Publications

International and domestic journals, conferences, and patents

International Papers
No. Type Details
[3]

[2] Conference
BK/Short
S. Yun and K. Kang*, "Runtime WCET Estimation Using Machine Learning," in 29th ACM/SIGMOBILE Annu. Int. Conf. Mobile Comput. Netw. (MobiCom), 2023.

Accurate task execution time estimation is vital for efficient and dependable operation of safety-critical systems. However, modern automotive functions' complexity challenges conventional estimation methods. To address this, we propose a novel technique that combines execution time and job sequence data using a multi-layer perceptron (MLP) neural network. Leveraging MLP's capabilities, our approach achieves impressive 99.7% prediction accuracy with a mere 38.33 μs latency. Integrating our technique into safety-critical systems optimizes resource allocation and scheduling, enhancing performance and reliability. Importantly, our method extends beyond automotive systems, finding potential in diverse safety-critical domains. By precisely estimating task execution time, we enhance operational efficiency and decision-making in complex systems.

[1] Conference
BK-listed
J. Won§, J. Ahn§, S. Yun, J. Kim, and K. Kang*, "Spidermine: Low Overhead User-Level Prefetching," in Proc. 38th ACM/SIGAPP Symp. Appl. Comput. (SAC), 2023.

Spidermine monitors the rate at which read requests are issued by an application, and thus detects bursts of disk reads. It then determines an address at which to insert a breakpoint into the application code or a library before each burst, and logs each breakpoint, together with the data required for the subsequent burst. When the application is subsequently run, Spidermine inserts breakpoints at each logged address by temporarily replacing the instruction. Spidermine is then invoked at each breakpoint, and prefetches the corresponding data blocks into the page cache. This use of breakpoints as triggers for prefetching eliminates the need for monitoring to determine when to prefetch data during program execution. Also, by operating at the user level, Spidermine avoids interference with other applications. Experiments on 11 benchmark applications demonstrated that Spidermine can reduce the time for launch by up to 54.1%, and for run-time data-loading by up to 70.1% on a hard disk drive, 13.3% and 47.0% respectively, on a solid-disk drive.

Domestic Papers
No. Type    Details
[10] Conference H. Kang, S. Yun, and K. Kang*, "Enhancing Cloud Speech Recognition Service Using Adverserial Attacks," in Proc. Symp. Korean Inst. Commun. Inf. Sci. (KICS), 2024, pp. 577-578.

Cloud-based speech recognition services pose privacy risks due to potential exposure of users' personal or sensitive information. To address these privacy concerns, this paper proposes a novel privacy-enhancing method leveraging adversarial attack techniques. Our method applies Gaussian noise-based adversarial examples to input speech signals, obfuscating personal information while preserving speech transcription accuracy. We evaluate the trade-off between privacy preservation and speech transcription accuracy through experiments utilizing the wav2vec 2.0 model for speech recognition and x-vector embeddings for speaker recognition. Experimental results demonstrate that with a 20% noise ratio, the word error rate (WER) remains stable at 0.28, whereas speaker recognition accuracy significantly decreases to 4.5%, effectively enhancing privacy.

[9] Thesis
Master
S. Yun, "Runtime WCET Determination for Real-Time Scheduling Using Machine Learning," M.A.I. thesis, Dept. Applied Artificial Inteligence, Hanyang Univ., Seoul, Republic of Korea, 2023.

Determining the precise worst-case execution time has proven difficult due to the tasks’ increasing complexity (WCET). Inaccurate WCET estimations cause deadline misses, which may result in catastrophic accidents. This can be particularly fatal in the safety-critical systems. In this thesis, a scheduling methodology based on machine learning that can dynamically forecast the WCET of a job has been presented. Since it takes into account both the execution time and job sequence, the proposed method can accurately predict the amount of time needed to finish a task. It employs machine learning to compute the task’s progress rate and allow additional time for execution before the deadline when a task has reached its predetermined bound without being completed, which can prevent a deadline miss caused by inaccurate WCET determination. Additionally, it can reduce the sacrifice of low-criticality tasks by optimizing the HI-mode that guarantees the execution of high-criticality tasks by preempting low-criticality tasks in mixed-criticality systems. This preserves functional safety of the low-criticality task. For the evaluation, C benchmarks and Linux systems were used to investigate the trade-offs between the latency and the accuracy of the proposed technique. The result shows the simple linear regression by ordinary least squares (OLS) with the coefficient of determination (R2) as a percentage was 82%. However, the proposed technique was approximately 99.7% prediction accuracy. This was 3.83% scheduling overhead based on a period of 1 ms in a real automotive task.

[8] Conference S. Yun, J. Lim, and K. Kang*, "Analysis of Trade-off between Period Transformation and Scheduling Overhead in Mixed-Criticality System," in Proc. Korea Soc. Comput. Inf. Conf. (KSCI), 2022, vol. 30, no. 2, pp. 3-5.

Mixed criticality systems have additional safety requirements to prioritize safety-critical functions. However, the design of traditional real-time systems is not satisfactory, and high-criticality tasks may interfere with other low-criticality tasks, resulting in criticality inversion problems such as deadline misses. Although period transformation techniques may be used to solve this criticality inversion problem, an increase in scheduling overhead leads to another problem in which the overall response time of the task increases. In this study, the trade-off relationship between period transformation and scheduling overhead is explained, and an experiment is conducted to analyze the appropriate line of period transformation after reproducing the problem in real-time Linux systems. As a result, it was confirmed that when the period transformation to solve the criticality inversion problem is applied as it is, the overall response time is increased due to an increase in context change by 48.7% and scheduling overhead by 28.7%.

[7] Journal
KCI-listed
W. Kim, H. Ham, S. Yun, and W. Lee*, "A Design and Implementation of Speech Recognition and Synthetic Application for Hearing-Impairment," in J. Korea Soc. Comput. Inf. (JKSCI), 2021, vol. 26, no. 12, pp. 105-110.

In this paper, we design and implement an Android mobile application that helps hearing impaired people communicate based on STT(Speech-to-Text) and TTS(Text-to-Speech) APIs and accelerometer sensor of a smartphone. This application provides the ability to record what the hearing-Impairment person's interlocutor is saying with a microphone, convert it to text using the STT API, and display it to the hearing-Impairment person. In addition. In addition, when a hearing-impaired person inputs a text using the TTS API, it is converted into voice and told to the interlocutor. When a hearing-impaired person shakes their smartphone, an accelerometer based background service function is provided to run the application. The application implemented in this paper provides a function that allows hearing impaired people to communicate easily with other people when communicating with others without using sign language as a video call.

[6] Conference S. Yun, J. Baik, J. Lee, and K. Kang*, "Execution Time Replenishment using Lightweight Neural Network in Adaptive Mixed-Criticality Scheduling," in Proc. Korea Softw. Congr. (KSC), 2021, pp. 1082-1083.

In mixed-criticality (MC) systems, if a high-criticality (HC) task requires more execution time, the execution time of a low-criticality (LC) task is sacrificed. The MC scheduler conservatively allocates additional execution time for the HC task, exceeding the actual execution time. To give as much as the actual execution time, it is necessary to analyze the execution time pattern of the HC task while minimizing the system load. In this study, we propose MC-LNN, a lightweight neural network (LNN) that minimizes the sacrifice of LC tasks by predicting the actual execution time of HC tasks in a MC scheduler. As a result of analyzing the execution time pattern of the task, MC-LNN showed a 23.03%p higher hit rate than the Ordinary Least Squares method (OLS), which is a linear regression method, for the nonlinear execution time task pattern within 90% of accuracy. Additionally, the proposed technique takes about 0.06% of the average real-time task cycle, 10ms, with a 5.78 μs delay time, showing its usability in real-time systems.

[5] Conference
UG Section
[Best Paper] W. Lee*, W. Kim, H. Ham, and S. Yun, "Development of Speech Recognition and Synthetic Application for the Hearing Impairment," in Proc. Korea Soc. Comput. Inf. Conf. (KSCI), 2020, vol. 28, no.2, pp. 129-130.

This paper presents the implementation results of an Android application system designed to support communication for individuals with hearing impairments. The system utilizes the Speech-to-Text (STT) API provided by Google Cloud Platform to convert spoken language into text in real time. Additionally, it incorporates Text-to-Speech (TTS) functionality to synthesize speech from text, enabling two-way communication. To enhance usability, the application includes a foreground service that leverages the accelerometer sensor, allowing the app to be launched by shaking the smartphone two to three times. This feature improves accessibility and ease of use for hearing-impaired users in real-world situations.

[4] Conference
UG Section
H. Choi* and S. Yun, "Clustering Scheme Development using Low-cost Server," in Proc. Korea Soc. Comput. Inf. Conf. (KSCI), 2020, vol. 28, no. 2, pp. 323-324.

This paper discusses performance enhancement of a server system by clustering low-end computers. The proposed system connects multiple computers into a single cluster and utilizes Kubernetes to manage load balancing between nodes, thereby maximizing computational throughput and minimizing task execution time. The system dynamically allocates tasks based on memory requirements and the current load status of each node. To evaluate the effectiveness of this approach, Optical Character Recognition (OCR) tasks were executed and the processing speed of a standalone server was compared with that of the clustered system. The results demonstrate that even low-specification computers can be used to build an efficient and high-performing server through clustering.

[3] Conference
UG Section
H. Choi* and S. Yun, "Development of Small-scale Drones Swarm Flight System," in Proc. Korea Soc. Comput. Inf. Conf. (KSCI), 2019, vol. 27, no. 2, pp. 245-246.

This paper presents the implementation results of a system for simultaneously controlling multiple drones using a Graphical User Interface (GUI). Multiple drones were connected to a Wireless Access Point (AP) using Packet Sender, a network socket application. Commands were sent to the drones via a UDP (User Datagram Protocol) socket implemented in a Python application, enabling real-time control through the AP. The system was developed using the Python GUI module Tkinter to provide an intuitive interface, thereby enhancing accessibility for users.

[2] Conference
UG Section
H. Choi*, G. Lee, and S. Yun, "Developing a Sustainable IoT Platform," in Proc. Korea Soc. Comput. Inf. Conf. (KSCI), 2019, vol. 27, no. 2, pp. 243-244.

This paper presents the development of a sustainable IoT (Internet of Things) platform. The proposed platform facilitates communication with specific systems that control sensors, enabling efficient data transmission and control. It is designed to operate reliably in constrained network environments and under low power conditions, offering excellent availability and extensibility. For testing, the IoT platform was deployed on Amazon EC2 (Elastic Compute Cloud), a cloud computing platform, and MariaDB, an open-source relational database management system, was used as the database server. To evaluate the platform’s performance, it was connected to specific sensor control systems such as a smart mirror system and an air quality control system. Comparisons were made between the MQTT (Message Queuing Telemetry Transport) protocol, commonly used in platforms like Google IoT, and the newly developed TCP/IP-based protocol tailored for the sustainable IoT platform. Future work includes extending the platform for use in UTM (Unmanned Aircraft System Traffic Management) systems.

[1] Conference
UG Section
[Best Paper] H. Choi*, G. Lee, and S. Yun, "Smart Mirror System Development supporting Scalability," in Proc. Korea Soc. Comput. Inf. Conf. (KSCI), 2019, vol. 27, no. 1, pp. 249-250.

This paper presents the development results of a smart mirror system with enhanced scalability. A smart mirror is a next-generation display device that shows user-requested data on a mirror, offering excellent usability and convenience. However, conventional smart mirror systems have limited scalability, as they typically operate only within a local environment or rely solely on an internal database. To address this limitation, the proposed system improves scalability by incorporating an external database server for service integration. For testing purposes, the system was evaluated using a smart mirror integrated with a fine dust control system and a temperature and humidity data service.

Intellectual Property
No. Type Details
[6] Domestic
Patent
[Inventor]: S. Yun, J. Choi, J. Lim, M. Kim, H. Kim, K. Kang, S. Hwang,
[Title]: "Apparatus for Predictive Maintenance of Manufacturing Equipment,"
[Country]: KR, [Assignee]: Hanyang University ERICA IUCF, Manufacturing Innovation Technology Foundation,
[Application No.]: 10-2022-0177853, [Application Date]: 2022.12.19

Disclosed is a predictive maintenance apparatus and method for manufacturing equipment. The apparatus comprises: a communication interface unit configured to continuously receive sensing data generated during the operation of manufacturing equipment over time; and a control unit configured to detect data corresponding to abnormal operating conditions from the received sensing data, predict the remaining useful life of the manufacturing equipment based on the detected abnormal data, and determine an appropriate maintenance schedule accordingly.

[5] Domestic
Patent
[Inventor]: S. Yun, J. Baik, K. Kang,
[Title]: "Apparatus and Method for Allocating Execution Time,"
[Country]: KR, [Assignee]: Hanyang University ERICA IUCF,
[Application No.]: 10-2022-0104475, [Application Date]: 2022.08.22
[Registration No.]: 10-2789363, [Registration Date]: 2025.03.27

Disclosed is an apparatus and method for execution time allocation. The method includes: receiving a plurality of grouped training system calls included in a pre-collected training task; training a prediction model to output the progress level of the training task based on the grouped training system calls; receiving grouped system calls included in a predefined high-priority task; predicting the progress of the high-priority task by applying the grouped system calls to the trained prediction model; calculating additional execution time required for the high-priority task based on the predicted progress; allocating the additional execution time based on the progress of the system calls; and dropping predefined low-priority tasks corresponding to the additionally required execution time for the execution of the high-priority task.

[4] Registered
Program
[Contributor]: J. Choi, S. Yun, J. Lim, M. Kim, H. Kim, K. Kang,
[Title]: "Program for Generating and Evaluating Quantitative Criteria for Defect Detection of Manufacturing Equipment Consumables Using an Unsupervised Learning AI Model,"
[Copyright Holder]: Hanyang University ERICA IUCF,
[Registration No.]: C-2022-033491, [Creation Date]: 2022.08.16. [Registration Date]: 2022.08.29
[3] Registered
Program
[Contributor]: J. Choi, S. Yun, J. Lim, M. Kim, H. Kim, K. Kang,
[Title]: "Real-time Edge Computing Data Logger for Manufacturing Equipment,"
[Copyright Holder]: Hanyang University ERICA IUCF,
[Registration No.]: C-2022-032321, [Creation Date]: 2022.08.02. [Registration Date]: 2022.08.18
[2] Registered
Program
[Contributor]: S. Yun, J. Lim, K. Kang,
[Title]: "User-level RM Scheduling Benchmark Program,"
[Copyright Holder]: Hanyang University ERICA IUCF,
[Registration No.]: C-2022-032262, [Creation Date]: 2022.06.20. [Registration Date]: 2022.08.17
[1] Registered
Program
[Contributor]: S. Yun, J. Baik, K. Kang,
[Title]: "Lightweight Real-Time Task Guarantee Program Using System Call Tracing for Artificial Neural Networks,"
[Copyright Holder]: Hanyang University ERICA IUCF,
[Registration No.]: C-2021-040757, [Creation Date]: 2021.05.26, [Registration Date]: 2021.10.14