|Directions||(information) 27304 Direction|
|BS Mathematics, Sungkyunkwan University, 1988|
|MS Computer Science, University of Texas at Dallas, 1990|
|PhD Computer Science and Engineering, University of Texas at Arlington, 1996|
Data (Medical, Network, Facial, Life log) Manipulation and Learning
Data preprocessing and manipulation is the most essential part of the recent deep learning technologies. Data in different areas requires various pre-processing tasks depending on their characteristics or purpose of use. For example, to create a sharp macular image from an ultra-wide-angle fundus image, we rotate, transform, and adjust the original image. We aim to automate the process of fine-tuning the position of the macula, nerve papillae, and blood vessels by matching the size and resolution of the photo with the paired dataset of an existing fundus photo and an ultra-wide fundus photo. This process is largely divided into two steps. First, scaling is a process of adjusting the size of the image by cropping a picture centering on the macula. Second, warping is a process of fine-tuning so that the position of the macula, nerve nipples, and blood vessels of a pair of photos are the same.
The rapid growth of computing power and wireless technology has spurred new technologies such as the massive adoption of mobile devices, the increase in mobile content and services, and the Internet of Things (IoT). As a result, research fields are being actively conducted to extract information by processing data in numerous mobile and network fields. Our researches include modeling user mobility data for GAN-based predictions and constructing discretization and continuity (comprehensive) network dataset for deep learning.
Facial images are particularly challenging subjects in computer vision. A wide spectrum of information including identity, gender, mood, age, and race can be perceived by looking at a single face image. The fact that many contests in the computer vision field are specifically focused on face-related applications (such as face recognition, verification, detection, and so on) is an indication of the distinct difficulties encountered when dealing with facial images. For instance, some topics include transforming face images in terms of attributes, pose, emotion and expressions, predicting facial age progression, and making generated images more realistic.
Lifelogging represents a phenomenon whereby people can digitally record their own daily lives in varying amounts of detail, for a variety of purposes. The record contains a comprehensive dataset of a human’s activities. The data could be used to increase knowledge about how people live their lives. Lifelogging may offer benefits to content-based information retrieval, contextual retrieval, browsing, search, linking, summarization and user interaction. However, there are challenges in managing, analyzing, indexing and providing content-based access to streams of multimodal information derived from lifelog sensors which can be noisy, error-prone and with gaps in continuity due to sensor calibration or failure. We study to select, transform, and archive the valuable and informative records from the huge amount of lifelog data.
Medical Image Processing (Fundus, Bone)
Medical Imaging refers to handling medical images by using the computer. It is mainly applied to various applications such as diagnosis and analysis using computer vision and machine learning technology. Medical images are good for research because they have been accumulated for a long time and are relatively refined. It is very different from ordinary photographs and requires collaboration with doctors for accurate analysis. Our research has developed a bone age prediction program using X-ray images. We are also working on a macular image transformation system using fundus images. The fundus image can observe symptoms of systemic diseases such as diabetes and high blood pressure. Moreover, the examination is relatively easy since diagnosis is possible with only one fundus image. Our research is to restore the image around the macula from an ultra-wide-angle fundus photograph to the existing fundus photograph taken through mydriasis examination by exploiting deep learning technologies such as Generative Adversarial Networks (GAN). If a desired level of macular image can be obtained, it is expected that diagnosis will be possible with only wide-angle fundus photographs without mydriasis examination that makes the patients uncomfortable. Another research is to predict developmental status from bone age diagnosis. We study a deep feature fusion based on contrast enhancement and superpixels for bone age diagnosis. The key idea is that the area containing information on bone ages in X-ray images is limited, and features extracted from low contrast X-ray images can lead to poor final bone age diagnostic performance. The deep feature fusion based on contrast enhancement and superpixel method is expected to improve the accuracy of bone age diagnosis. Our research is not limited to this, we aim to develop various techniques of creating visual representations of the interior of a body for clinical analysis and medical intervention, as well as visual representation of the function of some organs or tissues.
Generative Adversarial Learning in Networking
Generative Adversarial Network (GAN) driven deep learning approaches have gained attention due to their excellent results. Applications of GAN can be found in data augmentation, privacy preserving, anomaly detection, discriminative modeling, but for networking, they are still in nascent stages. GAN consists a generator and a discriminator connected together in an adversary mode. The generator generates new data instances and the discriminator evaluates them for authenticity. The data distributional learning capability of such generator is useful for optimization problems with dynamic and sparse data. We are exploiting these characteristics of GAN to implement intelligent networking solutions with intention to move towards autonomous networks. In particular, we are currently working on proactive mobility for 5G, where GAN is used to predict next attachment point of the user and handover instant from one attachment point to the next. The results of our model show substantial improvement comparing to state-of-the-art deep learning solutions.
Reinforcement Learning for MEC Management
Multi-access Edge Computing (MEC) is a paradigm which moves the capabilities of the central cloud closer to users. In this paradigm, miniaturized and distributed clouds are deployed at the network edge to accelerate conventional services such as live video streaming and healthcare, and also to offer innovative services such as online mobile gaming. Challenges regarding MEC management include computation offloading, allocation of computing resource, and mobility management. We employ the reinforcement learning technique for the MEC management since it tolerates noisy inputs and works well under diverse conditions of not only users geographic distribution but also their varying requirements. The general idea of reinforcement learning is that by gradually interaction with the environment, agent will be able to make better decisions using the past experience. At the initial state, the agent rarely has the idea about how to take action or even what the task is. Then according to agent performance of this task, it will obtain a reward as the feedback. Theoretically, agent could make the optimal decisions if it can explore whole states and obtain corresponding values of its action.
Intelligent Internet of Things
IoT systems can be classified into massive IoT, which requires high scalability, and critical IoT, which basically demands high availability, reliability, and low latency. Especially, the 6G paradigm will accommodate a huge number of devices, in which handling data generated from such devices are a lot more challenging than ever. For this reason, integrating Artificial Intelligence (AI) has become a must to boost the capabilities of IoT systems and applications by automating the decision making. The IoT, in turn, improves the value of AI by allowing real-time connectivity and data communication. In this exchange, the data must be concise, therefore, anomaly cognition is one of the most crucial requirements in the Intelligent Internet of Things. Anomaly cognition includes detection, prediction, and identification of the data faults and cyber-attacks.
Network Softwarization (NetSoft – SDN/NFV)
Network softwarization is an approach in which network control, management, and functions are decoupled from the data plane (i.e., network elements) and softwarized in a central control plane. Software-defined Networking (SDN) and Network Function Virtualization (NFV) technologies together achieves fully softwarized networks. SDN decouples the control plane of underlying network elements and centralized it in a controller. The controller in SDN decides how traffic is controlled in a network, and to do so it requires some method to communicate with the data plane. One such mechanism is OpenFlow, which is the first standard communication interface defined between the control and forwarding layers of an SDN architecture. Our research in SDN consists of but is not limited to network protection, efficient video streaming, flow table management, and software-defined mobility.
Network-function virtualization (NFV) uses technologies like virtual machines or containers to virtualize entire classes of network node functions into building blocks that may be connected, or chained, to create communication services. A virtualized network function, or VNF, may consist of one or more virtual machines running different software and processes, on top of standard high-volume servers, switches and storage, or even cloud computing infrastructure, instead of having custom hardware appliances for each network function. Our research in NFV consists of but is not limited to network slicing based 5G architecture, admission control in network slicing, empirical comparison of virtualization technologies, and efficient monitoring system for VNFs.
Autonomous Ad hoc Sensor Networks
A wireless ad hoc network is a decentralized type of wireless network, in which the network does not rely on a pre-existing infrastructure. Instead, each node participates in routing by forwarding data for other nodes, and so the determination of which nodes forward data is made dynamically based on the network connectivity. Ad hoc sensor networks can be very effective in disseminating and collecting sensory data, providing a digital sense of the environmental conditions to smart applications. Herein, spatially distributed autonomous sensors cooperatively pass their sensed data through the network to a base station. The research challenges are now driven toward the speed of collection and reliability under realistic changeable wireless medium condition, given diverse underlying emerging technologies, such as energy harvesting and multi-channel. Today, such networks play a vital role to realize the coming 5th industrial revolution.
Human-X-Interactions (X: Computer, Robot, Things, Energy)
Technology is becoming ubiquitous in our daily lives, and human interaction is no longer limited with only computers but has extended to all kind of devices like smart phones, smart homes, smart virtual assistants, and smart vending machines etc. Form factors and interfaces of all these devices are very different from each other and that requires more innovative ways of human interaction to enhance user experience. With widespread adoption of smart phones, users’ intuitive nature towards forms of interactions has significantly evolved. In Human-X-Interaction studies we investigate this evolution of human nature to understand what kind of interactions will be perceived intuitive in future and how interfaces must be evolved to provide seamless experience. In particular, research in intuitive interaction interfaces for variety of smart homes IoT devices and industry 4.0 robotics has significant importance in near future.
M. L. Gavrilova, O. Gervasi, V. Kumar, A. Lagana, H. Choo, Y. Mun, D. Tanier, C. J. K. Tan, “Computational Science and Its Applications” – IEEE International Conference on CommunicationsSA 2006 (Part I, II, III, IV, V) Lecture Notes in Computer Science, Vol. 3980, 3981, 3982, 3983, 3984 Springer- Verlag
|과기정통부 ICT명품인재양성사업 사업단장|
|미래부 Grand-ITRC 센터장|
|Editor of International Journal of Distributed Sensor Networks|
|한국 네트워크 산업협회 SDN/NFV 포럼 분과장|
|한국 정보과학회 이사|
|과기정통부 재정지원사업 자체평가위원|
|Editor of The Journal of Supercomputing|
|Editor of KSII Transactions on Internet and Information Systems|
|성균관대학교 정보통신대학 부학장|
|2019.04||정보통신기획평가원 추진실적 평가부문 우수상|
|2016.07||HCI International 2016 Best Paper Award|
|2016.04||한국정보처리학회 춘계학술대회 최우수논문상|
|2015.06||Best Paper Award in the International Conference on Computational Science and Its Applications (ICCSA) 2015|
|2014.06||한국연구재단 감사장 (기초연구본부 전자정보∙융합연구단 전문위원 재임2010-2014)|
|2013.01||컨버전스연구소 2012년 성균관대 교내부설 연구기관 우수 연구기관 선정|
|2011.12||한국연구재단 2011년 기초연구사업 우수평가자|
|2010.12||교육과학기술부 국가연구개발 우수성과 100선 선정|
|2010.09||한이음 일자리 엑스포 2010 작품 공모전 대학원부문 최우수상(정보통신산업진흥원)|
|2010.04||성균관대 산학협력중심대학육성사업 기술개발 우수 과제|
|2008.02||Recognition of Service Award in Appreciation for Contributions to ACM|
|2008.01||Listed in The Marquis Who’s Who Publications Board|
|2006.06||성균관대 정보통신공학부 논문부분 최우수교수상|
|2005.12||BK21 우수사업단 선정(사업팀장) – 부총리상|
|2005.05||성균관대 정보통신공학부 논문부분 최우수교수상|
|2004.05||성균관대 정보통신공학부 논문부분 최우수교수상, 교육부분 최우수교수상|
|2003.05||한국인터넷정보학회 춘계학술대회 최우수논문상|
|2002.07||IASTED WOC 2002 최우수논문발표|
|2001.05||한국인터넷정보학회 춘계학술대회 최우수논문상|
|2012.01||컴퓨터네트워크, McGraw Hill|
|2006.02||마스터링 MATLAB 7, 대광서림|
|2005.02||최신컴퓨터개론 8판, 홍릉과학출판사|
|2004.02||이산구조론 5판, SciTech|
|2001.02||이산구조론 4판, SciTech|
|2000.08||정보공학입문, 성균관대학교 출판부|