Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yunsik Son is active.

Publication


Featured researches published by Yunsik Son.


International Journal of Grid and Distributed Computing | 2018

Hybrid Deep Neural Network based Performance Estimation Method for Efficient Offloading on IoT-Cloud Environments

Yunsik Son; Seman Oh; YangSun Lee

The IoT-Cloud virtual machine system is a cloud-based execution solution for IoT devices with offloading techniques that delegate tasks requiring high computing power from low-performance IoT devices to a high-performance cloud environment as a service. The IoT devices with the IoT-Cloud virtual machine system can perform complex tasks using the computing power of high-performance cloud. The offloading technique can reduce the execution performance depending on the workload of the IoT devices and the clouds. Therefore, it is necessary to decide offloading execution considering the workload of the IoT devices and the clouds. In this paper, CPU utilization trend, which is one of the workload indices, is predicted through deep learning in order to decide offloading execution considering the workload of the IoT devices and clouds. In this paper, we present four CPU usage models and introduce a technique for predicting server load based on hybrid deep neural network. The predicted CPU utilization trend is indicative of future CPU utilization information and is therefore an indicator for offloading execution decisions. Through experiments, we confirmed that the proposed method estimates the load of the model very similar, and it can apply the offloading adaptively according to the load of the server.


Proceedings of the International Conference on Advances in Image Processing | 2017

The x86/64 Binary Code to Smart Intermediate Language Translation for Software Weakness

Junho Jeong; Yunsik Son; Seman Oh

Today, the proportion of software in society as a whole is steadily increasing. In addition to size of software increasing, the number of cases dealing with personal information is also increasing. This shows the importance of weekly software security verification. However, software security is very difficult in cases where libraries do not have source code. To solve this problem, it is necessary to develop a technique for checking existing binary security weaknesses. To this end, techniques for analyzing security weaknesses using intermediate languages are actively being discussed. In this paper, we propose a system that translate binary code to intermediate language to effectively analyze existing security weaknesses within binary code.


international conference on ubiquitous and future networks | 2018

An Ahead-of-Time Compiler System for the IoT-Cloud Virtual Machine

Juho Jeong; Yunsik Son; YangSun Lee


Archive | 2018

A Context Synchronization Method to Reduce Offloading Network Overhead for IoT-Cloud Virtual Machine System

Junho Jeong; Yunsik Son; Yangsun Lee


International Journal of Software Engineering and Knowledge Engineering | 2018

A Type Information Reconstruction Scheme Based on Long Short-Term Memory for Weakness Analysis in Binary File

Junho Jeong; YangSun Lee; Uduakobong George Offong; Yunsik Son


International Journal of Grid and Distributed Computing | 2018

A Study of Partial Image Classification of Vehicles Using Finger Gestures

Junho Jeong; Jun Young Lee; Yunsik Son


International Journal of Grid and Distributed Computing | 2018

A Dynamically Linked Library Based Indirect Call Function Analysis for Detecting Banned API Usage in Binary Code

Junho Jeong; Yunsik Son


International Journal of Grid and Distributed Computing | 2018

Design and Implementation of the Intelligent Convergence Security System for Hazard Event on IoT Environments

Junho Jeong; Dong Ha Park; Jun Young Lee; Uduakobong George Offong; Seman Oh; Yunsik Son


multimedia and ubiquitous engineering | 2017

Intermediate Language Translation and Evaluation for Binary Code Software Weakness Analysis

Junho Jeong; Yunsik Son; Seman Oh


International Journal of Software Engineering and its Applications | 2017

Binary Code Software Weakness Analysis Method based on Smart Intermediate Language in Embedded Environment

Junho Jeong; Yunsik Son; Seman Oh

Collaboration


Dive into the Yunsik Son's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge