Graduate School of Information Study

  • Korea, Republic of

Research Output 1999 2020

Filter
Conference contribution
2020

Study on the Smart Speaker Security Evaluations and Countermeasures

Lee, J., Kang, S. & Kim, S-J., 2020 Jan 1, Advanced Multimedia and Ubiquitous Engineering - MUE/FutureTech 2019. Yang, L. T., Hao, F., Jeong, Y-S. & Park, J. J. (eds.). Springer Verlag, p. 50-70 21 p. (Lecture Notes in Electrical Engineering; vol. 590).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2019

A Bitwise Logistic Regression Using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme

Yoo, J. S., Hwang, J. H., Song, B. K. & Yoon, J. W., 2019 Jan 1, Information Security Practice and Experience - 15th International Conference, ISPEC 2019, Proceedings. Heng, S-H. & Lopez, J. (eds.). Springer, p. 20-40 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11879 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Homomorphic Encryption
Logistic Regression
Cryptography
Logistics
Division

Alert correlation using diamond model for cyber threat intelligence

Shin, Y., Lim, C., Park, M., Cho, S., Han, I., Oh, H. & Lee, K. H., 2019 Jan 1, Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019. Cruz, T. & Simoes, P. (eds.). Curran Associates Inc., p. 444-450 7 p. (European Conference on Information Warfare and Security, ECCWS; vol. 2019-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bayesian networks
Diamonds
Learning systems
Correlation methods
Intrusion detection
1 Citation (Scopus)

A Model for Detecting Cryptocurrency Transactions with Discernible Purpose

Baek, H., Oh, J., Kim, C. Y. & Lee, K. H., 2019 Jul 1, ICUFN 2019 - 11th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, p. 713-717 5 p. 8806126. (International Conference on Ubiquitous and Future Networks, ICUFN; vol. 2019-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Unsupervised learning
Labeling
Finance
Metadata
Innovation
1 Citation (Scopus)

A Study on smart city security policy based on blockchain in 5G Age

Noh, J. H. & Kwon, H-Y., 2019 Mar 18, 2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8669406. (2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Transparency
Authentication
Communication
Smart city
Industry

A Study on the Needs for Enhancement of Personal Information Protection in Cloud Computing Security Certification System

Kang, M. & Kwon, H-Y., 2019 Mar 18, 2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8669413. (2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Computer systems
Industry

Channel Independent Wi-Fi Backscatter Networks

Kim, T. & Lee, W., 2019 Apr 1, INFOCOM 2019 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 262-270 9 p. 8737376. (Proceedings - IEEE INFOCOM; vol. 2019-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wi-Fi
Communication
Demodulation

Data industry and legislations for personal information protection

Kwon, H-Y., Min, K. Y. & Chun, S. A., 2019 Jun 18, Proceedings of the 20th Annual International Conference on Digital Government Research: Governance in the Age of Artificial Intelligence, dg.o 2019. Salem, F., Zuiderwijk, A. & Chen, Y-C. (eds.). Association for Computing Machinery, p. 529-531 3 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
Economics

Oldie is Goodie: Effective user retention by in-game promotion event analysis

Kim, K. H. & Kim, H. K., 2019 Oct 17, CHI PLAY 2019 - Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play. Association for Computing Machinery, Inc, p. 171-180 10 p. (CHI PLAY 2019 - Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Purchasing
Profitability
Costs
Industry

Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves

Kim, S., Yoon, K., Park, Y. H. & Hong, S., 2019 Jan 1, Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Galbraith, S. D. & Moriai, S. (eds.). Springer, p. 273-292 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11922 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Isogenies
Isogeny
Cryptography
Odd
Curve
1 Citation (Scopus)

Poster: How to securely record logs based on ARM trust zone

Lee, S., Jo, H. J., Choi, W. & Lee, D. H., 2019 Jul 2, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 664-666 3 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Embedded systems
Communication
Big data

Reversible data hiding in JPEG images based on multiple histograms modification

Lu, X., Huang, F. & Kim, H. J., 2019 Jan 1, Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, Proceedings. Sun, X., Pan, Z. & Bertino, E. (eds.). Springer Verlag, p. 442-454 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11634 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data Hiding
Discrete cosine transforms
Histogram
Run Length
Discrete Cosine Transform

The All-Purpose Sword: North Korea's Cyber Operations and Strategies

Ji-Young, K., Lim, J. I. & Kyoung Gon, K., 2019 May 1, 2019 11th International Conference on Cyber Conflict: Silent Battle, CyCon 2019. Signoretti, M., Tolga, I., Minarik, T., Visky, G., Alatalu, S. & Biondi, S. (eds.). NATO CCD COE Publications, 8756954. (International Conference on Cyber Conflict, CYCON; vol. 2019-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Nuclear weapons
Military operations
Missiles
Computer systems
Economics
2 Citations (Scopus)

Vehicle communication using secrecy capacity

Ahn, N. Y., Lee, D. H. & Oh, S-J., 2019 Jan 1, Proceedings of the Future Technologies Conference (FTC) 2018 - Volume 2. Kapoor, S., Arai, K. & Bhatia, R. (eds.). Springer Verlag, p. 158-172 15 p. (Advances in Intelligent Systems and Computing; vol. 881).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Power transmission
Wireless networks
2018

An Efficient Method for Securely Storing and Handling of Genomic Data

Ki, Y. & Yoon, J. W., 2018 Jun 21, Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017. Institute of Electrical and Electronics Engineers Inc., p. 121-125 5 p. (Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing

Legal Consideration on the Use of Artificial Intelligence Technology and Self-regulation in Financial Sector: Focused on Robo-Advisors

Lee, K. Y., Kwon, H-Y. & Lim, J. I., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 323-335 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Artificial intelligence
Artificial Intelligence
Sector
Industry
Privacy

Model Parameter Estimation and Inference on Encrypted Domain: Application to Noise Reduction in Encrypted Images

Lee, S. & Yoon, J. W., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 115-126 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Homomorphic Encryption
Noise Reduction
Noise abatement
Parameter estimation
Cryptography

Opportunities and challenges in the intelligent society: Smart cities, digital inclusion, and cybersecurity

Kim, D., Kwon, H-Y., Jun, D., Lee, E., Hagen, L. & Chun, S. A., 2018 May 30, Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, DG.O 2018. Hinnant, C. C. & Zuiderwijk, A. (eds.). Association for Computing Machinery, a131. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
Smart city

Role of law as a guardian of the right to use public sector information: Case study of Korean government

Yoon, S. P., Joo, M. H. & Kwon, H-Y., 2018 May 30, Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, DG.O 2018. Hinnant, C. C. & Zuiderwijk, A. (eds.). Association for Computing Machinery, a83. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Information management
Raw materials
Managers
Lead
2017

Research on distribution of responsibility for de-identification policy of personal information

Joo, M. H., Yoon, S. P., Kim, S. Y. & Kwon, H-Y., 2017 Jun 7, DG.O 2017 - Proceedings of the 18th Annual International Conference on Digital Government Research: Innovations and Transformations in Government. Hinnant, C. C. & Ojo, A. (eds.). Association for Computing Machinery, p. 74-83 10 p. (ACM International Conference Proceeding Series; vol. Part F128275).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Accidents
Big data
2015
1 Citation (Scopus)

The right to be forgotten: Standard on deleting the exposed personal information on the internet

Lee, H. J., Yun, J. H., Yoon, H. S. & Lee, K. H., 2015, Computer Science and Its Applications - Ubiquitous Information Technologies. Springer Verlag, Vol. 330. p. 883-889 7 p. (Lecture Notes in Electrical Engineering; vol. 330).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Data privacy
2014
5 Citations (Scopus)

Binary Coded Genetic Algorithm with Ensemble Classifier for feature selection in JPEG steganalysis

Sachnev, V. & Kim, H. J., 2014 Jan 1, IEEE ISSNIP 2014 - 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings. IEEE Computer Society, 6827700

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feature extraction
Classifiers
Genetic algorithms
Set theory
Labels
7 Citations (Scopus)

Parkinson Disease Classification based on binary coded genetic algorithm and Extreme learning machine

Sachnev, V. & Kim, H. J., 2014 Jan 1, IEEE ISSNIP 2014 - 2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings. IEEE Computer Society, 6827649

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems
Genes
Genetic algorithms
Gene expression
Experiments
2010
2 Citations (Scopus)

Image enhancement for reducing LCD backlight power based on human visual characteristics

Lee, S., Lee, H. & Sull, S., 2010 Dec 1, Proceedings - 2010 Digital Image Computing: Techniques and Applications, DICTA 2010. p. 132-136 5 p. 5692553

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Image enhancement
Liquid crystal displays
Image quality
Light sources
Luminance
2001

Spectrum spreading algorithm for efficient embedding of watermarks

Yeo, I. K. & Kim, H. J., 2001, Proceedings of SPIE - The International Society for Optical Engineering. Schmalz, M. S. (ed.). Vol. 4475. p. 250-258 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

embedding
attack
Correlation methods
simulation