Choong Seon Hong
Choong Seon Hong
Professor of Computer Science and Engineering, Kyung Hee University
Verified email at - Homepage
TitleCited byYear
Security in wireless sensor networks: issues and challenges
ASK Pathan, HW Lee, CS Hong
2006 8th International Conference Advanced Communication Technology 2, 6 pp …, 2006
Caching in the sky: Proactive deployment of cache-enabled unmanned aerial vehicles for optimized quality-of-experience
M Chen, M Mozaffari, W Saad, C Yin, M Debbah, CS Hong
IEEE Journal on Selected Areas in Communications 35 (5), 1046-1061, 2017
Identity-based mutual device authentication schemes for PLC system
J Heo, CS Hong, MS Choi, SH Ju, YH Lim
2008 IEEE International Symposium on Power Line Communications and Its …, 2008
Security issues in wireless mesh networks
MS Siddiqui
2007 International Conference on Multimedia and Ubiquitous Engineering (MUE …, 2007
Data-centric multiobjective QoS-aware routing protocol for body sensor networks
M Razzaque, CS Hong, S Lee
Sensors 11 (1), 917-937, 2011
Multi-constrained QoS geographic routing for heterogeneous traffic in sensor networks
MA Razzaque, MM Alam, M Mamun-Or-Rashid, CS Hong
IEICE Transactions on communications 91 (8), 2589-2601, 2008
A lightweight NEMO protocol to support 6LoWPAN
JH Kim, CS Hong, T Shon
ETRI journal 30 (5), 685-695, 2008
An adaptable mobility-aware clustering algorithm in vehicular networks
MMC Morales, CS Hong, YC Bang
2011 13th Asia-Pacific Network Operations and Management Symposium, 1-6, 2011
Traffic-aware and energy-efficient vnf placement for service chaining: Joint sampling and matching approach
C Pham, NH Tran, S Ren, W Saad, CS Hong
IEEE Transactions on Services Computing, 2017
Design and implementation of control mechanism for standby power reduction
J Heo, CS Hong, SB Kang, SS Jeon
IEEE Transactions on Consumer Electronics 54 (1), 179-185, 2008
The multi-layer vpn management architecture
EC Kim, CS Hong, JG Song
Integrated Network Management VI. Distributed Management for the Networked …, 1999
A proximal algorithm for joint resource allocation and minimizing carbon footprint in geo-distributed fog computing
CT Do, NH Tran, C Pham, MGR Alam, JH Son, CS Hong
2015 International Conference on Information Networking (ICOIN), 324-329, 2015
HER-MAC: A hybrid efficient and reliable MAC for vehicular ad hoc networks
DNM Dang, HN Dang, V Nguyen, Z Htike, CS Hong
2014 IEEE 28th International Conference on Advanced Information Networking …, 2014
Medium access control for power line communications: an overview of the IEEE 1901 and ITU-T G. hn standards
MM Rahman, CS Hong, S Lee, J Lee, MA Razzaque, JH Kim
IEEE Communications Magazine 49 (6), 183-191, 2011
An efficient and reliable MAC in VANETs
DNM Dang, CS Hong, S Lee, EN Huh
IEEE Communications Letters 18 (4), 616-619, 2014
A system model for energy efficient green-IoT network
SF Abedin, MGR Alam, R Haw, CS Hong
2015 International Conference on Information Networking (ICOIN), 177-182, 2015
Routing security in sensor network: Hello flood attack and defense
MA Hamid, MO Rashid, CS Hong
IEEE ICNEWS, 2-4, 2006
Game theory for cyber security and privacy
CT Do, NH Tran, C Hong, CA Kamhoua, KA Kwiat, E Blasch, S Ren, ...
ACM Computing Surveys (CSUR) 50 (2), 30, 2017
Design of a QoS-aware routing mechanism for wireless multimedia sensor networks
MA Hamid, MM Alam, CS Hong
IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-6, 2008
Mode selection and resource allocation in device-to-device communications: A matching game approach
SMA Kazmi, NH Tran, W Saad, Z Han, TM Ho, TZ Oo, CS Hong
IEEE Transactions on Mobile Computing 16 (11), 3126-3141, 2017
The system can't perform the operation now. Try again later.
Articles 1–20