default search action
Jang-Eui Hong
Person information
- affiliation: Chungbuk National University, Cheongju, South Korea
- affiliation (PhD 2001): KAIST, South Korea
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j28]Lkhagvadorj Munkhdalai, Tsendsuren Munkhdalai, Jang-Eui Hong, Van Huy Pham, Nipon Theera-Umpon, Keun Ho Ryu:
Discrimination Neural Network Model for Binary Classification Tasks on Tabular Data. IEEE Access 11: 15404-15418 (2023) - [j27]Manzoor Hussain, Jang-Eui Hong:
Reconstruction-Based Adversarial Attack Detection in Vision-Based Autonomous Driving Systems. Mach. Learn. Knowl. Extr. 5(4): 1589-1611 (2023) - [c34]Ahmed Ibrahum, Kwang-Ho Park, Jang-Eui Hong, Van-Huy Pham, Keun Ho Ryu:
An Extreme Gradient Boosting-based Prediction for Depression. APSIPA ASC 2023: 1607-1613 - [c33]Manzoor Hussain, Jae-Won Suh, Bo-Seok Seo, Jang-Eui Hong:
How Reliable are the Deep Learning-based Anomaly Detectors? A Comprehensive Reliability Analysis of Autoencoder-based Anomaly Detectors. ICUFN 2023: 317-322 - [c32]Zain Ul Arifeen, Jang-Eui Hong, Bo-Seok Seo, Jae-Won Suh:
Traffic Accident Detection and Classification in Videos based on Deep Network Features. ICUFN 2023: 491-493 - [i4]Manzoor Hussain, Nazakat Ali, Jang-Eui Hong:
Securing Safety in Collaborative Cyber-Physical Systems through Fault Criticality Analysis. CoRR abs/2303.05732 (2023) - 2022
- [j26]Manzoor Hussain, Nazakat Ali, Jang-Eui Hong:
DeepGuard: a framework for safeguarding autonomous driving systems from inconsistent behaviour. Autom. Softw. Eng. 29(1): 1 (2022) - [j25]Nazakat Ali, Manzoor Hussain, Jang-Eui Hong:
SafeSoCPS: A Composite Safety Analysis Approach for System of Cyber-Physical Systems. Sensors 22(12): 4474 (2022) - [j24]Manzoor Hussain, Nazakat Ali, Jang-Eui Hong:
Vision beyond the Field-of-View: A Collaborative Perception System to Improve Safety of Intelligent Cyber-Physical Systems. Sensors 22(17): 6610 (2022) - [c31]Youngjae Kim, Manzoor Hussain, Jae-Won Suh, Jang-Eui Hong:
Evaluating Correctness of Reinforcement Learning based on Actor-Critic Algorithm. ICUFN 2022: 320-325 - 2021
- [j23]Nazakat Ali, Jang-Eui Hong, Lawrence Chung:
Social network sites and requirements engineering: A systematic literature review. J. Softw. Evol. Process. 33(4) (2021) - [c30]Youngjae Kim, Nazakat Ali, Jang-Eui Hong:
Safety-based Platoon Driving Simulation with Variable Environmental Conditions. ICSOFT 2021: 558-565 - [i3]Manzoor Hussain, Nazakat Ali, Jang-Eui Hong:
DeepGuard: A Framework for Safeguarding Autonomous Driving Systems from Inconsistent Behavior. CoRR abs/2111.09533 (2021) - 2020
- [j22]Nazakat Ali, Manzoor Hussain, Jang-Eui Hong:
Analyzing Safety of Collaborative Cyber-Physical Systems Considering Variability. IEEE Access 8: 162701-162713 (2020) - [j21]Nazakat Ali, Daneth Horn, Jang-Eui Hong:
A hybrid DevOps process supporting software reuse: A pilot project. J. Softw. Evol. Process. 32(7) (2020) - [c29]Nazakat Ali, Manzoor Hussain, Youngjae Kim, Jang-Eui Hong:
A Generic Framework For Capturing Reliability in Cyber-Physical Systems. ESSE 2020: 148-153 - [c28]Haan Johng, Doohwan Kim, Grace Park, Jang-Eui Hong, Tom Hill, Lawrence Chung:
Enhancing business processes with trustworthiness using blockchain: a goal-oriented approach. SAC 2020: 61-68 - [i2]Nazakat Ali, Manzoor Hussain, Youngjae Kim, Jang-Eui Hong:
A Generic Framework For Capturing Reliability in Cyber Physical Systems. CoRR abs/2010.05490 (2020)
2010 – 2019
- 2019
- [j20]Sangwon Hwang, Jang-Eui Hong, Young-Kwang Nam:
Towards Effective Entity Extraction of Scientific Documents using Discriminative Linguistic Features. KSII Trans. Internet Inf. Syst. 13(3): 1639-1658 (2019) - [j19]Nazakat Ali, Sangwon Hwang, Jang-Eui Hong:
Your Opinions Let us Know: Mining Social Network Sites to Evolve Software Product Lines. KSII Trans. Internet Inf. Syst. 13(8): 4191-4211 (2019) - [j18]Doohwan Kim, Seungwoo Nam, Jang-Eui Hong:
A dynamic control technique to enhance the flexibility of software artifact reuse in large-scale repository. J. Supercomput. 75(4): 2027-2057 (2019) - [c27]Daneth Horn, Nazakat Ali, Jang-Eui Hong:
Automatic Identifying Interaction Components in Collaborative Cyber-Physical Systems. APSEC 2019: 197-203 - [c26]Daneth Horn, Nazakat Ali, Jang-Eui Hong:
Towards Enhancement of Fault Traceability Among Multiple Hazard Analyses in Cyber-Physical Systems. COMPSAC (2) 2019: 458-464 - [c25]Nazakat Ali, Jang-Eui Hong:
A Bird's Eye View on Social Network Sites and Requirements Engineering. ICSOFT 2019: 347-354 - [c24]Dong-Myung Kim, Hyun-Soo Kang, Jang-Eui Hong, Jae-Won Suh:
Light Field Angular Super-Resolution using Convolutional Neural Network with Residual Network. ICUFN 2019: 595-597 - [i1]Nazakat Ali, Jang-Eui Hong:
Using Social Network Service to determine the Initial User Requirements for Small Software Businesses. CoRR abs/1904.12583 (2019) - 2018
- [j17]Doohwan Kim, Jang-Eui Hong, Ilchul Yoon, Sang-Ho Lee:
Code refactoring techniques for reducing energy consumption in embedded computing environment. Clust. Comput. 21(1): 1079-1095 (2018) - [j16]Nazakat Ali, Jang-Eui Hong:
Failure Detection and Prevention for Cyber-Physical Systems Using Ontology-Based Knowledge Base. Comput. 7(4): 68 (2018) - [j15]Doohwan Kim, Jang-Eui Hong, Lawrence Chung:
Investigating relationships between functional coupling and the energy efficiency of embedded software. Softw. Qual. J. 26(2): 491-519 (2018) - 2017
- [j14]Doohwan Kim, Jae-Young Choi, Jang-Eui Hong:
Evaluating energy efficiency of Internet of Things software architecture based on reusable software components. Int. J. Distributed Sens. Networks 13(1) (2017) - [j13]Jaekwon Lee, Kisub Kim, Yonghyeon Lee, Jang-Eui Hong, Young-Hoon Seo, Byung-Do Yang, Woosung Jung:
Extracting the Source Code Context to Predict Import Changes using GPES. KSII Trans. Internet Inf. Syst. 11(2): 1234-1249 (2017) - [c23]Doohwan Kim, Jang-Eui Hong:
The microComponent and Its Extension Patterns for Flexible Reuse of Software Artifacts. CSA/CUTE 2017: 1084-1090 - [c22]Seungwoo Nam, Doohwan Kim, Jang-Eui Hong:
Using Code Skeleton Patterns for Open Source Reuse. CSA/CUTE 2017: 1091-1096 - [c21]Grace Park, Fadoua Fellir, Jang-Eui Hong, José Luis Garrido, Manuel Noguera, Lawrence Chung:
Deriving use cases from business processes: a goal-oriented transformational approach. SAC 2017: 1288-1295 - 2016
- [j12]Jang Jin Kwon, Jang-Eui Hong, Lawrence Chung:
Collision detection and resolution of hazard prevention actions in safety critical systems. J. Syst. Softw. 118: 1-18 (2016) - [c20]Doohwan Kim, Soon-Kyeom Kim, Woosung Jung, Jang-Eui Hong:
A Context-Aware Architecture Pattern to Enhance the Flexibility of Software Artifacts Reuse. CSA/CUTE 2016: 654-659 - [c19]Jaekwon Lee, Kisub Kim, Jang-Eui Hong, Woosung Jung:
A Distributed Survey Automation Based on a Customizable Form Template. CSA/CUTE 2016: 912-919 - [c18]Grace Park, Lawrence Chung, Jang-Eui Hong, José Luis Garrido, Manuel Noguera:
Problem-Aware Traceability in Goal-Oriented Requirements Engineering. SEKE 2016: 569-574 - 2015
- [j11]Doohwan Kim, Jang-Eui Hong:
ESUML-EAF: a framework to develop an energy-efficient design model for embedded software. Softw. Syst. Model. 14(2): 795-812 (2015) - 2014
- [c17]Jae Jin Park, Jang-Eui Hong, Sang-Ho Lee:
Investigation for Software Power Consumption of Code Refactoring Techniques. SEKE 2014: 717-722 - [c16]Jang Jin Kwon, Doohwan Kim, Jae Jin Park, Jang-Eui Hong:
Collision Analysis of Safety Devices to Prevent Hazards in Safety Critical Systems. SERE 2014: 245-254 - 2012
- [j10]Man-Geun Ko, Jang-Eui Hong, Jae-Won Suh:
Error detection scheme for the H.264/AVC using the RD optimized motion vector constraints. IEEE Trans. Consumer Electron. 58(3): 955-962 (2012) - [c15]Man-Geun Ko, Jang-Eui Hong, Jae-Won Suh:
H.264/AVC error detection scheme using fragile data hiding in motion vector set. ICCE 2012: 237-238 - [c14]Jong-Phil Kim, Jin-Soo Park, Jang-Eui Hong:
Aspect-based On-the-Fly Testing Technique for Embedded Software. ICSOFT 2012: 375-380 - [c13]Jong-Phil Kim, Jang-Eui Hong, Jae-Young Choi, Young-Hwa Cho:
Dynamic service orchestration for SaaS application in web environment. ICUIMC 2012: 43:1-43:6 - 2011
- [j9]Jong-Phil Kim, Dong-Hyuk Sung, Jang-Eui Hong:
Performance Testing of Composite Web-Service with Aspect-Based WS-BPEL Extension. KSII Trans. Internet Inf. Syst. 5(10): 1841-1861 (2011) - [j8]Tae-Jung Kim, Jang-Eui Hong, Jae-Won Suh:
Fast mode decision for combined scalable video coding based on the block complexity function. IEEE Trans. Consumer Electron. 57(1): 247-252 (2011) - [c12]Man-Geun Ko, Jae-Won Suh, Jang-Eui Hong:
Error detection scheme based on fragile watermarking for H.264/AVC. ICASSP 2011: 1061-1064 - [c11]Doohwan Kim, Jong-Phil Kim, Jang-Eui Hong:
A Power Consumption Analysis Technique Using UML-Based Design Models in Embedded Software Development. SOFSEM 2011: 320-331 - [c10]Jong-Phil Kim, Jang-Eui Hong:
Dynamic Service Replacement to Improve Composite Service Reliability. SSIRI 2011: 182-188 - 2010
- [j7]Ah-Rim Han, Sang-Uk Jeon, Doo-Hwan Bae, Jang-Eui Hong:
Measuring behavioral dependency for improving change-proneness prediction in UML-based design models. J. Syst. Softw. 83(2): 222-234 (2010)
2000 – 2009
- 2009
- [j6]Sang-Uk Jeon, Jang-Eui Hong, In-Gwon Song, Doo-Hwan Bae:
Developing platform specific model for MPSoC architecture from UML-based embedded software models. J. Syst. Softw. 82(10): 1695-1708 (2009) - [j5]Tae-Jung Kim, Jang-Eui Hong, Jae-Won Suh:
A fast intra mode skip decision algorithm based on adaptive motion vector map. IEEE Trans. Consumer Electron. 55(1): 179-184 (2009) - [c9]Doohwan Kim, Jong-Phil Kim, Jang-Eui Hong:
Practice Patterns to Improve the Quality of Design Model in Embedded Software Development. QSIC 2009: 179-184 - 2008
- [c8]Ah-Rim Han, Sang-Uk Jeon, Doo-Hwan Bae, Jang-Eui Hong:
Behavioral Dependency Measurement for Change-Proneness Prediction in UML 2.0 Design Models. COMPSAC 2008: 76-83 - 2007
- [j4]In-Gyu Kim, Doo-Hwan Bae, Jang-Eui Hong:
A component composition model providing dynamic, flexible, and hierarchical composition of components for supporting software evolution. J. Syst. Softw. 80(11): 1797-1816 (2007) - 2006
- [c7]Sang-Uk Jeon, Jang-Eui Hong, Doo-Hwan Bae:
Using Operational Architecture to Model Embedded Software. APSEC 2006: 157-164 - [c6]Hee-Jin Lee, In-Gwon Song, Sang-Uk Jeon, Doo-Hwan Bae, Jang-Eui Hong:
Modelling the unexpected behaviours of embedded software using uml sequence diagrams. ICSOFT (1) 2006: 257-262 - [c5]Sang-Uk Jeon, Jang-Eui Hong, Doo-Hwan Bae:
Interaction-Based Behavior Modeling of Embedded Software using UML 2.0. ISORC 2006: 351-358 - [c4]In-Gyu Kim, Tegegne Marew, Doo-Hwan Bae, Jang-Eui Hong, Sang-Yoon Min:
Dimensions of Composition Models for Supporting Software Evolution. SC@ETAPS 2006: 211-226 - 2001
- [j3]Jang-Eui Hong, Doo-Hwan Bae:
High-level Petri net for incremental analysis of object-oriented system requirements. IEE Proc. Softw. 148(1): 11-18 (2001) - [j2]Jang-Eui Hong, Doo-Hwan Bae:
Incremental Scenario Modeling Using Hierarchical Object-Oriented Petri Net. Int. J. Softw. Eng. Knowl. Eng. 11(3): 357-386 (2001) - 2000
- [j1]Jang-Eui Hong, Doo-Hwan Bae:
Software modeling and analysis using a hierarchical object-oriented Petri net. Inf. Sci. 130(1-4): 133-164 (2000) - [c3]In-Gyu Kim, Jang-Eui Hong, Doo-Hwan Bae, Ik-Joo Han, Cheong Youn:
Scalable Mobile Agents Supporting Dynamic Composition of Functionality. Agents Workshop on Infrastructure for Multi-Agent Systems 2000: 199-213
1990 – 1999
- 1999
- [c2]Joon-Sang Lee, Tae-Ho Kim, Gwang Sik Yoon, Jang-Eui Hong, Sung Deok Cha, Doo-Hwan Bae:
Developing Distributed Software Systems by Incorporating Meta-Object Protocol (diMOP) with Unified Modeling Language (UML). ISADS 1999: 65-72 - 1998
- [c1]Nam Hee Lee, Jang-Eui Hong, Sung Deok Cha, Doo-Hwan Bae:
Towards Reusable Colored Petri Nets. PDSE 1998: 223-229
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint