Daeyoung Kim

Learn More
We developed a ubiquitous healthcare system consisted of a physiological signal devices, a mobile system, a device provider system, a healthcare service provider system, a physician system, and a healthcare personal system. In this system, wireless body area network (WBAN) such as ZigBee is used to communicate between physiological signal devices and the(More)
This paper addresses the problem of detecting plagiarized mobile apps. Plagiarism is the practice of building mobile apps by reusing code from other apps without the consent of the corresponding app developers. Recent studies on third-party app markets have suggested that plagiarized apps are an important vehicle for malware delivery on mobile phones.(More)
In Wireless Body Area Network (WBAN), detection of fault node improves reliability and security for long range transmission. In this paper, we propose a combined approach for reliable and secured data transmission in WBAN. The proposed architecture consists of sensor nodes, relay nodes, the intermediate processing nodes and body area network (BAN)(More)
Smart personal devices equipped with a wide range of sensors and peripherals can potentially be misused in various environments. They can be used to exfiltrate sensitive information from enterprises and federal offices or be used to smuggle unauthorized information into classrooms and examination halls. One way to prevent these situations is to regulate how(More)
Porting mobile applications (apps) from one platform to another is one strategy used by developers to write cross-platform apps. One challenging task in porting is transforming the app so as to use the appropriate platform-specific APIs. We have proposed a novel approach to extract functionally equivalent API methods of two platforms that simplifies this(More)
Smart personal devices equipped with a wide range of sensors and peripherals can potentially be misused in various environments. They can be used to exfiltrate sensitive information from enterprises and federal offices or be used to smuggle unauthorized information into classrooms and examination halls. One way to prevent these situations is to regulate how(More)
— " What would have happened, had I taken the alternative route? " This is a question that many drivers often ponder, hoping that their chosen route is the best. This paper proposes DoppelDriver, a system that attempts to answer such questions on non-chosen alternative routes to a given destination by determining actual times of arrival (ATAs) from(More)