Method and apparatus for malware detection YS Choi, IK Kim, BK Kim, SY Yoon, DW Kim, JT Oh, JS Jang US Patent App. 12/209,249, 2009 | 257 | 2009 |
Apparatus and method for detecting network attack IK Kim, YS Choi, DW Kim, JT Oh, JS Jang US Patent 8,095,973, 2012 | 248 | 2012 |
Green progress and prospect in Malaysia SC Chua, TH Oh Renewable and Sustainable Energy Reviews 15 (6), 2850-2861, 2011 | 219 | 2011 |
Reliable services in MPLS TM Chen, TH Oh IEEE Communications Magazine 37 (12), 58-62, 1999 | 155 | 1999 |
An ultrastructural and immunocytochemical study of astrocytic differentiation in vitro: changes in the composition and distribution of the cellular cytoskeleton PA Trimmer, PJ Reier, TH Oh, LF Eng Journal of Neuroimmunology 2 (3-4), 235-260, 1982 | 119 | 1982 |
Security issues on wireless body area network for remote healthcare monitoring S Lim, TH Oh, YB Choi, T Lakshman 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and …, 2010 | 107 | 2010 |
Solar energy outlook in Malaysia SC Chua, TH Oh Renewable and Sustainable Energy Reviews 16 (1), 564-574, 2012 | 100 | 2012 |
Method and apparatus for integrating and managing information of mobile terminal YH Kim, TH Oh, YI Cha, GS Nam, OH Kwon US Patent 8,868,774, 2014 | 97 | 2014 |
Energy efficiency and carbon trading potential in Malaysia TH Oh, SC Chua Renewable and sustainable energy reviews 14 (7), 2095-2103, 2010 | 93 | 2010 |
Image sensor having improved sensitivity and method for making same T Oh, D Yi, J Lee US Patent App. 11/244,189, 2006 | 67 | 2006 |
Fast randomized singular value thresholding for low-rank optimization TH Oh, Y Matsushita, YW Tai, IS Kweon IEEE transactions on pattern analysis and machine intelligence 40 (2), 376-391, 2017 | 65 | 2017 |
IoT security vulnerability: A case study of a Web camera Y Seralathan, TT Oh, S Jadhav, J Myers, JP Jeong, YH Kim, JN Kim 2018 20th International Conference on Advanced Communication Technology …, 2018 | 57 | 2018 |
SAINT: Self-Adaptive Interactive Navigation Tool for Cloud-Based Vehicular Traffic Optimization DD J. Jeong, Jeong Harrison, E. Lee, Tae Oh IEEE Transactions on Vehicular Technology, 2016 | 55* | 2016 |
An autonomous driving system for unknown environments using a unified map I Shim, J Choi, S Shin, TH Oh, U Lee, B Ahn, DG Choi, DH Shim, ... IEEE transactions on intelligent transportation systems 16 (4), 1999-2013, 2015 | 55 | 2015 |
An in-depth analysis of the mirai botnet J Margolis, TT Oh, S Jadhav, YH Kim, JN Kim 2017 International Conference on Software Security and Assurance (ICSSA), 6-12, 2017 | 50 | 2017 |
Fault restoration and spare capacity allocation with QoS constraints for MPLS networks TH Oh, TM Chen, JL Kennington Globecom'00-IEEE. Global Telecommunications Conference. Conference Record …, 2000 | 43 | 2000 |
Android malware detection using category-based machine learning classifiers H Ali Alatwi, T Oh, E Fokoue, B Stackpole Proceedings of the 17th Annual Conference on Information Technology …, 2016 | 30 | 2016 |
Enhanced SAR ADC energy efficiency from the early reset merged capacitor switching algorithm J Guerber, H Venkatram, T Oh, UK Moon 2012 IEEE International Symposium on Circuits and Systems (ISCAS), 2361-2364, 2012 | 29 | 2012 |
Best security practices for android, blackberry, and iOS T Oh, B Stackpole, E Cummins, C Gonzalez, R Ramachandran, S Lim 2012 The First IEEE Workshop on Enabling Technologies for Smartphone and …, 2012 | 27 | 2012 |
Analyzing User Awareness of Privacy Data Leak in Mobile Applications Y Kim, T Oh, J Kim Mobile Information Systems, 12, 2015 | 25 | 2015 |