Graduate School of Information Study

  • Korea, Republic of

Research Output

2019

Physical layer security of autonomous driving: Secure vehicle-to-vehicle communication in a security cluster

Ahn, N. Y. & Lee, D. H., 2019 Jan 1, In : Ad-Hoc and Sensor Wireless Networks. 45, 3-4, p. 293-336 44 p.

Research output: Contribution to journalArticle

Poster: How to securely record logs based on ARM trust zone

Lee, S., Jo, H. J., Choi, W. & Lee, D. H., 2019 Jul 2, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 664-666 3 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
1 Citation (Scopus)

Power grid estimation using electric network frequency signals

Bang, W. & Yoon, J. W., 2019 Jan 1, In : Security and Communication Networks. 2019, 1982168.

Research output: Contribution to journalArticle

Open Access

Practical silicon-backside-protection method for abnormally detection

Yi, K., Park, M., Cha, S. & Kim, S., 2019 Dec, In : Journal of Semiconductor Technology and Science. 19, 6, p. 577-584 8 p.

Research output: Contribution to journalArticle

Ransomware protection using the moving target defense perspective

Lee, S., Kim, H. K. & Kim, K., 2019 Sep 1, In : Computers and Electrical Engineering. 78, p. 288-299 12 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Reversible data hiding in JPEG images based on multiple histograms modification

Lu, X., Huang, F. & Kim, H. J., 2019 Jan 1, Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, Proceedings. Sun, X., Pan, Z. & Bertino, E. (eds.). Springer Verlag, p. 442-454 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11634 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reversible data hiding in JPEG images using quantized DC

Kim, S., Huang, F. & Kim, H. J., 2019 Jan 1, In : Entropy. 21, 9, 835.

Research output: Contribution to journalArticle

Open Access

Schemes for Privacy Data Destruction in a NAND Flash Memory

Ahn, N. Y. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 181305-181313 9 p., 8930558.

Research output: Contribution to journalArticle

Open Access

Secure and Lightweight Subflow Establishment of Multipath-TCP

Noh, G., Park, H., Roh, H. & Lee, W., 2019 Jan 1, In : IEEE Access. 7, p. 177438-177448 11 p., 8922596.

Research output: Contribution to journalArticle

Open Access

Securing Ultrasonic Sensors against Signal Injection Attacks Based on a Mathematical Model

Lee, S., Choi, W. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 107716-107729 14 p., 8786810.

Research output: Contribution to journalArticle

Open Access
Open Access
4 Citations (Scopus)

SoK: A systematic review of insider threat detection

Kim, A., Oh, J., Ryu, J., Lee, J., Kwon, K. & Lee, K., 2019 Dec, In : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 10, 4, p. 46-67 22 p.

Research output: Contribution to journalReview article

Special issue on "side channel attacks"

Hong, S., 2019 May 1, In : Applied Sciences (Switzerland). 9, 9, 1881.

Research output: Contribution to journalEditorial

Open Access
1 Citation (Scopus)

Static Malware Analysis in Encrypted Domain

Hwang, T. & Yoon, J. W., 2019 Oct, ICTC 2019 - 10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future. Institute of Electrical and Electronics Engineers Inc., p. 47-52 6 p. 8939880. (ICTC 2019 - 10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

The All-Purpose Sword: North Korea's Cyber Operations and Strategies

Ji-Young, K., Lim, J. I. & Kyoung Gon, K., 2019 May 1, 2019 11th International Conference on Cyber Conflict: Silent Battle, CyCon 2019. Signoretti, M., Tolga, I., Minarik, T., Visky, G., Alatalu, S. & Biondi, S. (eds.). NATO CCD COE Publications, 8756954. (International Conference on Cyber Conflict, CYCON; vol. 2019-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Transitive signature schemes for undirected graphs from lattices

Noh, G. & Jeong, I. R., 2019 Jun 30, In : KSII Transactions on Internet and Information Systems. 13, 6, p. 3316-3332 17 p.

Research output: Contribution to journalArticle

Understanding the Deployment Cost of Cloud Computing Services for the Higher Education Institutions

Choi, C. H., Lee, C., Lee, J. J. & Lee, K., 2019 Oct, ICTC 2019 - 10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future. Institute of Electrical and Electronics Engineers Inc., p. 438-443 6 p. 8939863. (ICTC 2019 - 10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Vehicle communication using secrecy capacity

Ahn, N. Y., Lee, D. H. & Oh, S-J., 2019 Jan 1, Proceedings of the Future Technologies Conference (FTC) 2018 - Volume 2. Kapoor, S., Arai, K. & Bhatia, R. (eds.). Springer Verlag, p. 158-172 15 p. (Advances in Intelligent Systems and Computing; vol. 881).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

WebProfiler: User interaction prediction framework for web applications

Joo, M. & Lee, W., 2019 Jan 1, In : IEEE Access. 7, p. 154946-154958 13 p., 8880603.

Research output: Contribution to journalArticle

Open Access
2018

An Efficient Method for Securely Storing and Handling of Genomic Data

Ki, Y. & Yoon, J. W., 2018 Jun 21, Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017. Institute of Electrical and Electronics Engineers Inc., p. 121-125 5 p. (Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

De-identification policy and risk distribution framework for securing personal information

Joo, M. H., Yoon, S. P., Kwon, H-Y. & Lim, J. I., 2018 Jan 1, In : Information Polity. 23, 2, p. 195-219 25 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks

Choi, W., Jo, H. J., Woo, S., Chun, J. Y., Park, J. & Lee, D. H., 2018 Jun 1, In : IEEE Transactions on Vehicular Technology. 67, 6, p. 4757-4770 14 p.

Research output: Contribution to journalArticle

28 Citations (Scopus)

Legal Consideration on the Use of Artificial Intelligence Technology and Self-regulation in Financial Sector: Focused on Robo-Advisors

Lee, K. Y., Kwon, H-Y. & Lim, J. I., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 323-335 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Model Parameter Estimation and Inference on Encrypted Domain: Application to Noise Reduction in Encrypted Images

Lee, S. & Yoon, J. W., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 115-126 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Opportunities and challenges in the intelligent society: Smart cities, digital inclusion, and cybersecurity

Kim, D., Kwon, H-Y., Jun, D., Lee, E., Hagen, L. & Chun, S. A., 2018 May 30, Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, DG.O 2018. Hinnant, C. C. & Zuiderwijk, A. (eds.). Association for Computing Machinery, a131. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy preserving k-nearest neighbor for medical diagnosis in e-health cloud

Park, J. & Lee, D. H., 2018 Jan 1, In : Journal of Healthcare Engineering. 2018, 4073103.

Research output: Contribution to journalArticle

Open Access
3 Citations (Scopus)

Role of law as a guardian of the right to use public sector information: Case study of Korean government

Yoon, S. P., Joo, M. H. & Kwon, H-Y., 2018 May 30, Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, DG.O 2018. Hinnant, C. C. & Zuiderwijk, A. (eds.). Association for Computing Machinery, a83. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security Architecture for a Secure Database on Android

Park, J. H., Yoo, S. M., Kim, I-S. & Lee, D. H., 2018 Jan 26, In : IEEE Access. 6, p. 11482-11501 20 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2017

Digital forensic approaches for Amazon Alexa ecosystem

Chung, H., Park, J. & Lee, S., 2017 Jan 1, p. S15-S25.

Research output: Contribution to conferencePaper

Open Access
3 Citations (Scopus)

Establishing cyberspace norms using bright internet principles: In the case of the Korean legal system

Yoon, S. P. & Kwon, H-Y., 2017 Jan 1, In : Journal of Engineering and Applied Sciences. 12, Specialissue3, p. 6498-6509 12 p.

Research output: Contribution to journalArticle

Research on distribution of responsibility for de-identification policy of personal information

Joo, M. H., Yoon, S. P., Kim, S. Y. & Kwon, H-Y., 2017 Jun 7, DG.O 2017 - Proceedings of the 18th Annual International Conference on Digital Government Research: Innovations and Transformations in Government. Hinnant, C. C. & Ojo, A. (eds.). Association for Computing Machinery, p. 74-83 10 p. (ACM International Conference Proceeding Series; vol. Part F128275).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

Characteristics of the legal framework of Korea in the age of data and looking forward - from media theory point of view

Park, S. J., Kim, S. Y., Kim, B. Y., Kim, D. W. & Kwon, H-Y., 2016 Jan 1, In : International Journal of Software Engineering and its Applications. 10, 5, p. 109-124 16 p.

Research output: Contribution to journalArticle

No safety without security

Lee, Y., Woo, S., Wollinger, T. & Lee, D. H., 2016 Jan 1.

Research output: Contribution to conferencePaper

Preface

Shi, Y. Q., Kim, H. J., Pérez-González, F. & Echizen, I., 2016, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9569

Research output: Contribution to journalArticle

Recovery method of deleted records and tables from ESE database

Kim, J., Park, A. & Lee, S., 2016 Jan 1, p. S118-S124.

Research output: Contribution to conferencePaper

Open Access
2015

Erratum: A novel statistical approach to detect card frauds using transaction patterns

Lee, C. C. & Yoon, J. W., 2015 Apr 1, In : IEICE Transactions on Information and Systems. E98D, 4, p. 999 1 p.

Research output: Contribution to journalArticle

Fair-based loss measurement model for enterprise personal information breach

Yun, J. H., Cho, I. H. & Lee, K. H., 2015, Lecture Notes in Electrical Engineering. Springer Verlag, Vol. 373. p. 825-833 9 p. (Lecture Notes in Electrical Engineering; vol. 373).

Research output: Chapter in Book/Report/Conference proceedingChapter

The right to be forgotten: Standard on deleting the exposed personal information on the internet

Lee, H. J., Yun, J. H., Yoon, H. S. & Lee, K. H., 2015, Computer Science and Its Applications - Ubiquitous Information Technologies. Springer Verlag, Vol. 330. p. 883-889 7 p. (Lecture Notes in Electrical Engineering; vol. 330).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2014

Advanced protocol to prevent man-in-the-middle attack in SCADA system

Oh, S., Chung, H., Lee, S. & Lee, K., 2014, In : International Journal of Security and its Applications. 8, 2, p. 1-8 8 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

A research for partition restoration techniques

Namgung, J., Hong, I. Y., Park, J., Lee, C. & Lee, S., 2014 Jan 1, Future Information Technology, FutureTech 2013. Springer Verlag, p. 315-322 8 p. (Lecture Notes in Electrical Engineering; vol. 276 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary Coded Genetic Algorithm with Ensemble Classifier for feature selection in JPEG steganalysis

Sachnev, V. & Kim, H. J., 2014 Jan 1, IEEE ISSNIP 2014 - 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings. IEEE Computer Society, 6827700

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Comment on "Quantum Signature Scheme with Weak Arbitrator"

Kang, M. S., Hong, C. H., Heo, J., Lim, J. I. & Yang, H. J., 2014 Jun, In : International Journal of Theoretical Physics. 53, 6, p. 1862-1866 5 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Parkinson Disease Classification based on binary coded genetic algorithm and Extreme learning machine

Sachnev, V. & Kim, H. J., 2014 Jan 1, IEEE ISSNIP 2014 - 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings. IEEE Computer Society, 6827649

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Routing-efficient CDS construction in Disk-Containment Graphs

Lu, Z., Wu, L., Pardalos, P. M., Maslov, E., Lee, W. & Du, D. Z., 2014 Feb 1, In : Optimization Letters. 8, 2, p. 425-434 10 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)
2013

A framework for anomaly pattern recognition in electronic financial transaction using moving average method

Kim, A. C., Park, W. H. & Lee, D. H., 2013 Feb 26, IT Convergence and Security 2012. p. 93-99 7 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Aggregating CL-signatures revisited: Extended functionality and better efficiency

Lee, K., Lee, D. H. & Yung, M., 2013 Sep 5, Financial Cryptography and Data Security - 17th International Conference, FC 2013, Revised Selected Papers. p. 171-188 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7859 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

A MAC Protocol using road traffic estimation for infrastructure-to-vehicle communications on highways

Kim, K., Lee, J. & Lee, W., 2013 Jun 20, In : IEEE Transactions on Intelligent Transportation Systems. 14, 3, p. 1500-1509 10 p., 6532363.

Research output: Contribution to journalArticle

4 Citations (Scopus)

An attempt to generalize distortion measure for JPEG steganography

Sachnev, V. & Kim, H. J., 2013 Sep 3, Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Revised Selected Papers. p. 69-82 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7809 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A new approach of differential fault analysis on block ciphers with S-box

Jeong, K., Sung, J., Hong, S. & Lee, C., 2013 Mar, In : Information (Japan). 16, 3 A, p. 1915-1928 14 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

A stackelberg game for cooperative cognitive radio network with active SUs

Roh, H., Jung, C., Lee, W. & Du, D. Z., 2013 May 15, 2013 International Conference on Computing, Networking and Communications, ICNC 2013. p. 911-915 5 p. 6504211. (2013 International Conference on Computing, Networking and Communications, ICNC 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)