Graduate School of Information Study

  • Korea, Republic of

Research Output

Article

1H NMR-75As NQR cross relaxation study of ferroelastic TlH2AsO4

Lee, C. E., Lee, C. H., Lee, K. W., Lee, E. M., Choi, J. Y. & Kim, J., 2001 May 11, In : Solid State Communications. 118, 6, p. 283-286 4 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms

Song, B. K., Yoo, J. S., Hong, M. & Yoon, J. W., 2019 Jan 1, In : Security and Communication Networks. 2019, 3648671.

Research output: Contribution to journalArticle

Open Access

A Cancelable Template for the Low-Quality Fingerprints from Wearable Devices

Lee, S., Jeong, I. R. & Araujo, A., 2019 Jan 1, In : Security and Communication Networks. 2019, 4202671.

Research output: Contribution to journalArticle

Open Access

A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure

Lee, S., Cho, S. M., Kim, H. & Hong, S., 2020 Jan 1, In : IEEE Access. 8, p. 5244-5255 12 p., 8948409.

Research output: Contribution to journalArticle

Open Access

Acoustic sensor-based multiple object tracking with visual information association

Lee, J., Hong, S., Moon, N. & Oh, S. J., 2010 Nov 19, In : Eurasip Journal on Advances in Signal Processing. 2010, 591340.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Adaptive binary splitting: A RFID tag collision arbitration protocol for tag identification

Myung, J. & Lee, W., 2006 Oct, In : Mobile Networks and Applications. 11, 5, p. 711-722 12 p.

Research output: Contribution to journalArticle

61 Citations (Scopus)

A data flow optimization method for high speed MAC processing in an IEEE 802.16m modem

Kim, K. W., Yi, J. & Oh, S. J., 2011 Apr 25, In : ieice electronics express. 8, 8, p. 530-535 6 p.

Research output: Contribution to journalArticle

Advanced insider threat detection model to apply periodic work atmosphere

Oh, J., Kim, T. H. & Lee, K. H., 2019 Mar 31, In : KSII Transactions on Internet and Information Systems. 13, 3, p. 1722-1737 16 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Advanced protocol to prevent man-in-the-middle attack in SCADA system

Oh, S., Chung, H., Lee, S. & Lee, K., 2014, In : International Journal of Security and its Applications. 8, 2, p. 1-8 8 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

A license management protocol for protecting user privacy and digital contents in Digital Rights Management systems

Park, B. N., Lee, W. & Kim, J. W., 2005 Aug, In : IEICE Transactions on Information and Systems. E88-D, 8, p. 1958-1965 8 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

A MAC Protocol using road traffic estimation for infrastructure-to-vehicle communications on highways

Kim, K., Lee, J. & Lee, W., 2013 Jun 20, In : IEEE Transactions on Intelligent Transportation Systems. 14, 3, p. 1500-1509 10 p., 6532363.

Research output: Contribution to journalArticle

4 Citations (Scopus)

A method of detecting abnormal malicious remote control codes using network domain information

Oh, H. G., Seo, J. T., Lim, J. I. & Moon, J. S., 2012 May 1, In : Information. 15, 5, p. 2181-2192 12 p.

Research output: Contribution to journalArticle

Analysis of context dependence in social interaction networks of a massively multiplayer online role-playing game

Son, S., Kang, A. R., Kim, H. C., Kwon, T., Park, J. & Kim, H. K., 2012 Apr 4, In : PloS one. 7, 4, e33918.

Research output: Contribution to journalArticle

25 Citations (Scopus)
2 Citations (Scopus)

Analysis of job stress's impact on job performance and turnover of cybersecurity professionals

Cho, J., Yoo, J. & Lim, J. I., 2020 Jan 1, In : ICIC Express Letters. 14, 4, p. 409-415 7 p.

Research output: Contribution to journalArticle

Analysis of SIP transfer delay in multi-rate wireless networks

Pack, S., Park, G., Lee, K. & Lee, W., 2010 Oct 1, In : IEEE Communications Letters. 14, 10, p. 918-920 3 p., 5567004.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Analysis of some keyword search schemes in encrypted data

Jeong, I. R. & Kwon, J. O., 2008 Mar 1, In : IEEE Communications Letters. 12, 3, p. 213-215 3 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

An automated end-to-end side channel analysis based on probabilistic model

Hwang, J. & Yoon, J. W., 2020 Apr 1, In : Applied Sciences (Switzerland). 10, 7, 2369.

Research output: Contribution to journalArticle

Open Access

An efficient CRT-RSA algorithm secure against power and fault attacks

Kim, S. K., Kim, T. H., Han, D. G. & Hong, S., 2011 Oct, In : Journal of Systems and Software. 84, 10, p. 1660-1669 10 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

An efficient DPA countermeasure for the EtaT pairing algorithm over GF(2n) based on random value addition

Seo, S. C., Han, D. G. & Hong, S., 2011 Oct 1, In : ETRI Journal. 33, 5, p. 780-790 11 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

A new approach of differential fault analysis on block ciphers with S-box

Jeong, K., Sung, J., Hong, S. & Lee, C., 2013 Mar, In : Information (Japan). 16, 3 A, p. 1915-1928 14 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

A new bit-serial multiplier over GF(pm) using irreducible trinomials

Chang, N. S., Kim, T. H., Kim, C. H., Han, D. G. & Lim, J., 2010 Jul 1, In : Computers and Mathematics with Applications. 60, 2, p. 355-361 7 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

A new load distribution strategy for linear network with communication delays

Suresh, S., Mani, V., Omkar, S. N., Kim, H. J. & Sundararajan, N., 2009 Jan 1, In : Mathematics and Computers in Simulation. 79, 5, p. 1488-1501 14 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

An improved section-wise exploiting modification direction method

Wang, J., Sun, Y., Xu, H., Chen, K., Joong Kim, H. & Joo, S. H., 2010 Nov 1, In : Signal Processing. 90, 11, p. 2954-2964 11 p.

Research output: Contribution to journalArticle

36 Citations (Scopus)

Anisotropic domain-wall dynamics in proton-irradiated KH2PO4

Kim, S. H., Oh, B. H., Han, J. H., Lee, C. E., Choi, J. Y., Hahn, K. D., Jang, C. Y., Youn, B. H. & Kim, J., 2009 Nov 1, In : Current Applied Physics. 9, 6, p. 1307-1309 3 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)
18 Citations (Scopus)

A research on the investigation method of digital forensics for a VMware Workstation's virtual machine

Lim, S., Yoo, B., Park, J., Byun, K. D. & Lee, S., 2012 Jan 1, In : Mathematical and Computer Modelling. 55, 1-2, p. 151-160 10 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

A secure steganographic scheme against statistical analyses

Yu, J. J., Han, J. W., Lee, K. S., Seung Cheol, O., Lee, S. & Park, I. H., 2004 Dec 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2939, p. 497-507 11 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data

Cho, J., Lee, C., Cho, S., Song, J. H., Lim, J. & Moon, J., 2010 Apr 1, In : Simulation Modelling Practice and Theory. 18, 4, p. 431-435 5 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

A study of the security of Internet banking and financial private information in South Korea

Lee, J. H., Lim, W. G. & Lim, J. I., 2013 Jul 1, In : Mathematical and Computer Modelling. 58, 1-2, p. 117-131 15 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)

A study on the live forensic techniques for anomaly detection in user terminals

Kim, A. C., Park, W. H. & Lee, D. H., 2013 May 10, In : International Journal of Security and its Applications. 7, 1, p. 181-188 8 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis

Kim, D. & Kim, H. K., 2019 Jan 1, In : Security and Communication Networks. 2019, 6268476.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

A video streaming file server framework for digital video broadcasting environments

Kim, E., Lee, W. & Lee, C., 2005 Jan 1, In : IEICE Transactions on Information and Systems. E88-D, 3, p. 654-657 4 p.

Research output: Contribution to journalArticle

A video streaming system for mobile phones: Practice and experience

Cha, H., Lee, J., Nang, J., Park, S. Y., Jeong, J. H., Yoo, C. & Choi, J. Y., 2005 May 1, In : Wireless Networks. 11, 3, p. 265-274 10 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Behavior analysis and anomaly detection for a digital substation on cyber-physical system

Kwon, Y., Lee, S., King, R., Lim, J. I. & Kim, H. K., 2019 Mar 1, In : Electronics (Switzerland). 8, 3, 326.

Research output: Contribution to journalArticle

Open Access

Catch ID if You CAN: Dynamic ID Virtualization Mechanism for the Controller Area Network

Sun, H., Lee, S. Y., Joo, K., Jin, H. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 158237-158249 13 p., 8886494.

Research output: Contribution to journalArticle

Open Access

CDS-based virtual backbone construction with guaranteed routing cost in wireless sensor networks

Du, H., Wu, W., Ye, Q., Li, D., Lee, W. & Xu, X., 2013 Mar 19, In : IEEE Transactions on Parallel and Distributed Systems. 24, 4, p. 652-661 10 p., 6216366.

Research output: Contribution to journalArticle

57 Citations (Scopus)

Characteristics of the legal framework of Korea in the age of data and looking forward - from media theory point of view

Park, S. J., Kim, S. Y., Kim, B. Y., Kim, D. W. & Kwon, H-Y., 2016 Jan 1, In : International Journal of Software Engineering and its Applications. 10, 5, p. 109-124 16 p.

Research output: Contribution to journalArticle

Collision attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and anubis

Kang, J., Jeong, K., Sung, J., Hong, S. & Lee, K., 2013 Dec 16, In : Journal of Applied Mathematics. 2013, 713673.

Research output: Contribution to journalArticle

7 Citations (Scopus)

Comment on "Quantum Signature Scheme with Weak Arbitrator"

Kang, M. S., Hong, C. H., Heo, J., Lim, J. I. & Yang, H. J., 2014 Jun, In : International Journal of Theoretical Physics. 53, 6, p. 1862-1866 5 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Compression function design principles supporting variable output lengths from a single small function

Chang, D., Nandi, M., Lee, J., Sung, J., Hong, S., Lim, J., Park, H. & Chun, K., 2008 Sep, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E91-A, 9, p. 2607-2614 8 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Constructing PEKS schemes secure against keyword guessing attacks is possible?

Jeong, I. R., Kwon, J. O., Hong, D. & Lee, D. H., 2009 Feb 12, In : Computer Communications. 32, 2, p. 394-396 3 p.

Research output: Contribution to journalArticle

76 Citations (Scopus)

Correlation immune functions with controllable nonlinearity

Chee, S., Lee, S., Kim, K. & Kim, D., 1997 Dec 1, In : ETRI Journal. 19, 4, p. 389-400 12 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Cyber attack and defense emulation agents

Yoo, J. D., Park, E., Lee, G., Ahn, M. K., Kim, D., Seo, S. & Kim, H. K., 2020 Mar 1, In : Applied Sciences (Switzerland). 10, 6, 2140.

Research output: Contribution to journalArticle

Open Access

Damaged backup data recovery method for Windows mobile

Bang, J., Lee, C., Lee, S. & Lee, K., 2013 Apr 22, In : Journal of Supercomputing. 66, 2, p. 875-887 13 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Data concealment and detection in Microsoft Office 2007 files

Park, B., Park, J. & Lee, S., 2009 Mar, In : Digital Investigation. 5, 3-4, p. 104-114 11 p.

Research output: Contribution to journalArticle

26 Citations (Scopus)

De-identification policy and risk distribution framework for securing personal information

Joo, M. H., Yoon, S. P., Kwon, H-Y. & Lim, J. I., 2018 Jan 1, In : Information Polity. 23, 2, p. 195-219 25 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Design of Processing-"Inside"-Memory Optimized for DRAM Behaviors

Lee, W. J., Kim, C. H., Paik, Y., Park, J., Park, I. & Kim, S. W., 2019 Jan 1, In : IEEE Access. 7, p. 82633-82648 16 p., 8743357.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

Differential and linear cryptanalysis for 2-round SPNs

Chun, K., Kim, S., Lee, S., Sung, S. H. & Yoon, S., 2003 Sep 15, In : Information Processing Letters. 87, 5, p. 277-282 6 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)

Distinct critical fluctuations and molecular motions manifest in a model biomembrane

Lee, K. W., Lee, C. E., Choi, J. Y. & Kim, J., 2005 Jan 1, In : Solid State Communications. 133, 2, p. 83-88 6 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)