James Won‐Ki Hong
YOU?
Author Swipe
View article: A Comprehensive Survey on LLM‐Based Network Management and Operations
A Comprehensive Survey on LLM‐Based Network Management and Operations Open
The growing demands for network capacity and the increasing complexities of modern network environments pose significant challenges for effective network management and operations. In response, network operators and administrators are movi…
View article: Radiographic Assessment of Successful Lumbar Spinal Fusion: A Systematic Review of Fusion Criteria in Randomized Trials
Radiographic Assessment of Successful Lumbar Spinal Fusion: A Systematic Review of Fusion Criteria in Randomized Trials Open
Study Type Systematic Scoping Review. Introduction Radiographic assessment is crucial for diagnosing symptomatic pseudarthrosis and evaluating spinal fusion outcomes, yet no consensus exists on defining successful lumbar fusion. This scopi…
View article: A Cellular Network Resource Allocation Strategy Based on D2D Communication
A Cellular Network Resource Allocation Strategy Based on D2D Communication Open
To address the problems of system capacity reduction due to high system interference in highway vehicular communication scenarios, a resource allocation strategy for cellular vehicular communication based on device‐to‐device (D2D) communic…
View article: Muno: Improved Bandwidth Estimation Scheme in Video Conferencing Using Deep Reinforcement Learning
Muno: Improved Bandwidth Estimation Scheme in Video Conferencing Using Deep Reinforcement Learning Open
Many studies have used machine learning techniques for bitrate control to improve the quality of experience (QoE) of video streaming applications. However, most of these studies have focused on HTTP adaptive streaming with one‐to‐one conne…
View article: Log‐TF‐IDF and NETCONF‐Based Network Switch Anomaly Detection
Log‐TF‐IDF and NETCONF‐Based Network Switch Anomaly Detection Open
In this study, we propose and evaluate a model that utilizes both log data and state data to detect abnormal conditions in network switches. Building upon our previous research and drawing inspiration from TF‐IDF used in natural language p…
View article: Polarization Imaging Method for Detection of Lung Cancer Based on Symmetrical Single <scp>LCVR</scp>
Polarization Imaging Method for Detection of Lung Cancer Based on Symmetrical Single <span>LCVR</span> Open
Lung cancer ranks among the three most prevalent cancers worldwide. Polarization imaging technology can effectively distinguish between cancerous and normal tissues. The most commonly applied method for cancer detection is the dual‐rotatin…
View article: Intent‐Based Network Configuration Using Large Language Models
Intent‐Based Network Configuration Using Large Language Models Open
The increasing scale and complexity of network infrastructure present a huge challenge for network operators and administrators in performing network configuration and management tasks. Intent‐based networking has emerged as a solution to …
View article: SoccerNet 2024 Challenges Results
SoccerNet 2024 Challenges Results Open
The SoccerNet 2024 challenges represent the fourth annual video understanding challenges organized by the SoccerNet team. These challenges aim to advance research across multiple themes in football, including broadcast video understanding,…
View article: Innovations in Blockchain for Crypto Assets and Exchanges
Innovations in Blockchain for Crypto Assets and Exchanges Open
This special issue contains extended versions of the best papers from the IEEE CryptoEx 2023 workshop (https://icbc2023.ieee-icbc.org/workshop/cryptoex-2023), which was held as a co-located workshop with 2023 IEEE International Conference …
View article: End-to-End Verifiable Decentralized Federated Learning
End-to-End Verifiable Decentralized Federated Learning Open
Verifiable decentralized federated learning (FL) systems combining blockchains and zero-knowledge proofs (ZKP) make the computational integrity of local learning and global aggregation verifiable across workers. However, they are not end-t…
View article: Learning Subject-Aware Cropping by Outpainting Professional Photos
Learning Subject-Aware Cropping by Outpainting Professional Photos Open
How to frame (or crop) a photo often depends on the image subject and its context; e.g., a human portrait. Recent works have defined the subject-aware image cropping task as a nuanced and practical version of image cropping. We propose a w…
View article: Self-Supervised Anomaly Detection Using Outliers for Multivariate Time Series
Self-Supervised Anomaly Detection Using Outliers for Multivariate Time Series Open
Due to the difficulty of having sufficient labeled data, self-supervised learning (SSL) has recently got much attention by many researchers in time series anomaly detection. The generative adversarial network (GAN) based autoencoder model,…
View article: Learning Subject-Aware Cropping by Outpainting Professional Photos
Learning Subject-Aware Cropping by Outpainting Professional Photos Open
How to frame (or crop) a photo often depends on the image subject and its context; e.g., a human portrait. Recent works have defined the subject-aware image cropping task as a nuanced and practical version of image cropping. We propose a w…
View article: Survey on blockchain‐based non‐fungible tokens: History, technologies, standards, and open challenges
Survey on blockchain‐based non‐fungible tokens: History, technologies, standards, and open challenges Open
This paper presents a survey of non‐fungible tokens (NFTs), including its history, technologies, standards, and challenges in their development. An NFT is a unique digital entity that is created and maintained using blockchain technology. …
View article: Designing a Virtual Practicum to Prepare Teachers for Online Instruction
Designing a Virtual Practicum to Prepare Teachers for Online Instruction Open
Online courses are growing rapidly in K-12, but teachers often receive no preparation for teaching in these environments. While field experiences in virtual schools may be useful, very few teacher education programs offer such an opportuni…
View article: Spotting Temporally Precise, Fine-Grained Events in Video
Spotting Temporally Precise, Fine-Grained Events in Video Open
We introduce the task of spotting temporally precise, fine-grained events in video (detecting the precise moment in time events occur). Precise spotting requires models to reason globally about the full-time scale of actions and locally to…
View article: Design of Blockchain-based Travel Rule Compliance System
Design of Blockchain-based Travel Rule Compliance System Open
In accordance with the guidelines of the Financial Action Task Force (FATF), Virtual Asset Service Providers (VASPs) should comply with a `travel rule', which requires them to exchange originator's and beneficiary's personal information wh…
View article: DeTRM: Decentralised Trust and Reputation Management for Blockchain-based Supply Chains
DeTRM: Decentralised Trust and Reputation Management for Blockchain-based Supply Chains Open
Blockchain has the potential to enhance supply chain management systems by providing stronger assurance in transparency and traceability of traded commodities. However, blockchain does not overcome the inherent issues of data trust in IoT …
View article: Video Pose Distillation for Few-Shot, Fine-Grained Sports Action Recognition
Video Pose Distillation for Few-Shot, Fine-Grained Sports Action Recognition Open
Human pose is a useful feature for fine-grained sports action understanding. However, pose estimators are often unreliable when run on sports video due to domain shift and factors such as motion blur and occlusions. This leads to poor accu…