Graduate School of Information Study

  • Korea, Republic of

Research Output

Filter
Conference contribution
2020

Formal modeling and verification of software-defined networking with multiple controllers

Kang, M. & Choi, J. Y., 2020 Jan 1, Testbeds and Research Infrastructures for the Development of Networks and Communications - 14th EAI International Conference, TridentCom 2019, Proceedings. Gao, H., Li, K., Yang, X. & Yin, Y. (eds.). Springer, p. 81-94 14 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 309 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression

Hong, M. Y. & Yoon, J. W., 2020 Jan 1, Information Security Applications - 20th International Conference, WISA 2019, Revised Selected Papers. You, I. (ed.). Springer, p. 155-166 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11897 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM

Park, K. H., Lee, E. & Kim, H. K., 2020 Jan 1, Information Security Applications - 20th International Conference, WISA 2019, Revised Selected Papers. You, I. (ed.). Springer, p. 3-13 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11897 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Study on the Smart Speaker Security Evaluations and Countermeasures

Lee, J., Kang, S. & Kim, S-J., 2020 Jan 1, Advanced Multimedia and Ubiquitous Engineering - MUE/FutureTech 2019. Yang, L. T., Hao, F., Jeong, Y-S. & Park, J. J. (eds.). Springer Verlag, p. 50-70 21 p. (Lecture Notes in Electrical Engineering; vol. 590).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Turn On the Lights: User Behavior in Game Environment Using CPTED

Seo, J., Joo, M. & Lee, K., 2020 Jan 1, Information Security Applications - 20th International Conference, WISA 2019, Revised Selected Papers. You, I. (ed.). Springer, p. 14-24 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11897 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2019

A Bitwise Logistic Regression Using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme

Yoo, J. S., Hwang, J. H., Song, B. K. & Yoon, J. W., 2019 Jan 1, Information Security Practice and Experience - 15th International Conference, ISPEC 2019, Proceedings. Heng, S-H. & Lopez, J. (eds.). Springer, p. 20-40 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11879 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Alert correlation using diamond model for cyber threat intelligence

Shin, Y., Lim, C., Park, M., Cho, S., Han, I., Oh, H. & Lee, K. H., 2019 Jan 1, Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019. Cruz, T. & Simoes, P. (eds.). Curran Associates Inc., p. 444-450 7 p. (European Conference on Information Warfare and Security, ECCWS; vol. 2019-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A Model for Detecting Cryptocurrency Transactions with Discernible Purpose

Baek, H., Oh, J., Kim, C. Y. & Lee, K. H., 2019 Jul 1, ICUFN 2019 - 11th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, p. 713-717 5 p. 8806126. (International Conference on Ubiquitous and Future Networks, ICUFN; vol. 2019-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

A Study on smart city security policy based on blockchain in 5G Age

Noh, J. H. & Kwon, H-Y., 2019 Mar 18, 2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8669406. (2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

A Study on the Needs for Enhancement of Personal Information Protection in Cloud Computing Security Certification System

Kang, M. & Kwon, H-Y., 2019 Mar 18, 2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8669413. (2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Channel Independent Wi-Fi Backscatter Networks

Kim, T. & Lee, W., 2019 Apr 1, INFOCOM 2019 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 262-270 9 p. 8737376. (Proceedings - IEEE INFOCOM; vol. 2019-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Data industry and legislations for personal information protection

Kwon, H-Y., Min, K. Y. & Chun, S. A., 2019 Jun 18, Proceedings of the 20th Annual International Conference on Digital Government Research: Governance in the Age of Artificial Intelligence, dg.o 2019. Salem, F., Zuiderwijk, A. & Chen, Y-C. (eds.). Association for Computing Machinery, p. 529-531 3 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Forecasting the Electric Network Frequency Signals on Power Grid

Bang, W. & Yoon, J. W., 2019 Oct, ICTC 2019 - 10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future. Institute of Electrical and Electronics Engineers Inc., p. 1218-1223 6 p. 8939676. (ICTC 2019 - 10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

FuzzBuilder: Automated building greybox fuzzing environment for C/C++ library

Jang, J. & Kim, H. K., 2019 Dec 9, Proceedings - 35th Annual Computer Security Applications Conference, ACSAC 2019. Association for Computing Machinery, p. 627-637 11 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

JPEG encryption with file format preservation and file size reduction

Kim, S. & Kim, H. J., 2019 Oct, 2019 IEEE 8th Global Conference on Consumer Electronics, GCCE 2019. Institute of Electrical and Electronics Engineers Inc., p. 215-216 2 p. 9015269. (2019 IEEE 8th Global Conference on Consumer Electronics, GCCE 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Oldie is Goodie: Effective user retention by in-game promotion event analysis

Kim, K. H. & Kim, H. K., 2019 Oct 17, CHI PLAY 2019 - Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play. Association for Computing Machinery, Inc, p. 171-180 10 p. (CHI PLAY 2019 - Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves

Kim, S., Yoon, K., Park, Y. H. & Hong, S., 2019 Jan 1, Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Galbraith, S. D. & Moriai, S. (eds.). Springer, p. 273-292 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11922 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Poster: How to securely record logs based on ARM trust zone

Lee, S., Jo, H. J., Choi, W. & Lee, D. H., 2019 Jul 2, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 664-666 3 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
1 Citation (Scopus)

Reversible data hiding in JPEG images based on multiple histograms modification

Lu, X., Huang, F. & Kim, H. J., 2019 Jan 1, Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, Proceedings. Sun, X., Pan, Z. & Bertino, E. (eds.). Springer Verlag, p. 442-454 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11634 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Static Malware Analysis in Encrypted Domain

Hwang, T. & Yoon, J. W., 2019 Oct, ICTC 2019 - 10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future. Institute of Electrical and Electronics Engineers Inc., p. 47-52 6 p. 8939880. (ICTC 2019 - 10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

The All-Purpose Sword: North Korea's Cyber Operations and Strategies

Ji-Young, K., Lim, J. I. & Kyoung Gon, K., 2019 May 1, 2019 11th International Conference on Cyber Conflict: Silent Battle, CyCon 2019. Signoretti, M., Tolga, I., Minarik, T., Visky, G., Alatalu, S. & Biondi, S. (eds.). NATO CCD COE Publications, 8756954. (International Conference on Cyber Conflict, CYCON; vol. 2019-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Understanding the Deployment Cost of Cloud Computing Services for the Higher Education Institutions

Choi, C. H., Lee, C., Lee, J. J. & Lee, K., 2019 Oct, ICTC 2019 - 10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future. Institute of Electrical and Electronics Engineers Inc., p. 438-443 6 p. 8939863. (ICTC 2019 - 10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Vehicle communication using secrecy capacity

Ahn, N. Y., Lee, D. H. & Oh, S-J., 2019 Jan 1, Proceedings of the Future Technologies Conference (FTC) 2018 - Volume 2. Kapoor, S., Arai, K. & Bhatia, R. (eds.). Springer Verlag, p. 158-172 15 p. (Advances in Intelligent Systems and Computing; vol. 881).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2018

An Efficient Method for Securely Storing and Handling of Genomic Data

Ki, Y. & Yoon, J. W., 2018 Jun 21, Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017. Institute of Electrical and Electronics Engineers Inc., p. 121-125 5 p. (Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Legal Consideration on the Use of Artificial Intelligence Technology and Self-regulation in Financial Sector: Focused on Robo-Advisors

Lee, K. Y., Kwon, H-Y. & Lim, J. I., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 323-335 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Model Parameter Estimation and Inference on Encrypted Domain: Application to Noise Reduction in Encrypted Images

Lee, S. & Yoon, J. W., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 115-126 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Opportunities and challenges in the intelligent society: Smart cities, digital inclusion, and cybersecurity

Kim, D., Kwon, H-Y., Jun, D., Lee, E., Hagen, L. & Chun, S. A., 2018 May 30, Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, DG.O 2018. Hinnant, C. C. & Zuiderwijk, A. (eds.). Association for Computing Machinery, a131. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Role of law as a guardian of the right to use public sector information: Case study of Korean government

Yoon, S. P., Joo, M. H. & Kwon, H-Y., 2018 May 30, Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, DG.O 2018. Hinnant, C. C. & Zuiderwijk, A. (eds.). Association for Computing Machinery, a83. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

Research on distribution of responsibility for de-identification policy of personal information

Joo, M. H., Yoon, S. P., Kim, S. Y. & Kwon, H-Y., 2017 Jun 7, DG.O 2017 - Proceedings of the 18th Annual International Conference on Digital Government Research: Innovations and Transformations in Government. Hinnant, C. C. & Ojo, A. (eds.). Association for Computing Machinery, p. 74-83 10 p. (ACM International Conference Proceeding Series; vol. Part F128275).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2015

The right to be forgotten: Standard on deleting the exposed personal information on the internet

Lee, H. J., Yun, J. H., Yoon, H. S. & Lee, K. H., 2015, Computer Science and Its Applications - Ubiquitous Information Technologies. Springer Verlag, Vol. 330. p. 883-889 7 p. (Lecture Notes in Electrical Engineering; vol. 330).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2014

A research for partition restoration techniques

Namgung, J., Hong, I. Y., Park, J., Lee, C. & Lee, S., 2014 Jan 1, Future Information Technology, FutureTech 2013. Springer Verlag, p. 315-322 8 p. (Lecture Notes in Electrical Engineering; vol. 276 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary Coded Genetic Algorithm with Ensemble Classifier for feature selection in JPEG steganalysis

Sachnev, V. & Kim, H. J., 2014 Jan 1, IEEE ISSNIP 2014 - 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings. IEEE Computer Society, 6827700

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Parkinson Disease Classification based on binary coded genetic algorithm and Extreme learning machine

Sachnev, V. & Kim, H. J., 2014 Jan 1, IEEE ISSNIP 2014 - 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings. IEEE Computer Society, 6827649

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)
2013

A framework for anomaly pattern recognition in electronic financial transaction using moving average method

Kim, A. C., Park, W. H. & Lee, D. H., 2013 Feb 26, IT Convergence and Security 2012. p. 93-99 7 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Aggregating CL-signatures revisited: Extended functionality and better efficiency

Lee, K., Lee, D. H. & Yung, M., 2013 Sep 5, Financial Cryptography and Data Security - 17th International Conference, FC 2013, Revised Selected Papers. p. 171-188 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7859 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

An attempt to generalize distortion measure for JPEG steganography

Sachnev, V. & Kim, H. J., 2013 Sep 3, Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Revised Selected Papers. p. 69-82 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7809 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A stackelberg game for cooperative cognitive radio network with active SUs

Roh, H., Jung, C., Lee, W. & Du, D. Z., 2013 May 15, 2013 International Conference on Computing, Networking and Communications, ICNC 2013. p. 911-915 5 p. 6504211. (2013 International Conference on Computing, Networking and Communications, ICNC 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Resource pricing game in geo-distributed clouds

Roh, H., Jung, C., Lee, W. & Du, D. Z., 2013 Sep 2, 2013 Proceedings IEEE INFOCOM 2013. p. 1519-1527 9 p. 6566947. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

30 Citations (Scopus)

Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

Lee, K., Choi, S. G., Lee, D. H., Park, J. H. & Yung, M., 2013 Dec 1, Advances in Cryptology, ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. PART 1 ed. p. 235-254 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8269 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

30 Citations (Scopus)

The contagion of malicious behaviors in online games

Woo, J., Kang, A. R. & Kim, H. K., 2013 Dec 1, Proceedings of the SIGCOMM 2013 and Best Papers of the Co-Located Workshops. 4 ed. p. 543-544 2 p. (Computer Communication Review; vol. 43, no. 4).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)
2012

An efficient method of extracting strings from unfixed-form data

Jeon, S., Park, J., Lee, K. G. & Lee, S., 2012 Oct 9, Future Information Technology, Application, and Service, FutureTech 2012. VOL. 1 ed. p. 425-434 10 p. (Lecture Notes in Electrical Engineering; vol. 164 LNEE, no. VOL. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A projection based learning meta-cognitive RBF network classifier for effective diagnosis of Parkinson's disease

Sateesh Babu, G., Suresh, S., Uma Sangumathi, K. & Kim, H. J., 2012 Aug 23, Advances in Neural Networks, ISNN 2012 - 9th International Symposium on Neural Networks, Proceedings. PART 2 ed. p. 611-620 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7368 LNCS, no. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

BAT: Bimodal cryptographic algorithm suitable for various environments

Lee, J., Jeong, K., Kang, J., Lee, Y., Sung, J., Chang, K. Y. & Hong, S., 2012 Nov 12, Computer Science and Its Applications, CSA 2012. p. 371-387 17 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Coexistence analysis between IMT system and DTV system in the 700MHz band

Kim, D. H., Oh, S. J. & Woo, J., 2012 Dec 1, 2012 International Conference on ICT Convergence: "Global Open Innovation Summit for Smart ICT Convergence", ICTC 2012. p. 284-288 5 p. 6386840. (International Conference on ICT Convergence).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Comparative study of push schemes in online social networking services

Ko, H., Pack, S. & Lee, W., 2012 Sep 24, ICUFN 2012 - 4th International Conference on Ubiquitous and Future Networks, Final Program. p. 225-226 2 p. 6261698. (ICUFN 2012 - 4th International Conference on Ubiquitous and Future Networks, Final Program).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Differential fault analysis on HAS-160 compression function

Kang, J., Jeong, K., Sung, J. & Hong, S., 2012 Nov 12, Computer Science and Its Applications, CSA 2012. p. 97-105 9 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Formal specifications for software-defined networking

Kang, M., Park, J., Shin, J., Nam, K. H., Shin, M. K. & Choi, J. Y., 2012 Oct 26, Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12. 1 p. (Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

On the security of an novel protocol for downloadable CAS

Jeong, H., Kim, S. & Won, D., 2012 May 8, Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12. 65. (Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Threshold identity-based broadcast encryption from identity-based encryption

Kim, K., Kim, M., Kim, H., Park, J. H. & Lee, D. H., 2012 Dec 17, Computer Applications for Database, Education, and Ubiquitous Computing - Int. Conferences, EL, DTA and UNESST 2012, Held as Part of the Future Generation Information Technol. Conf., FGIT 2012, Proc.. p. 99-102 4 p. (Communications in Computer and Information Science; vol. 352 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Weakness and simple improvement of anonymous mutual authentication protocol with link-layer

Jo, H., Kim, S. & Won, D., 2012 Nov 19, Proceedings of the CUBE International Information Technology Conference, CUBE 2012. p. 816-819 4 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution