018-11-14">
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author pid="57/2855">Dongkyoo Shin</author>
<author pid="85/2364">Dongil Shin</author>
<title>Data Hiding in a Halftone Image Using Hamming Code (15, 11).</title>
<pages>372-381</pages>
<year>2011</year>
<booktitle>ACIIDS (2)</booktitle>
<ee>https://doi.org/10.1007/978-3-642-20042-7_38</ee>
<ee>https://www.wikidata.org/entity/Q57850066</ee>
<crossref>conf/aciids/2011-2</crossref>
<url>db/conf/aciids/aciids2011-2.html#KimSS11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sta/KimSSZ11" mdate="2021-10-22">
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author pid="57/2855">Dongkyoo Shin</author>
<author pid="85/2364">Dongil Shin</author>
<author pid="01/3442-1">Xinpeng Zhang 0001</author>
<title>Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications.</title>
<pages>130-138</pages>
<year>2011</year>
<booktitle>STA</booktitle>
<ee>https://doi.org/10.1007/978-3-642-22339-6_16</ee>
<ee>https://www.wikidata.org/entity/Q57850076</ee>
<crossref>conf/sta/2011</crossref>
<url>db/conf/sta/sta2011.html#KimSSZ11</url>
</inproceedings>
</r>
<r><article key="journals/cma/KimKCWZ10" mdate="2023-07-27">
<author pid="96/2779">Hyoung Joong Kim</author>
<author pid="69/2139">Cheonshik Kim</author>
<author pid="352/6474">YongSoo Choi</author>
<author pid="46/781">Shuozhong Wang</author>
<author pid="57/903">X. Zhang</author>
<title>Improved modification direction methods.</title>
<pages>319-325</pages>
<year>2010</year>
<volume>60</volume>
<journal>Comput. Math. Appl.</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.1016/j.camwa.2010.01.006</ee>
<url>db/journals/cma/cma60.html#KimKCWZ10</url>
</article>
</r>
<r><article key="journals/comcom/YoonYKHJC10" mdate="2020-02-20">
<author pid="08/7017">Eun-Jun Yoon</author>
<author pid="92/553">Kee-Young Yoo</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author pid="57/4436">YouSik Hong</author>
<author orcid="0000-0001-7311-6459" pid="21/4301">Minho Jo 0001</author>
<author pid="41/2526">Hsiao-Hwa Chen</author>
<title>A secure and efficient SIP authentication scheme for converged VoIP networks.</title>
<pages>1674-1681</pages>
<year>2010</year>
<volume>33</volume>
<journal>Comput. Commun.</journal>
<number>14</number>
<ee>https://doi.org/10.1016/j.comcom.2010.03.026</ee>
<ee>https://www.wikidata.org/entity/Q57850088</ee>
<url>db/journals/comcom/comcom33.html#YoonYKHJC10</url>
</article>
</r>
<r><inproceedings key="conf/wcnis/BaekKFC10" mdate="2018-11-14">
<author pid="27/4896">Jinsuk Baek</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author pid="78/6339">Paul S. Fisher</author>
<author pid="58/4277">Hongyang Chao</author>
<title>(N, 1) secret sharing approach based on steganography with gray digital images.</title>
<pages>325-329</pages>
<year>2010</year>
<booktitle>WCNIS</booktitle>
<ee>https://doi.org/10.1109/WCINS.2010.5541793</ee>
<ee>https://www.wikidata.org/entity/Q57850102</ee>
<crossref>conf/wcnis/2010</crossref>
<url>db/conf/wcnis/wcnis2010.html#BaekKFC10</url>
</inproceedings>
</r>
<r><incollection key="series/sci/Kim10" mdate="2018-11-14">
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<title>Data Hiding Based on Compressed Dithering Images.</title>
<pages>89-98</pages>
<year>2010</year>
<booktitle>Advances in Intelligent Information and Database Systems</booktitle>
<ee>https://doi.org/10.1007/978-3-642-12090-9_8</ee>
<ee>https://www.wikidata.org/entity/Q57850114</ee>
<crossref>series/sci/2010-283</crossref>
<url>db/series/sci/sci283.html#Kim10</url>
</incollection>
</r>
<r><inproceedings key="conf/ichit/HongOKICYJMKK09" mdate="2018-11-14">
<author pid="57/4436">YouSik Hong</author>
<author pid="24/2258">Sun-Jin Oh</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author pid="88/7539">Yong Soon Im</author>
<author pid="04/10583">Gyoo-Seok Choi</author>
<author pid="08/7017">Eun-Jun Yoon</author>
<author pid="99/7537">Yu Cheol Jeon</author>
<author pid="00/6465">Chanwoo Moon</author>
<author pid="70/7537">Myeon-Koo Kang</author>
<author pid="40/7539">Jeongsook Kim</author>
<title>A study on intelligent cyber university.</title>
<pages>525-529</pages>
<year>2009</year>
<booktitle>ICHIT</booktitle>
<ee>https://doi.org/10.1145/1644993.1645091</ee>
<ee>https://www.wikidata.org/entity/Q57850140</ee>
<crossref>conf/ichit/2009</crossref>
<url>db/conf/ichit/ichit2009.html#HongOKICYJMKK09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ichit/HongRKCKK09" mdate="2018-11-14">
<author pid="57/4436">YouSik Hong</author>
<author pid="97/7538">Su-Bong Ryou</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author pid="13/2796">Young Im Cho</author>
<author pid="57/7537">Kyung-Sook Kim</author>
<author pid="63/7539">Jeong Jin Kang</author>
<title>Optimal green time calculation using artificial intelligence.</title>
<pages>632-636</pages>
<year>2009</year>
<booktitle>ICHIT</booktitle>
<ee>https://doi.org/10.1145/1644993.1645110</ee>
<ee>https://www.wikidata.org/entity/Q57850151</ee>
<crossref>conf/ichit/2009</crossref>
<url>db/conf/ichit/ichit2009.html#HongRKCKK09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kesamsta/HongKL08" mdate="2018-11-14">
<author pid="57/4436">YouSik Hong</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author pid="82/129">Geuk Lee</author>
<title>Study of Optimal Traffic Information Using Agents Techniques.</title>
<pages>868-877</pages>
<year>2008</year>
<booktitle>KES-AMSTA</booktitle>
<ee>https://doi.org/10.1007/978-3-540-78582-8_88</ee>
<ee>https://www.wikidata.org/entity/Q57850210</ee>
<crossref>conf/kesamsta/2008</crossref>
<url>db/conf/kesamsta/kesamsta2008.html#HongKL08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kesamsta/HongLKK07" mdate="2018-11-14">
<author pid="57/4436">YouSik Hong</author>
<author pid="82/129">Geuk Lee</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author pid="181/2684">Jong Won Kim</author>
<title>Traffic Signal Planning Using a Smart Agent System.</title>
<pages>938-947</pages>
<year>2007</year>
<crossref>conf/kesamsta/2007</crossref>
<booktitle>KES-AMSTA</booktitle>
<ee>https://doi.org/10.1007/978-3-540-72830-6_99</ee>
<ee>https://www.wikidata.org/entity/Q57850223</ee>
<url>db/conf/kesamsta/kesamsta2007.html#HongLKK07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ichit/KimJAP06" mdate="2023-11-14">
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author pid="99/1672">Myunghee Jung</author>
<author pid="59/3151">Shaikh Muhammad Allayear</author>
<author pid="62/2774-1">Sung-Soon Park 0001</author>
<title>Personalized E-Learning Process Using Effective Assessment and Feedback.</title>
<pages>63-72</pages>
<year>2006</year>
<crossref>conf/ichit/2006</crossref>
<booktitle>ICHIT</booktitle>
<ee>https://doi.org/10.1007/978-3-540-77368-9_7</ee>
<ee>https://www.wikidata.org/entity/Q57850190</ee>
<url>db/conf/ichit/ichit2006.html#KimJAP06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icuct/KimNPPH06" mdate="2018-11-14">
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<author pid="07/3401">San-Yep Nam</author>
<author pid="15/460">Duk-Je Park</author>
<author pid="11/5644">Injung Park</author>
<author pid="09/802">Taek-Young Hyun</author>
<title>Product Control System Using RFID Tag Information and Data Mining.</title>
<pages>100-109</pages>
<year>2006</year>
<crossref>conf/icuct/2006</crossref>
<booktitle>ICUCT</booktitle>
<ee>https://doi.org/10.1007/978-3-540-71789-8_11</ee>
<ee>https://www.wikidata.org/entity/Q57850199</ee>
<url>db/conf/icuct/icuct2006.html#KimNPPH06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icuct/AllayearPK06" mdate="2023-11-14">
<author pid="59/3151">Shaikh Muhammad Allayear</author>
<author pid="62/2774-1">Sung-Soon Park 0001</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<title>iSCSI Protocol Parameter Optimization for Mobile Appliance Remote Storage System at Smart Home Environment Approach.</title>
<pages>110-119</pages>
<year>2006</year>
<crossref>conf/icuct/2006</crossref>
<booktitle>ICUCT</booktitle>
<ee>https://doi.org/10.1007/978-3-540-71789-8_12</ee>
<ee>https://www.wikidata.org/entity/Q57850233</ee>
<url>db/conf/icuct/icuct2006.html#AllayearPK06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icuct/ParkPK06" mdate="2021-11-24">
<author pid="11/5644">Injung Park</author>
<author pid="15/460">Duk-Je Park</author>
<author orcid="0000-0002-5847-6736" pid="69/2139">Cheonshik Kim</author>
<title>Dynamic EPG Implementation for Ubiquitous Environment.</title>
<pages>292-300</pages>
<year>2006</year>
<crossref>conf/icuct/2006</crossref>
<booktitle>ICUCT</booktitle>
<ee>https://doi.org/10.1007/978-3-540-71789-8_30</ee>
<ee>https://www.wikidata.org/entity/Q57850177</ee>
<url>db/conf/icuct/icuct2006.html#ParkPK06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/igarss/JungYK05" mdate="2017-05-25">
<author pid="99/1672">Myunghee Jung</author>
<author pid="44/4439">Eui-Jung Yun</author>
<author pid="69/2139">Cheonshik Kim</author>
<title>Multiresolution approach for texture segmentation using MRF models.</title>
<pages>3971-3974</pages>
<year>2005</year>
<booktitle>IGARSS</booktitle>
<ee>https://doi.org/10.1109/IGARSS.2005.1525782</ee>
<crossref>conf/igarss/2005</crossref>
<url>db/conf/igarss/igarss2005.html#JungYK05</url>
</inproceedings>
</r>
<coauthors n="107" nc="7">
<co c="2"><na f="a/Allayear:Shaikh_Muhammad" pid="59/3151">Shaikh Muhammad Allayear</na></co>
<co c="0"><na f="a/Anh:Nguyen_Tuan" pid="130/1650">Nguyen Tuan Anh</na></co>
<co c="0"><na f="a/Arabnia:Hamid_R=" pid="a/HRArabnia">Hamid R. Arabnia</na></co>
<co c="0"><na f="b/Baek:Jinsuk" pid="27/4896">Jinsuk Baek</na></co>
<co c="0"><na f="b/Baik:Namkyun" pid="132/0353">Namkyun Baik</na></co>
<co c="0"><na f="b/Bi:Xue" pid="35/9361">Xue Bi</na></co>
<co c="0"><na f="b/Bie:Rongfang" pid="54/830">Rongfang Bie</na></co>
<co c="3"><na f="b/Biswas:Emon" pid="130/1681">Emon Biswas</na></co>
<co c="0"><na f="c/Chang_0001:Chin=Chen" pid="c/ChinChenChang">Chin-Chen Chang 0001</na></co>
<co c="0"><na f="c/Chao:Hongyang" pid="58/4277">Hongyang Chao</na></co>
<co c="0"><na f="c/Chen:Hsiao=Hwa" pid="41/2526">Hsiao-Hwa Chen</na></co>
<co c="0"><na f="c/Chen:Pin=Wei" pid="133/5270">Pin-Wei Chen</na></co>
<co c="0"><na f="c/Chen:Qi" pid="66/6320">Qi Chen</na></co>
<co c="0" n="2"><na f="c/Chen:Yicheng" pid="54/6164">Yicheng Chen</na><na>Yi-Cheng Chen</na></co>
<co c="6"><na f="c/Chin:Seongah" pid="32/6572">Seongah Chin</na></co>
<co c="0" n="2"><na f="c/Cho:Young=Im" pid="13/2796">Young-Im Cho</na><na>Young Im Cho</na></co>
<co c="0"><na f="c/Choi:Gyoo=Seok" pid="04/10583">Gyoo-Seok Choi</na></co>
<co c="0"><na f="c/Choi:Yong_Soo" pid="71/10488">Yong Soo Choi</na></co>
<co c="0"><na f="c/Choi:YongSoo" pid="352/6474">YongSoo Choi</na></co>
<co c="0"><na f="c/Chou:Yung=Shun" pid="212/9570">Yung-Shun Chou</na></co>
<co c="0"><na f="c/Cimato:Stelvio" pid="60/3624">Stelvio Cimato</na></co>
<co c="4"><na f="d/Dao:Nhu=Ngoc" pid="160/2661">Nhu-Ngoc Dao</na></co>
<co c="0"><na f="d/Du:Rong" pid="85/2037">Rong Du</na></co>
<co c="0"><na f="f/Fisher:Paul_S=" pid="78/6339">Paul S. Fisher</na></co>
<co c="0"><na f="g/Gao:Fumeng" pid="213/8822">Fumeng Gao</na></co>
<co c="0"><na f="g/Gil:Joon=Min" pid="91/2995">Joon-Min Gil</na></co>
<co c="3"><na f="h/Habiba:Mansura" pid="130/1646">Mansura Habiba</na></co>
<co c="0"><na f="h/Hoa:Le_Quang" pid="126/2225">Le Quang Hoa</na></co>
<co c="0"><na f="h/Hong:YouSik" pid="57/4436">YouSik Hong</na></co>
<co c="0"><na f="h/Hsu:Shen=Chieh" pid="191/1697">Shen-Chieh Hsu</na></co>
<co c="0"><na f="h/Huy:Phan_Trung" pid="98/3522">Phan Trung Huy</na></co>
<co c="1"><na f="h/Hyun:Taek=Young" pid="09/802">Taek-Young Hyun</na></co>
<co c="0"><na f="i/Im:Yong_Soon" pid="88/7539">Yong Soon Im</na></co>
<co c="0"><na f="j/James_II:Jimmy" pid="213/9034">Jimmy James II</na></co>
<co c="0"><na f="j/Jeon:Yu_Cheol" pid="99/7537">Yu Cheol Jeon</na></co>
<co c="0"><na f="j/Jo_0001:Minho" pid="21/4301">Minho Jo 0001</na></co>
<co c="0"><na f="j/Jung:Ki=Hyun" pid="56/4620">Ki-Hyun Jung</na></co>
<co c="2"><na f="j/Jung:Myunghee" pid="99/1672">Myunghee Jung</na></co>
<co c="0"><na f="k/Kang:Jeong_Jin" pid="63/7539">Jeong Jin Kang</na></co>
<co c="0"><na f="k/Kang:Myeon=Koo" pid="70/7537">Myeon-Koo Kang</na></co>
<co c="0"><na f="k/Kim:Bryan" pid="213/9080">Bryan Kim</na></co>
<co c="0"><na f="k/Kim:Byung=Gyu" pid="78/1177">Byung-Gyu Kim</na></co>
<co c="0"><na f="k/Kim:Dae=Soo" pid="56/7238">Dae-Soo Kim</na></co>
<co c="0"><na f="k/Kim:Hongkyun" pid="61/10172">Hongkyun Kim</na></co>
<co c="0"><na f="k/Kim:Hyoung_Joong" pid="96/2779">Hyoung Joong Kim</na></co>
<co c="0"><na f="k/Kim:Jeongsook" pid="40/7539">Jeongsook Kim</na></co>
<co c="0" n="2"><na f="k/Kim:Jongwon" pid="181/2684">Jongwon Kim</na><na>Jong Won Kim</na></co>
<co c="0"><na f="k/Kim:Kyung=Sook" pid="57/7537">Kyung-Sook Kim</na></co>
<co c="0"><na f="l/Lee:Geuk" pid="82/129">Geuk Lee</na></co>
<co c="0"><na f="l/Lee:Gil=Je" pid="45/3014">Gil-Je Lee</na></co>
<co c="6"><na f="l/Lee:Sangyong" pid="21/7164">Sangyong Lee</na></co>
<co c="0"><na f="l/Lee:Yong=Joon" pid="60/7293">Yong-Joon Lee</na></co>
<co c="0"><na f="l/Leng:Lu" pid="97/9765">Lu Leng</na></co>
<co c="0"><na f="l/Li_0056:Ming" pid="181/2821-56">Ming Li 0056</na></co>
<co c="0"><na f="l/Liang:Wenshuang" pid="147/1569">Wenshuang Liang</na></co>
<co c="0"><na f="l/Lin:Hsuan=Yu" pid="45/6163">Hsuan-Yu Lin</na></co>
<co c="0"><na f="l/Lin_0001:Yi=Chin" pid="83/540-1">Yi-Chin Lin 0001</na></co>
<co c="0"><na f="l/Liu:Chun=Chi" pid="16/1272">Chun-Chi Liu</na></co>
<co c="0"><na f="l/Liu_0001:Yan=Xiao" pid="74/11326-1">Yan-Xiao Liu 0001</na></co>
<co c="0"><na f="l/Lo:Yen=Hung" pid="214/1562">Yen-Hung Lo</na></co>
<co c="0"><na f="l/Lu:Yu=Quan" pid="390/1400">Yu-Quan Lu</na></co>
<co c="0"><na f="m/Moon:Chanwoo" pid="00/6465">Chanwoo Moon</na></co>
<co c="1"><na f="n/Nam:San=Yep" pid="07/3401">San-Yep Nam</na></co>
<co c="4"><na f="n/Nguyen:Ngoc_Phi" pid="253/2574">Ngoc Phi Nguyen</na></co>
<co c="4"><na f="n/Nguyen:The=Vinh" pid="332/3762">The-Vinh Nguyen</na></co>
<co c="0"><na f="o/Oh:Sun=Jin" pid="24/2258">Sun-Jin Oh</na></co>
<co c="3"><na f="o/Opu:Md=_Fazla_Rabbi" pid="130/1631">Md. Fazla Rabbi Opu</na></co>
<co c="1"><na f="p/Park:Duk=Je" pid="15/460">Duk-Je Park</na></co>
<co c="1"><na f="p/Park:Injung" pid="11/5644">Injung Park</na></co>
<co c="0" n="2"><na f="p/Park_0001:Jong_Hyuk" pid="p/JongHyukPark">Jong Hyuk Park 0001</na><na>James J. Park 0001</na></co>
<co c="2"><na f="p/Park_0001:Sung=Soon" pid="62/2774-1">Sung-Soon Park 0001</na></co>
<co c="0"><na f="r/Rodrigues:Joel_J=_P=_C=" pid="25/3419">Joel J. P. C. Rodrigues</na></co>
<co c="0"><na f="r/Ryou:Su=Bong" pid="97/7538">Su-Bong Ryou</na></co>
<co c="0"><na f="s/Shi:Weisong" pid="s/WeisongShi">Weisong Shi</na></co>
<co c="0"><na f="s/Shih:Hsiang=Wen" pid="96/11304">Hsiang-Wen Shih</na></co>
<co c="0"><na f="s/Shin:Dongil" pid="85/2364">Dongil Shin</na></co>
<co c="0"><na f="s/Shin:Dongkyoo" pid="57/2855">Dongkyoo Shin</na></co>
<co c="0"><na f="s/Sun:Li=Zhe" pid="172/3628">Li-Zhe Sun</na></co>
<co c="0"><na f="t/Thanh:Nguyen_Hai" pid="91/8238">Nguyen Hai Thanh</na></co>
<co c="0"><na f="t/Truong:Nguyen_Huy" pid="168/4086">Nguyen Huy Truong</na></co>
<co c="0"><na f="t/Tso:Raylin" pid="73/5733">Raylin Tso</na></co>
<co c="0"><na f="w/Wang:Chenyu" pid="98/10212">Chenyu Wang</na></co>
<co c="0"><na f="w/Wang:Daoshun" pid="72/2314">Daoshun Wang</na></co>
<co c="0"><na f="w/Wang_0001:Shengling" pid="79/5305-1">Shengling Wang 0001</na></co>
<co c="0"><na f="w/Wang:Shuozhong" pid="46/781">Shuozhong Wang</na></co>
<co c="0"><na f="w/Wu:Chih=Cheng" pid="79/8278">Chih-Cheng Wu</na></co>
<co c="0"><na f="w/Wu:Chihi=Han" pid="194/8035">Chihi-Han Wu</na></co>
<co c="0"><na f="w/Wu:Song=Yu" pid="222/7732">Song-Yu Wu</na></co>
<co c="0"><na f="w/Wu:Xiaotian" pid="99/2474">Xiaotian Wu</na></co>
<co c="0"><na f="x/Xiong:Lizhi" pid="143/9229">Lizhi Xiong</na></co>
<co c="0"><na f="x/Xu:Shuaijing" pid="152/6112">Shuaijing Xu</na></co>
<co c="0"><na f="y/Yan:Xuehu" pid="54/7663">Xuehu Yan</na></co>
<co c="0" n="2"><na f="y/Yang:Ching=Nung" pid="21/1931">Ching-Nung Yang</na><na>James C. N. Yang</na></co>
<co c="0"><na f="y/Yang_0001:Ziyuan" pid="160/1058-1">Ziyuan Yang 0001</na></co>
<co c="0"><na f="y/Ye:Guo=Cin" pid="11/9707">Guo-Cin Ye</na></co>
<co c="0"><na f="y/Yeh:Zong=Xuan" pid="194/8078">Zong-Xuan Yeh</na></co>
<co c="0"><na f="y/Yoo:Kee=Young" pid="92/553">Kee-Young Yoo</na></co>
<co c="0"><na f="y/Yoon:Eun=Jun" pid="08/7017">Eun-Jun Yoon</na></co>
<co c="5"><na f="y/Yu:Huan" pid="79/6142">Huan Yu</na></co>
<co c="2"><na f="y/Yun:Eui=Jung" pid="44/4439">Eui-Jung Yun</na></co>
<co c="0"><na f="z/Zhang:Guangzhi" pid="139/4143">Guangzhi Zhang</na></co>
<co c="0"><na f="z/Zhang:Mengtao" pid="189/1343">Mengtao Zhang</na></co>
<co c="5"><na f="z/Zhang:Ru" pid="80/446">Ru Zhang</na></co>
<co c="0"><na f="z/Zhang:X=" pid="57/903">X. Zhang</na></co>
<co c="0"><na f="z/Zhang_0001:Xinpeng" pid="01/3442-1">Xinpeng Zhang 0001</na></co>
<co c="0"><na f="z/Zhang_0040:Yue" pid="47/722-40">Yue Zhang 0040</na></co>
<co c="0"><na f="z/Zhou_0001:Zhili" pid="91/3541-1">Zhili Zhou 0001</na></co>
</coauthors>
</dblpperson>

