Ji Won Yoon
Title
Cited by
Cited by
Year
An image encryption scheme with a pseudorandom permutation based on chaotic maps
JW Yoon, H Kim
Communications in Nonlinear Science and Numerical Simulation 15 (12), 3998-4006, 2010
1852010
Nanopipette delivery of individual molecules to cellular compartments for single-molecule fluorescence tracking
A Bruckbauer, P James, D Zhou, JW Yoon, D Excell, Y Korchev, R Jones, ...
Biophysical journal 93 (9), 3120-3131, 2007
1182007
Cityride: a predictive bike sharing journey advisor
JW Yoon, F Pinelli, F Calabrese
2012 IEEE 13th International Conference on Mobile Data Management, 306-311, 2012
1132012
Hybrid spam filtering for mobile communication
JW Yoon, H Kim, JH Huh
computers & security 29 (4), 446-459, 2010
682010
DySCo: quantitating associations of membrane proteins using two-color single-molecule tracking
PD Dunne, RA Fernandes, J McColl, JW Yoon, JR James, SJ Davis, ...
Biophysical journal 97 (4), L5-L7, 2009
662009
Predicting arrival times of buses using real-time GPS measurements
M Sinn, JW Yoon, F Calabrese, E Bouillet
2012 15th International IEEE Conference on Intelligent Transportation …, 2012
652012
Bayesian inference for improved single molecule fluorescence tracking
JW Yoon, A Bruckbauer, WJ Fitzgerald, D Klenerman
Biophysical journal 94 (12), 4932-4947, 2008
562008
Deterministic and statistical methods for reconstructing multidimensional NMR spectra
JW Yoon, S Godsill, E Kupče, R Freeman
Magnetic Resonance in Chemistry 44 (3), 197-209, 2006
452006
Adaptive classification for brain computer interface systems using sequential Monte Carlo sampling
JW Yoon, SJ Roberts, M Dyson, JQ Gan
Neural Networks 22 (9), 1286-1294, 2009
442009
Estimation of arrival times at transit stops
EP Bouillet, F Calabrese, F Pinelli, M Sinn, JW Yoon
US Patent 9,183,741, 2015
402015
Visual honey encryption: Application to steganography
JW Yoon, H Kim, HJ Jo, H Lee, K Lee
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia …, 2015
212015
A new countermeasure against brute-force attacks that use high performance computers for big data analysis
HJ Jo, JW Yoon
International Journal of Distributed Sensor Networks 11 (6), 406915, 2015
192015
Efficient model selection for probabilistic K nearest neighbour classification
JW Yoon, N Friel
Neurocomputing 149, 1098-1108, 2015
182015
Network analysis of temporal trends in scholarly research productivity
H Kim, JW Yoon, J Crowcroft
Journal of Informetrics 6 (1), 97-110, 2012
182012
Bayesian inference for 2D gel electrophoresis image analysis
JW Yoon, SJ Godsill, CH Kang, TS Kim
International Conference on Bioinformatics Research and Development, 343-356, 2007
162007
Mining residential household information from low-resolution smart meter data
F Fusco, M Wurst, JW Yoon
Proceedings of the 21st International Conference on Pattern Recognition …, 2012
152012
Honey chatting: A novel instant messaging system robust to eavesdropping over communication
JI Kim, JW Yoon
2016 IEEE International Conference on Acoustics, Speech and Signal …, 2016
142016
Various threat models to circumvent air-gapped systems for preventing network attack
E Lee, H Kim, JW Yoon
International workshop on information security applications, 187-199, 2015
132015
Bayesian inference for an adaptive ordered probit model: An application to brain computer interfacing
JW Yoon, SJ Roberts, M Dyson, JQ Gan
Neural Networks 24 (7), 726-734, 2011
132011
Sequential Bayesian estimation for adaptive classification
JW Yoon, SJ Roberts, M Dyson, JQ Gan
2008 IEEE International Conference on Multisensor Fusion and Integration for …, 2008
122008
The system can't perform the operation now. Try again later.
Articles 1–20