{"id":845,"date":"2024-08-28T19:09:23","date_gmt":"2024-08-28T10:09:23","guid":{"rendered":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/?p=845"},"modified":"2026-04-25T15:16:03","modified_gmt":"2026-04-25T06:16:03","slug":"scie","status":"publish","type":"post","link":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/?p=845","title":{"rendered":"SCIE"},"content":{"rendered":"\n<h2>2026<\/h2>\n\n\n\n<ol><li>KHALID MAIRA, MOHSIN AHMED RAZA, ALI JEHAD, Houbing Herbert Song, \ub178\ubcd1\ud76c, STEP-SAFE: Smart TinyML and Few-Shot Enabled Pedestrian and Cyclist Safety Framework for Intelligent Transportation System, IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, pp. 1-18 (Apr, 2026)<\/li><\/ol>\n\n\n\n<h2>2025<\/h2>\n\n\n\n<ol><li>MOHSIN AHMED RAZA, KHALID MAIRA, ALI JEHAD, \ub178\ubcd1\ud76c, Enhancing Driver Safety with ResNet-RG &#8211; A Deep Learning Based Distraction Detection Approach, IEEE SENSORS JOURNAL, pp.1-20 (Dec, 2025)<\/li><li>Naveed Imran, Jian Zhang, ALI JEHAD, Sana Hameed, Houbing Herbert Song, \ub178\ubcd1\ud76c, SwinLSTM-EmoRec: A RobuDual-Modal Emotion Recognition Framework Combining mmWave Radar and Camera for IoT-Enabled Multimedia Applications, IEEE Internet of Things Journal, pp.1-19 (Dec, 2025)<\/li><li>ALI JEHAD, KHALID MAIRA, SHAN GAOYANG, MOHSIN AHMED RAZA, Shabir Ahmad, \ub178\ubcd1\ud76c, Intent-Based Networking with QoS-Aware Routing in SDN usingAHP based AI Prioritization and Optimization, IEEE Internet of Things Journal, pp.1-12 (Nov, 2025)<\/li><li>MOHSIN AHMED RAZA, KHALID MAIRA, ALI JEHAD, HAIDERY SAQIB ALI, \ub178\ubcd1\ud76c, An efficient temporal attention framework for real-time detection of unsafe driver behaviors, Alexandria Engineering Journal, Vol.133, pp.318-328 (Nov, 2025)<\/li><li>ZHANG CHUNJIONG, SHAN GAOYANG, Fa Zhu, Jun Jiang, \ub178\ubcd1\ud76c, FEI-Hi: Federated Edge Intelligence for Healthcare Informatics, IEEE Journal of Biomedical and Health Informatics, pp.1-14 (Sep, 2025)<\/li><li>KHALID MAIRA, MOHSIN AHMED RAZA, ALI JEHAD, \ub178\ubcd1\ud76c, Optimization of recurrent neural networks for high-performance intrusion detection in network traffic, Cluster Computing, Vol.28, No.9, pp.1-22 (Aug, 2025)<\/li><li>ZHANG CHUNJIONG, SHAN GAOYANG, \ub178\ubcd1\ud76c, Jun Jiang, FM2 Learning: LLM-Based Federated Multi-Task Multi-Domain Learning for Consumer Electronics and IoT Enhancement, IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, pp.1 (Aug, 2025)<\/li><li>Lalit Kumar Baghel, Rohit Singh, Suman Kumar, \ub178\ubcd1\ud76c, ALI JEHAD, SHAN GAOYANG, BLE 5.x-Based Enhanced Service Architecture for Delay-Sensitive IoT Applications, IEEE Internet of Things Journal, pp.1-16 (Aug, 2025)<\/li><li>Lalit Kumar Baghel, Eiman Kanjo, \ub178\ubcd1\ud76c, SHAN GAOYANG, Analytical Framework for Throughput Enhancement in BLE Extended Advertising With Packet Chaining, IEEE Wireless Communications Letters, pp.1-5 (Jul, 2025)<\/li><li>KHALID MAIRA, ALI JEHAD, MOHSIN AHMED RAZA, Mohammed J. F. Alenazi, \ub178\ubcd1\ud76c, Deep learning techniques for enhanced security and privacy in 6G terrestrial\u2013nonterrestrial network architecture, JOURNAL OF SUPERCOMPUTING, pp.631-631 (Mar, 2025)<\/li><li>Zhongyu Gao, Zhengfeng Huang, Jie Cui, \ub178\ubcd1\ud76c, Guangzhu Liu, Patrick Girard, Xiaoqing Wen, Aibin Yan, Graph-Based Multi-Task Transfer Learning for Fault Detection and Diagnosis of Few-Shot Analog Circuits, IEEE Internet of Things Journal, pp.1-15 (Mar, 2025)<\/li><li>ZHANG CHUNJIONG, SHAN GAOYANG, \ub178\ubcd1\ud76c, FMD-IoV: Security and Robust Enhancement for Federated Multi-Domain Learning\u2013Based IoV, IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, pp.1-12 (Jan, 2025)<\/li><\/ol>\n\n\n\n<h2>2024<\/h2>\n\n\n\n<ol><li>CHANDROTH JISI, \ub178\ubcd1\ud76c, ALI JEHAD, An effective scheme for classifying imbalanced traffic in SD-IoT, leveraging XGBoost and active learning, Computer Networks, pp.1-19 (Nov, 2024)<\/li><li>ZHANG CHUNJIONG, SHAN GAOYANG, \ub178\ubcd1\ud76c, Communication-efficient federated multi-domain learning for network anomaly detection, DIGITAL COMMUNICATIONS AND NETWORKS, pp.1-15 (Nov, 2024)<\/li><li>ZHANG CHUNJIONG, SHAN GAOYANG, \uc784\uc815\ud604, \ub178\ubcd1\ud76c, Dynamic Reinforcement Learning for Optimal Go AI Training: Adaptive Adjustment and Optimization, IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, pp.1-11 (Oct, 2024)<\/li><li>ZHANG CHUNJIONG, SHAN GAOYANG, \ub178\ubcd1\ud76c, Fair Federated Learning for Multi-Task 6G NWDAF Network Anomaly Detection, IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, pp.1-12 (Sep, 2024)<\/li><li>&nbsp;ALI JEHAD, Houbing Herbert Song, \ub178\ubcd1\ud76c, An SDN-Based Framework for E2E QoS Guarantee in Internet-of-Things Devices, IEEE Internet of Things Journal, pp.1-23 (Sep, 2024)<\/li><li>\uc774\uc2b9\uc6b4, Sijung Kim, \ub178\ubcd1\ud76c, Mixed Reality Virtual Device (MRVD) for seamless MR-IoT-Digital Twin convergence , INTERNET OF THINGS , Vol.26 , p.101155 (Jul, 2024)<\/li><li>CHANDROTH JISI, \ub178\ubcd1\ud76c, ALI JEHAD, Reliable paths prediction with intelligent data plane monitoring enabled reinforcement learning in SD-IoT , JOURNAL OF KING SAUD UNIVERSITY &#8211; COMPUTER AND INFORMATION SCIENCES , pp.1-14 (Mar, 2024)<\/li><li>KHALID MAIRA, ALI JEHAD, \ub178\ubcd1\ud76c, Artificial Intelligence and Machine Learning Technologies for Integration of Terrestrial in Non-Terrestrial Networks , IEEE INTERNET OF THINGS MAGAZINE , Vol.7 , No.1 , pp.28-33 (Jan, 2024)<\/li><\/ol>\n\n\n\n<h2>2023<\/h2>\n\n\n\n<ol><li>ALI JEHAD, SHAN GAOYANG, Noor Gul, \ub178\ubcd1\ud76c, An Intelligent Blockchain\u2011based Secure Link Failure Recovery Framework for Software\u2011defined Internet\u2011of\u2011Things , Journal of Grid Computing , pp.1-18 (Oct, 2023)<\/li><li>Muhammad Yasir Khan, \ub178\ubcd1\ud76c, Jawaid Iqbal, Muhammad Adnan, Noor ul Amin, ALI JEHAD, A Hierarchal Clustered Based Proactive Caching in NDN-Based Vehicular Network , COMPUTER SYSTEMS SCIENCE AND ENGINEERING , Vol.47 , No.1 , pp.1185-1208 (Jun, 2023)<\/li><li>ALI JEHAD, Mohannad Alswailim, Rutvij H. Jhaveri, \ub178\ubcd1\ud76c, ESCALB: An effective slave controller allocation-based load balancing scheme for multi-domain SDN-enabled-IoT networks , JOURNAL OF KING SAUD UNIVERSITY &#8211; COMPUTER AND INFORMATION SCIENCES , pp.1-11 (May, 2023)<\/li><li>PUSPITA RATIH HIKMAH, \ub178\ubcd1\ud76c, ALI JEHAD, An Intelligent Admission Control Scheme for Dynamic Slice Handover Policy in 5G Network Slicing , CMC-Computers Materials &amp; Continua , Vol.75 , No.2 , pp.4611-4631 (Mar, 2023)<\/li><\/ol>\n\n\n\n<h2>2022<\/h2>\n\n\n\n<ol><li>ALI JEHAD, Zamil S. Alzamil, \ub178\ubcd1\ud76c, E2E Service Class Mapping in Heterogeneous IOUT: SDN-Based Architecture , IEEE INTERNET OF THINGS MAGAZINE , Vol.5 , No.4 , pp.48-52 (Dec, 2022)<\/li><li>SHAN GAOYANG, \ub178\ubcd1\ud76c, A slotted random request scheme for connectionless data transmission in bluetooth low energy 5.0 , JOURNAL OF NETWORK AND COMPUTER APPLICATIONS , Vol.2076 , pp.1-11 (Nov, 2022)<\/li><li>\uc774\uaddc\ubbfc, \uc774\ucca0\uc6c5, \ub178\ubcd1\ud76c, QoS Support Path Selection for Inter-Domain Flows Using Effective Delay and Directed Acyclic Graph in Multi-Domain SDN , ELECTRONICS , Vol.11 , No.14 , pp.1-24 (Jul, 2022)<\/li><li>ALI JEHAD, \ub178\ubcd1\ud76c, A Novel Scheme for Controller Selection in Software-Defined Internet-of-Things (SD-IoT) , SENSORS , Vol.22 , No.9 , pp.1-28 (May, 2022)<\/li><li>ALI JEHAD, \ub178\ubcd1\ud76c, An Effective Approach for Controller Placement in Software-Defined Internet-of-Things (SD-IoT) , SENSORS , Vol.22 , pp.1-16 (Apr, 2022)<\/li><li>SHAN GAOYANG, \ub178\ubcd1\ud76c, Maximized Effective Transmission Rate Model for Advanced Neighbor Discovery Process in Bluetooth Low Energy 5.0 , IEEE INTERNET OF THINGS JOURNAL , pp.1-13 (Feb, 2022)<\/li><li>\uc774\uc2b9\uc6b4, \uae38\uc6b0\uadfc, SJ Kim, \uac15\uc9c4\uc11d, \ub178\ubcd1\ud76c, Novel Architecture of OneM2M-Based Convergence Platform for Mixed Reality and IoT , CMC-COMPUTERS MATERIALS &amp; CONTINUA , Vol.71 , No.1 , pp.51-69 (Jan, 2022)<\/li><\/ol>\n\n\n\n<h2>2021<\/h2>\n\n\n\n<ol><li>\uc774\ucca0\uc6c5, \uc774\uaddc\ubbfc, \ub178\ubcd1\ud76c, Adaptive Strategy to Change Firing Phases of Collided Nodes in Extended-Desync TDMA-Based MANETs , SENSORS , pp.1-21 (Oct, 2021)<\/li><li>ALI JEHAD, \uc774\uc815\ud0dc, Byungkyu Lee, Jimyung Oh, \ub178\ubcd1\ud76c, A Novel Features Prioritization Mechanism for Controllers in Software-Defined Networking , CMC-COMPUTERS MATERIALS &amp; CONTINUA , Vol.69 , No.1 , pp.268-282 (Jun, 2021)<\/li><li>Khalil Khan, ALI JEHAD, Irfan Uddin, Rehan Ullah Khan, Sahib Khan, \ub178\ubcd1\ud76c, Race Classification Using Deep Learning , CMC-COMPUTERS MATERIALS &amp; CONTINUA , Vol.68 , No.3 , pp.3483-3498 (May, 2021)<\/li><li>ALI JEHAD, \ub178\ubcd1\ud76c, Quality of Service Improvement with Optimal Software-Defined Networking Controller and Control Plane Clustering , CMC-COMPUTERS MATERIALS &amp; CONTINUA , Vol.67 , No.1 , pp.849-875 (Jan, 2021)<\/li><li>\ubc15\ud604\uc7ac, \uc2e0\ud0dc\uc601, \uc774\ucca0\uc6c5, \ubc15\uc218\ubc94, \ucd5c\uc815\uc6b1, \ub178\ubcd1\ud76c, Implementation of Embedded Testbeds Using USRP and GNU-Radio for Performance Measurement and Analysis of PPS and PC-Based Time Synchronizations , INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING , pp.25-35 (Jan, 2021)<\/li><\/ol>\n\n\n\n<h2>2020<\/h2>\n\n\n\n<ol><li>SHAN GAOYANG, \ub178\ubcd1\ud76c, Performance Model for Advanced Neighbor Discovery Process in Bluetooth Low Energy 5.0-Enabled Internet of Things Networks , IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS , Vol.67 , No.12 , pp.10965-10974 (Dec, 2020)<\/li><li>MUHAMMAD ADIL, ALI JEHAD, MOHAMMED AMIN ALMAIAH, QUI THANH HOAI TA, RAHIM KHAN, \ub178\ubcd1\ud76c, An Energy Proficient Load Balancing Routing Scheme for Wireless Sensor Networks to Maximize Their Lifespan in an Operational Environment , IEEE ACCESS , Vol.8 , pp.163209-163224 (Sep, 2020)<\/li><li>\uc774\uc2b9\uc6b4, \uc774\uc815\ud0dc, Si Jung Kim, \ub178\ubcd1\ud76c, Supervised Learning-Based Fast, Stealthy, and Active NAT Device Identification Using Port Response Patterns , SYMMETRY-BASEL , Vol.12 , No.9 , pp.1-17 (Sep, 2020)<\/li><li>Khalil Khan, ALI JEHAD, Irfan Uddin, Nasir Ahmad, Rabia Riaz, Rehan Ullah Khan, Saqlain Hassan, \ub178\ubcd1\ud76c, PHND: Pashtu Handwritten Numerals Database and deep learning benchmark , PLoS ONE , Vol.15 , No.9 , pp.1-19 (Sep, 2020)<\/li><li>ALI JEHAD, \uc774\uaddc\ubbfc, Dong Kuk Ryu, Gyudong Park, \ub178\ubcd1\ud76c, Software-Defined Networking Approaches for Link Failure Recovery: A Survey , SUSTAINABILITY , pp.1-29 (May, 2020)<\/li><li>ALI JEHAD, \ub178\ubcd1\ud76c, An Effective Hierarchical Control Plane for Software-Defined Networks Leveraging TOPSIS for End-to-End QoS Class-Mapping , IEEE ACCESS , pp.88990-89006 (May, 2020)<\/li><li>Sangrez Khan, ALI JEHAD, \ub178\ubcd1\ud76c, Ahmad Naseem Alvi, Muhammad Awais Javed, An Efficient Superframe Structure with Optimal Bandwidth Utilization and Reduced Delay for Internet of Things Based Wireless Sensor Networks , SENSORS , Vol.20 , No.7 , pp.1-17 (Apr, 2020)<\/li><\/ol>\n\n\n\n<h2>2019<\/h2>\n\n\n\n<ol><li>ALI JEHAD, \uc774\uc2b9\uc6b4, \ub178\ubcd1\ud76c, QoS improvement with an optimum controller selection for software-defined networks , PLoS ONE , Vol.14 , No.5 , pp.1-37 (May, 2019)<\/li><\/ol>\n\n\n\n<h2>2018<\/h2>\n\n\n\n<ol><li>\uc774\uc2b9\uc6b4, \uc2e0\uc2b9\ud6c8, \ub178\ubcd1\ud76c, Classification of Freenet Traffic Flow Based on Machine Learning , Journal of Communications , Vol.13 , No.11 , pp.654-660 (Oct, 2018)<\/li><li>SHAN GAOYANG, \ub178\ubcd1\ud76c, Advertisement Interval to Minimize Discovery Time of Whole BLE Advertisers , IEEE ACCESS , Vol.6 , pp.17817-17825 (Apr, 2018)<\/li><\/ol>\n\n\n\n<h2>2017<\/h2>\n\n\n\n<ol><li>SHAN GAOYANG, \ub178\ubcd1\ud76c, Performance Comparisons of Basic and Advanced Neighbor Discovery Processes in BLE 4.2 and 5.0 Specifications , INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH , Vol.12 , No.23 , pp.13281-13285 (Dec, 2017)<\/li><li>\ubc15\ud604\uc7ac, \uc2e0\uc2b9\ud6c8, \uc774\uaddc\ubbfc, \uc624\uc9c0\uba85, \ub178\ubcd1\ud76c, Implementation of Multi-Hop Cognitive Radio Testbed using Raspberry Pi and USRP , INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING , Vol.9 , No.4 , pp.37-48 (Oct, 2017)<\/li><li>SYED IKRAM, \uc2e0\uc2b9\ud6c8, Muhammad Adnan, \ub178\ubcd1\ud76c, Performance Improvement of QoS-Enabled WLANs Using Adaptive Contention Window Backoff Algorithm , IEEE Systems Journal , No.99 , pp.1-11 (May, 2017)<\/li><li>\uae40\uad11\uc218, \uc2e0\uc2b9\ud6c8, \ub178\ubcd1\ud76c, Firing Offset Adjustment of Bio-Inspired DESYNC-TDMA to Improve Slot Utilization Performances in Wireless Sensor Networks , KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS , Vol.11 , No.3 , pp.1492-1509 (Mar, 2017)<\/li><\/ol>\n\n\n\n<h2>2016<\/h2>\n\n\n\n<ol><li>SYED IKRAM, \ub178\ubcd1\ud76c, Adaptive Backoff Algorithm for Contention Window for Dense IEEE 802.11 WLANs , MOBILE INFORMATION SYSTEMS , pp.1-11 (Jun, 2016)<\/li><li>\uae40\ubcf4\uc131, \uc774\uaddc\ubbfc, \ub178\ubcd1\ud76c, Adaptive Sensing Period Adjustment Scheme in Cognitive Radio Sensor Networks , AD HOC &amp; SENSOR WIRELESS NETWORKS , Vol.32 , pp.99-113 (May, 2016)<\/li><\/ol>\n\n\n\n<h2>2015<\/h2>\n\n\n\n<ol><li>\uae40\ubcf4\uc131, \uae40\uad11\uc218, \ub178\ubcd1\ud76c, ENC-MAC: Energy-efficient Non-overlapping Channel MAC for Cognitive Radio enabled Sensor Networks , KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS , Vol.9 , No.11 , pp.4367-4386 (Nov, 2015)<\/li><li>\uae40\ubcf4\uc131, \uc774\uaddc\ubbfc, \ub178\ubcd1\ud76c, MAC Protocol for Quality-Aware Real-Time Voice Delivery in Cognitive Radio-Enabled WSNs , INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS , Vol.2015 , No.952951 , pp.1-10 (Jul, 2015)<\/li><\/ol>\n\n\n\n<h2>2014<\/h2>\n\n\n\n<ol><li>\uad8c\uc138\ud6c8, \uae40\ubcf4\uc131, \ub178\ubcd1\ud76c, Preemptive Opportunistic MAC Protocol in Distributed Cognitive Radio Networks , IEEE COMMUNICATIONS LETTERS , Vol.18 , No.7 , pp.1155-1158 (Jul, 2014)<\/li><\/ol>\n\n\n\n<h2>2013<\/h2>\n\n\n\n<ol><li>WELDU HAILE BERHE, \uae40\ubcf4\uc131, \ub178\ubcd1\ud76c, Dynamic Rendezvous Channel Setup in Distributed Cognitive Radio Ad-hoc Networks , JOURNAL OF NEXT GENERATION INFORMATION TECHNOLOGY , Vol.4 , No.7 , pp.33-42 (Sep, 2013)<\/li><li>\uae40\uc218\uc9c4, \ucd5c\uc2b9\uc624, \ub178\ubcd1\ud76c, Classification of BitTorrent Attacks from the Protocol\u2019s Operational Viewpoints , JOURNAL OF CONVERGENCE INFORMATION TECHNOLOGY , Vol.8 , No.14 , pp.274-283 (Sep, 2013)<\/li><li>\ub178\ubcd1\ud76c, \uae40\uc8fc\uc644, \ub958\uae30\uc5f4, \ub958\uc81c\ud0dd, A whitelist-based countermeasure scheme using a Bloom filter against SIP flooding attacks , COMPUTERS &amp; SECURITY , Vol.37 , pp.46-61 (Sep, 2013)<\/li><li>Saad Muhammad, \uae40\uad11\uc218, \ucd5c\uc2b9\uc624, \ub178\ubcd1\ud76c, Mobility and Cache Management Support in Content-Centric Networking through Cluster-based Approach , INTERNATIONAL JOURNAL OF DIGITAL CONTENT TECHNOLOGY AND ITS APPLICATIONS , Vol.7 , No.13 , pp.236-244 (Sep, 2013)<\/li><\/ol>\n\n\n\n<h2>2012<\/h2>\n\n\n\n<ol><li>\uac15\uc9c4\uc11d, \ub178\ubcd1\ud76c, \ub958\uae30\uc5f4, Perceived Affordance based Tangible Interfaces for Augmented Virtuality Simulation of Aerospace , INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL , Vol.15 , No.10 , pp.4101-4112 (Oct, 2012)<\/li><li>\ub958\uc81c\ud0dd, \ub178\ubcd1\ud76c, \uc724\uba85\ucca0, \ub958\uae30\uc5f4, Detection and Countermeasure Scheme for Call-Disruption Attacks on SIP-Based Voip Services , KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS , Vol.7 , pp.1854-1873 (Jul, 2012)<\/li><\/ol>\n\n\n\n<h2>2011<\/h2>\n\n\n\n<ol><li>\uac15\uc9c4\uc11d, \ub178\ubcd1\ud76c, Geo-Cloud Space of 3D Perception for Stereoscopic Camera Navigation and Localization , INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL , Vol.14 , No.10 , pp.1 (Dec, 2011)<\/li><li>\uac15\uc9c4\uc11d, \ub178\ubcd1\ud76c, Hierarchical graphical model based object identification and categorization for smartphone , INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL , Vol.14 , No.6 , pp.2071-2086 (Jul, 2011)<\/li><li>\uae40\ubcf4\uc131, \uae40\uad11\uc218, \uc815\uc885\uad00, \ub178\ubcd1\ud76c, Label-Switched Routing Protocol with Local Multi-Paths for Reliable Message Delivery in Ubiquitous Tactical MANET Environments , INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL , Vol.14 , No.7 , pp.2251-2269 (Jul, 2011)<\/li><li>\uad6c\ud61c\ub9bc, \uac15\uc9c4\uc11d, \uae40\uad11\uc218, \ubc15\ud615\uc900, \ub178\ubcd1\ud76c, Available-Bandwidth Estimation Considering Transmission Overheads in IEEE 802.11 Wireless LANs , INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL , Vol.14 , No.7 , pp.2293-2306 (Jul, 2011)<\/li><\/ol>\n\n\n\n<h2>2009<\/h2>\n\n\n\n<ol><li>\ub178\ubcd1\ud76c, \ub958\uae30\uc5f4, \ub958\uc81c\ud0dd, Detection of SIP Flooding Attacks based on the Upper Bound of the Possible Number of SIP Messages , KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS , Vol.3 , No.5 , pp.507-526 (Oct, 2009)<\/li><\/ol>\n\n\n\n<h2>2008<\/h2>\n\n\n\n<ol><li>\ub178\ubcd1\ud76c, \uae40\uc120\ud638, Fast Detection of Distributed Global Scale Network Attack Symptoms and Patterns in High-speed Backbone Networks , KSII Transactions on Internet and Information Systems , Vol.2 , No.3 , pp.135-149 (Jun, 2008)<\/li><li>\ub178\ubcd1\ud76c, \ucd5c\uc6d0\uc900, \uc724\uba85\ucca0, Backward Channel Protection Based on Randomized Tree-Walking Algorithm and Its Analysis for Securing RFID Tag Information and Privacy , IEICE Transaction on Communications , Vol.91 , No.1 , pp.172-182 (Jan, 2008)<\/li><\/ol>\n\n\n\n<h2>2007<\/h2>\n\n\n\n<ol><li>\uc724\uba85\ucca0, \ub178\ubcd1\ud76c, A Novel Low-Power Bus Design for Bus-Invert Coding , IEICE TRANSACTIONS ON ELECTRONICS , Vol.90 , No.4 , pp.731-734 (Apr, 2007)<\/li><\/ol>\n\n\n\n<h2>2006<\/h2>\n\n\n\n<ol><li>\ub178\ubcd1\ud76c, \ucd5c\uc6d0\uc900, Backward Channel Protection Method for RFID Security Schemes Based on Tree-Walking Algorithm , Lecture Notes in Computer Science , Vol.3983 , pp.279-287 (May, 2006)<\/li><\/ol>\n\n\n\n<h2>2005<\/h2>\n\n\n\n<ol><li>\ub178\ubcd1\ud76c, \uc720\uc2b9\ud654, \uc774\ud5a5\ud0dd, \uc870\uc6a9\ud604, Energy-Efficient Cluster Reconfiguration with Fair Cluster Formations in Sensor Networks , Lecture Notes in Computer Science , Vol.3823 , pp.1118-1127 (Dec, 2005)<\/li><li>\ub178\ubcd1\ud76c, \uc190\ub300\ud64d, \uc720\uc2b9\ud654, \uc774\ud5a5\ud0dd, \uc624\uc601\ucca0, Energy-Saving Cluster Formation Algorithm in Wireless Sensor Networks , Lecture Notes in Computer Science , Vol.3794 , pp.917-926 (Dec, 2005)<\/li><li>\ub178\ubcd1\ud76c, \uae40\ud76c\uc815, \uc720\uc2b9\ud654, \uc774\uc6a9\ud658, \uc624\uc601\ucca0, Tree-Based Classification Algorithm for Heterogeneous Unique Item ID Schemes , Lecture Notes in Computer Science , Vol.3823 , No.1 , pp.1078-1087 (Dec, 2005)<\/li><li>\ub178\ubcd1\ud76c, \uc720\uc2b9\ud654, \ucd5c\uc6d0\uc900, \uc724\uba85\ucca0, A Novel Traffic Control Architecture Against Global-Scale Network Attacks in Highspeed Internet Backbone Networks , Lecture Notes in Computer Science , Vol.3391 , No.1 , pp.853-863 (Jan, 2005)<\/li><\/ol>\n\n\n\n<h2>2004<\/h2>\n\n\n\n<ol><li>\ub178\ubcd1\ud76c, \uc720\uc2b9\ud654, A Novel Detection Methodology of Network Attack Symptoms At Aggregate Traffic Level on Highspeed Internet Backbone Links , Lecture Notes in Computer Science (LNCS),Springer-Verlag , Vol.3124 , No.1 , pp.1226-1235 (Aug, 2004)<\/li><li>\ub178\ubcd1\ud76c, \uae40\ud604\uc218, \uc720\uc2b9\ud654, \uae40\ucc3d\ud638, Handoff Delay Performance Comparisons of IP Mobility Management Schemes Using SIP and MIP , Lecture Notes in Computer Science (LNCS),Springer-Verlag , Vol.3124 , No.1 , pp.997-1006 (Aug, 2004)<\/li><li>\ub178\ubcd1\ud76c, \uae40\ud604\uc218, \uc720\uc2b9\ud654, \uae40\ucc3d\ud638, SIP Signaling Performance Evaluation For Supporting Mobility in Cellular-IP Integrated Wireless Networks , Lecture Notes in Computer Science (LNCS),Springer-Verlag , Vol.3090 , No.1 , pp.231-240 (Feb, 2004)<\/li><\/ol>\n\n\n\n<h2>2003<\/h2>\n\n\n\n<ol><li>Jin-soo Kim, \ub178\ubcd1\ud76c, An Adaptive Multiplexing Algorithm of Delay-Sensitive Multiple VBR-Coded Bit Streams , Multimedia Systems , Vol.9 , No.1 , pp.68-77 (Jul, 2003)<\/li><\/ol>\n","protected":false},"excerpt":{"rendered":"<p>2026 KHALID MAIRA, MOHSIN AHMED RAZA, ALI JEHAD, Houbing Herbert Song, \ub178\ubcd1\ud76c, STEP-SAFE: Smart TinyML and Few-Shot Enabled Pedestrian and Cyclist Safety Framework for Intelligent Transportation System, IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, pp. 1-18 (Apr, 2026) 2025 MOHSIN AHMED RAZA, KHALID MAIRA, ALI JEHAD, \ub178\ubcd1\ud76c, Enhancing Driver Safety with ResNet-RG &#8211; A Deep Learning &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/?p=845\" class=\"more-link\">Read more<span class=\"screen-reader-text\"> &#8220;SCIE&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/index.php?rest_route=\/wp\/v2\/posts\/845"}],"collection":[{"href":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=845"}],"version-history":[{"count":56,"href":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/index.php?rest_route=\/wp\/v2\/posts\/845\/revisions"}],"predecessor-version":[{"id":1587,"href":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/index.php?rest_route=\/wp\/v2\/posts\/845\/revisions\/1587"}],"wp:attachment":[{"href":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mmcn.ajou.ac.kr\/wp_mmcn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}