Graduate School of Information Study

  • Korea, Republic of

Research Output

2020

A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure

Lee, S., Cho, S. M., Kim, H. & Hong, S., 2020 Jan 1, In : IEEE Access. 8, p. 5244-5255 12 p., 8948409.

Research output: Contribution to journalArticle

Open Access

Interceptor complexity analysis for mixed BPSK–QPSK modulated frequency hopping spread spectrum systems

Park, J. W., Yoo, D. S. & Oh, S. J., 2020 Jun, In : Physical Communication. 40, 101063.

Research output: Contribution to journalArticle

In-vehicle network intrusion detection using deep convolutional neural network

Song, H. M., Woo, J. & Kim, H. K., 2020 Jan, In : Vehicular Communications. 21, 100198.

Research output: Contribution to journalArticle

Open Access

Malware Detection in Self-Driving Vehicles Using Machine Learning Algorithms

Park, S. & Choi, J. Y., 2020 Jan 1, In : Journal of Advanced Transportation. 2020, 3035741.

Research output: Contribution to journalArticle

Open Access

MAuth-CAN: Masquerade-Attack-Proof Authentication for In-Vehicle Networks

Jo, H. J., Kim, J. H., Choi, H. Y., Choi, W., Lee, D. H. & Lee, I., 2020 Feb, In : IEEE Transactions on Vehicular Technology. 69, 2, p. 2204-2218 15 p., 8939382.

Research output: Contribution to journalArticle

Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression

Hong, M. Y. & Yoon, J. W., 2020 Jan 1, Information Security Applications - 20th International Conference, WISA 2019, Revised Selected Papers. You, I. (ed.). Springer, p. 155-166 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11897 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

New hybrid method for isogeny-based cryptosystems using edwards curves

Kim, S., Yoon, K., Kwon, J., Park, Y. H. & Hong, S., 2020 Mar, In : IEEE Transactions on Information Theory. 66, 3, p. 1934-1943 10 p., 8822753.

Research output: Contribution to journalArticle

Phantom Eavesdropping with Whitened RF Leakage

Shao, C., Jang, W., Park, H., Sung, J., Jung, Y. & Lee, W., 2020 Feb, In : IEEE Wireless Communications Letters. 9, 2, p. 232-235 4 p., 8882327.

Research output: Contribution to journalArticle

Recent advances in deep learning-based side-channel analysis

Jin, S., Kim, S., Kim, H. S. & Hong, S., 2020 Jan 1, (Accepted/In press) In : ETRI Journal.

Research output: Contribution to journalArticle

Open Access

Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach

Lee, J. K., Chang, Y., Kwon, H. Y. & Kim, B., 2020 Jan 1, (Accepted/In press) In : Information Systems Frontiers.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

Study on the Smart Speaker Security Evaluations and Countermeasures

Lee, J., Kang, S. & Kim, S-J., 2020 Jan 1, Advanced Multimedia and Ubiquitous Engineering - MUE/FutureTech 2019. Yang, L. T., Hao, F., Jeong, Y-S. & Park, J. J. (eds.). Springer Verlag, p. 50-70 21 p. (Lecture Notes in Electrical Engineering; vol. 590).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Turn On the Lights: User Behavior in Game Environment Using CPTED

Seo, J., Joo, M. & Lee, K., 2020 Jan 1, Information Security Applications - 20th International Conference, WISA 2019, Revised Selected Papers. You, I. (ed.). Springer, p. 14-24 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11897 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

User-Number Threshold-Based Small-Cell On/Off Control Scheme: Performance Evaluation and Optimization

Park, J. W., Yoo, D. S. & Oh, S. J., 2020 Jan, In : IEEE Transactions on Wireless Communications. 19, 1, p. 367-379 13 p., 8866747.

Research output: Contribution to journalArticle

2019

A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms

Song, B. K., Yoo, J. S., Hong, M. & Yoon, J. W., 2019 Jan 1, In : Security and Communication Networks. 2019, 3648671.

Research output: Contribution to journalArticle

Open Access

A Bitwise Logistic Regression Using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme

Yoo, J. S., Hwang, J. H., Song, B. K. & Yoon, J. W., 2019 Jan 1, Information Security Practice and Experience - 15th International Conference, ISPEC 2019, Proceedings. Heng, S-H. & Lopez, J. (eds.). Springer, p. 20-40 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11879 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A Cancelable Template for the Low-Quality Fingerprints from Wearable Devices

Lee, S., Jeong, I. R. & Araujo, A., 2019 Jan 1, In : Security and Communication Networks. 2019, 4202671.

Research output: Contribution to journalArticle

Open Access

Advanced insider threat detection model to apply periodic work atmosphere

Oh, J., Kim, T. H. & Lee, K. H., 2019 Mar 31, In : KSII Transactions on Internet and Information Systems. 13, 3, p. 1722-1737 16 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Alert correlation using diamond model for cyber threat intelligence

Shin, Y., Lim, C., Park, M., Cho, S., Han, I., Oh, H. & Lee, K. H., 2019 Jan 1, Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019. Cruz, T. & Simoes, P. (eds.). Curran Associates Inc., p. 444-450 7 p. (European Conference on Information Warfare and Security, ECCWS; vol. 2019-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A Model for Detecting Cryptocurrency Transactions with Discernible Purpose

Baek, H., Oh, J., Kim, C. Y. & Lee, K. H., 2019 Jul 1, ICUFN 2019 - 11th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, p. 713-717 5 p. 8806126. (International Conference on Ubiquitous and Future Networks, ICUFN; vol. 2019-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

A Study on smart city security policy based on blockchain in 5G Age

Noh, J. H. & Kwon, H-Y., 2019 Mar 18, 2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8669406. (2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

A Study on the Needs for Enhancement of Personal Information Protection in Cloud Computing Security Certification System

Kang, M. & Kwon, H-Y., 2019 Mar 18, 2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8669413. (2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis

Kim, D. & Kim, H. K., 2019 Jan 1, In : Security and Communication Networks. 2019, 6268476.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

Behavior analysis and anomaly detection for a digital substation on cyber-physical system

Kwon, Y., Lee, S., King, R., Lim, J. I. & Kim, H. K., 2019 Mar 1, In : Electronics (Switzerland). 8, 3, 326.

Research output: Contribution to journalArticle

Open Access

Catch ID if You CAN: Dynamic ID Virtualization Mechanism for the Controller Area Network

Sun, H., Lee, S. Y., Joo, K., Jin, H. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 158237-158249 13 p., 8886494.

Research output: Contribution to journalArticle

Open Access

Channel Independent Wi-Fi Backscatter Networks

Kim, T. & Lee, W., 2019 Apr 1, INFOCOM 2019 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 262-270 9 p. 8737376. (Proceedings - IEEE INFOCOM; vol. 2019-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data industry and legislations for personal information protection

Kwon, H-Y., Min, K. Y. & Chun, S. A., 2019 Jun 18, Proceedings of the 20th Annual International Conference on Digital Government Research: Governance in the Age of Artificial Intelligence, dg.o 2019. Salem, F., Zuiderwijk, A. & Chen, Y-C. (eds.). Association for Computing Machinery, p. 529-531 3 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Design of Processing-"Inside"-Memory Optimized for DRAM Behaviors

Lee, W. J., Kim, C. H., Paik, Y., Park, J., Park, I. & Kim, S. W., 2019 Jan 1, In : IEEE Access. 7, p. 82633-82648 16 p., 8743357.

Research output: Contribution to journalArticle

Open Access

Efficient cancelable iris template generation for wearable sensors

Jeong, J. Y. & Jeong, I. R., 2019 Jan 1, In : Security and Communication Networks. 2019, 7473591.

Research output: Contribution to journalArticle

Open Access

EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method

Seo, M., Kim, S., Lee, D. H. & Park, J. H., 2019 Jan 1, In : International Journal of Information Security.

Research output: Contribution to journalArticle

Enabling Service Queue Isolation in Multi-Tenant Data Centers

Kim, G. & Lee, W., 2019 Nov, In : IEEE Communications Letters. 23, 11, p. 1949-1952 4 p., 8826238.

Research output: Contribution to journalArticle

Forecasting the Electric Network Frequency Signals on Power Grid

Bang, W. & Yoon, J. W., 2019 Oct, ICTC 2019 - 10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future. Institute of Electrical and Electronics Engineers Inc., p. 1218-1223 6 p. 8939676. (ICTC 2019 - 10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication

Seo, M., Hwang, J. Y., Lee, D. H., Kim, S., Kim, S. H. & Park, J. H., 2019 Jan 1, In : IEEE Access. 7, p. 69892-69906 15 p., 8723318.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

How to guarantee the right to use PSI in the age of open data: Lessons from the data policy of South Korea

Yoon, S. P., Joo, M. H. & Kwon, H-Y., 2019 Jan 1, In : Information Polity. 24, 2, p. 131-146 16 p.

Research output: Contribution to journalArticle

Improving TCP performance in vehicle-to-grid (V2G) communication

Park, J., Kim, H. & Choi, J. Y., 2019 Nov, In : Electronics (Switzerland). 8, 11, 1206.

Research output: Contribution to journalArticle

Open Access

New approach to constructing noise source based on race conditions

Kim, S. G., Lee, S. J., Hong, D., Sung, J. & Hong, S., 2019 Jan 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E102A, 9, p. 1272-1284 13 p.

Research output: Contribution to journalArticle

Oldie is Goodie: Effective user retention by in-game promotion event analysis

Kim, K. H. & Kim, H. K., 2019 Oct 17, CHI PLAY 2019 - Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play. Association for Computing Machinery, Inc, p. 171-180 10 p. (CHI PLAY 2019 - Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves

Kim, S., Yoon, K., Park, Y. H. & Hong, S., 2019 Jan 1, Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Galbraith, S. D. & Moriai, S. (eds.). Springer, p. 273-292 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11922 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Physical layer security of autonomous driving: Secure vehicle-to-vehicle communication in a security cluster

Ahn, N. Y. & Lee, D. H., 2019 Jan 1, In : Ad-Hoc and Sensor Wireless Networks. 45, 3-4, p. 293-336 44 p.

Research output: Contribution to journalArticle

Poster: How to securely record logs based on ARM trust zone

Lee, S., Jo, H. J., Choi, W. & Lee, D. H., 2019 Jul 2, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 664-666 3 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
1 Citation (Scopus)

Power grid estimation using electric network frequency signals

Bang, W. & Yoon, J. W., 2019 Jan 1, In : Security and Communication Networks. 2019, 1982168.

Research output: Contribution to journalArticle

Open Access

Ransomware protection using the moving target defense perspective

Lee, S., Kim, H. K. & Kim, K., 2019 Sep 1, In : Computers and Electrical Engineering. 78, p. 288-299 12 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Reversible data hiding in JPEG images based on multiple histograms modification

Lu, X., Huang, F. & Kim, H. J., 2019 Jan 1, Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, Proceedings. Sun, X., Pan, Z. & Bertino, E. (eds.). Springer Verlag, p. 442-454 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11634 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reversible data hiding in JPEG images using quantized DC

Kim, S., Huang, F. & Kim, H. J., 2019 Jan 1, In : Entropy. 21, 9, 835.

Research output: Contribution to journalArticle

Open Access

Schemes for Privacy Data Destruction in a NAND Flash Memory

Ahn, N. Y. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 181305-181313 9 p., 8930558.

Research output: Contribution to journalArticle

Open Access

Secure and Lightweight Subflow Establishment of Multipath-TCP

Noh, G., Park, H., Roh, H. & Lee, W., 2019 Jan 1, In : IEEE Access. 7, p. 177438-177448 11 p., 8922596.

Research output: Contribution to journalArticle

Open Access

Securing Ultrasonic Sensors against Signal Injection Attacks Based on a Mathematical Model

Lee, S., Choi, W. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 107716-107729 14 p., 8786810.

Research output: Contribution to journalArticle

Open Access
Open Access
4 Citations (Scopus)

SoK: A systematic review of insider threat detection

Kim, A., Oh, J., Ryu, J., Lee, J., Kwon, K. & Lee, K., 2019 Dec, In : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 10, 4, p. 46-67 22 p.

Research output: Contribution to journalReview article

Special issue on "side channel attacks"

Hong, S., 2019 May 1, In : Applied Sciences (Switzerland). 9, 9, 1881.

Research output: Contribution to journalEditorial

Open Access
1 Citation (Scopus)

Static Malware Analysis in Encrypted Domain

Hwang, T. & Yoon, J. W., 2019 Oct, ICTC 2019 - 10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future. Institute of Electrical and Electronics Engineers Inc., p. 47-52 6 p. 8939880. (ICTC 2019 - 10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future).

Research output: Chapter in Book/Report/Conference proceedingConference contribution