Graduate School of Information Study

  • Postal address

    Korea, Republic of

Filter
Conference contribution

Search results

  • 2014

    Stable matching with ties for cloud-assisted smart TV services

    Kim, G. & Lee, W., 2014, 2014 IEEE International Conference on Consumer Electronics, ICCE 2014. Institute of Electrical and Electronics Engineers Inc., p. 558-559 2 p. 6776132. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Unveiling group characteristics in online social games: A socio-economic analysis

    Chung, T., Han, J., Choi, D., Kwon, T., Kim, H. K. & Choi, Y., 2014 Apr 7, WWW 2014 - Proceedings of the 23rd International Conference on World Wide Web. Association for Computing Machinery, p. 889-899 11 p. (WWW 2014 - Proceedings of the 23rd International Conference on World Wide Web).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • 2013

    A framework for anomaly pattern recognition in electronic financial transaction using moving average method

    Kim, A. C., Park, W. H. & Lee, D. H., 2013, IT Convergence and Security 2012. p. 93-99 7 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Aggregating CL-signatures revisited: Extended functionality and better efficiency

    Lee, K., Lee, D. H. & Yung, M., 2013, Financial Cryptography and Data Security - 17th International Conference, FC 2013, Revised Selected Papers. p. 171-188 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7859 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • An attempt to generalize distortion measure for JPEG steganography

    Sachnev, V. & Kim, H. J., 2013, Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Revised Selected Papers. p. 69-82 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7809 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Approximations for minimum connected sensor cover

    Wu, L., Du, H., Wu, W., Li, D., Lv, J. & Lee, W., 2013, 2013 Proceedings IEEE INFOCOM 2013. p. 1187-1194 8 p. 6566910. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Citations (Scopus)
  • A stackelberg game for cooperative cognitive radio network with active SUs

    Roh, H., Jung, C., Lee, W. & Du, D. Z., 2013, 2013 International Conference on Computing, Networking and Communications, ICNC 2013. p. 911-915 5 p. 6504211. (2013 International Conference on Computing, Networking and Communications, ICNC 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • A study on weakness and improvement of Cloud Shredder

    Park, M., Kang, S. & Kim, S., 2013, 2013 International Conference on ICT Convergence: "Future Creative Convergence Technologies for New ICT Ecosystems", ICTC 2013. IEEE Computer Society, p. 1107-1113 7 p. 6675569. (International Conference on ICT Convergence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Attribute-based encryption for commercial content distribution

    Kim, H., Park, S., Park, J. H. & Lee, D. H., 2013, IT Convergence and Security 2012. p. 205-213 9 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Cannot take my allocation: Enforcing fairness by considering demand and payment in clouds

    Kim, G. & Lee, W., 2013, 2013 4th International Conference on the Network of the Future, NoF 2013. IEEE Computer Society, 6724514. (2013 4th International Conference on the Network of the Future, NoF 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Compressing JPEG compressed image using reversible data hiding technique

    Kang, S. U., Qu, X. & Kim, H. J., 2013, 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2013. 6694324. (2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • I know what the BOTs did yesterday: Full action sequence analysis using Naïve Bayesian algorithm

    Lee, J., Lim, J., Cho, W. & Kim, H. K., 2013, 2013 12th Annual Workshop on Network and Systems Support for Games, NetGames 2013. IEEE Computer Society, 6820611. (Annual Workshop on Network and Systems Support for Games).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Loyalty or profit? Early evolutionary dynamics of online game groups

    Kang, A. R., Park, J. & Kim, H. K., 2013, 2013 12th Annual Workshop on Network and Systems Support for Games, NetGames 2013. IEEE Computer Society, 6820602. (Annual Workshop on Network and Systems Support for Games).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Predictability of Android OpenSSL's pseudo random number generator

    Kim, S. H., Han, D. & Lee, D. H., 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 659-668 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    40 Citations (Scopus)
  • Price-based tethering for cooperative networking

    Lee, J., Shao, C., Roh, H. & Lee, W., 2013, International Conference on Information Networking 2013, ICOIN 2013. p. 379-384 6 p. 6496408. (International Conference on Information Networking).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Resource pricing game in geo-distributed clouds

    Roh, H., Jung, C., Lee, W. & Du, D. Z., 2013, 2013 Proceedings IEEE INFOCOM 2013. p. 1519-1527 9 p. 6566947. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Citations (Scopus)
  • Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

    Lee, K., Choi, S. G., Lee, D. H., Park, J. H. & Yung, M., 2013, Advances in Cryptology, ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. PART 1 ed. p. 235-254 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8269 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Citations (Scopus)
  • Sequential aggregate signatures made shorter

    Lee, K., Lee, D. H. & Yung, M., 2013, Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Proceedings. p. 202-217 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7954 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Sequential aggregate signatures with short public keys: Design, analysis and implementation studies

    Lee, K., Lee, D. H. & Yung, M., 2013, Public-Key Cryptography, PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. p. 423-442 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7778 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Citations (Scopus)
  • The contagion of malicious behaviors in online games

    Woo, J., Kang, A. R. & Kim, H. K., 2013, SIGCOMM 2013 - Proceedings of the ACM SIGCOMM 2013 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. p. 543-544 2 p. (SIGCOMM 2013 - Proceedings of the ACM SIGCOMM 2013 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • The contagion of malicious behaviors in online games

    Woo, J., Kang, A. R. & Kim, H. K., 2013, Proceedings of the SIGCOMM 2013 and Best Papers of the Co-Located Workshops. 4 ed. p. 543-544 2 p. (Computer Communication Review; vol. 43, no. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Topology control using selection diversity in ad hoc network

    Moon, K. R. & Oh, S. J., 2013, 2013 IEEE Wireless Communications and Networking Conference, WCNC 2013. p. 1198-1203 6 p. 6554734. (IEEE Wireless Communications and Networking Conference, WCNC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Vulnerabilities of android data sharing and malicious application to leaking private information

    Cho, T., Kim, J. H., Cho, H. J., Seo, S. H. & Kim, S., 2013, ICUFN 2013 - 5th International Conference on Ubiquitous and Future Networks. p. 37-42 6 p. 6614773. (International Conference on Ubiquitous and Future Networks, ICUFN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • 2012

    Analysis framework to detect artifacts of portable web browser

    Choi, J. H., Lee, K. G., Park, J., Lee, C. & Lee, S., 2012, Information Technology Convergence, Secure and Trust Computing, and Data Management, ITCS 2012 and STA 2012. p. 207-214 8 p. (Lecture Notes in Electrical Engineering; vol. 180 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Analysis of smartphone-based location information

    Kim, D., Bang, J. & Lee, S., 2012, Computer Science and Convergence, CSA 2011 and WCC 2011 Proceedings. p. 43-53 11 p. (Lecture Notes in Electrical Engineering; vol. 114 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • An efficient method of extracting strings from unfixed-form data

    Jeon, S., Park, J., Lee, K. G. & Lee, S., 2012, Future Information Technology, Application, and Service, FutureTech 2012. VOL. 1 ed. p. 425-434 10 p. (Lecture Notes in Electrical Engineering; vol. 164 LNEE, no. VOL. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An improved matrix encoding scheme for JPEG steganography

    Sachnev, V. & Kim, H. J., 2012, Digital-Forensics and Watermarking - 10th International Workshop, IWDW 2011, Revised Selected Papers. p. 3-15 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7128 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A projection based learning meta-cognitive RBF network classifier for effective diagnosis of Parkinson's disease

    Sateesh Babu, G., Suresh, S., Uma Sangumathi, K. & Kim, H. J., 2012, Advances in Neural Networks, ISNN 2012 - 9th International Symposium on Neural Networks, Proceedings. PART 2 ed. p. 611-620 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7368 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • A study for classification of web browser log and timeline visualization

    Oh, J., Son, N., Lee, S. & Lee, K., 2012, Information Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers. Lee, D. H. & Yung, M. (eds.). Springer Verlag, p. 192-207 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7690 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A study on static analysis model of mobile application for privacy protection

    Kim, S., Cho, J. I., Myeong, H. W. & Lee, D. H., 2012, Computer Science and Convergence, CSA 2011 and WCC 2011 Proceedings. p. 529-540 12 p. (Lecture Notes in Electrical Engineering; vol. 114 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • BAT: Bimodal cryptographic algorithm suitable for various environments

    Lee, J., Jeong, K., Kang, J., Lee, Y., Sung, J., Chang, K. Y. & Hong, S., 2012, Computer Science and Its Applications, CSA 2012. p. 371-387 17 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Biometric based secure communications without pre-deployed key for biosensor implanted in body sensor networks

    Cho, K. & Lee, D. H., 2012, Information Security Applications - 12th International Workshop, WISA 2011, Revised Selected Papers. p. 203-218 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7115 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • Coexistence analysis between IMT system and DTV system in the 700MHz band

    Kim, D. H., Oh, S. J. & Woo, J., 2012, 2012 International Conference on ICT Convergence: "Global Open Innovation Summit for Smart ICT Convergence", ICTC 2012. p. 284-288 5 p. 6386840. (International Conference on ICT Convergence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Comparative study of push schemes in online social networking services

    Ko, H., Pack, S. & Lee, W., 2012, ICUFN 2012 - 4th International Conference on Ubiquitous and Future Networks, Final Program. p. 225-226 2 p. 6261698. (ICUFN 2012 - 4th International Conference on Ubiquitous and Future Networks, Final Program).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Constant-approximation for target coverage problem in wireless sensor networks

    Ding, L., Wu, W., Willson, J., Wu, L., Lu, Z. & Lee, W., 2012, 2012 Proceedings IEEE INFOCOM, INFOCOM 2012. p. 1584-1592 9 p. 6195527. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    53 Citations (Scopus)
  • Differential fault analysis on HAS-160 compression function

    Kang, J., Jeong, K., Sung, J. & Hong, S., 2012, Computer Science and Its Applications, CSA 2012. p. 97-105 9 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Differential fault analysis on the block cipher HIGHT

    Lee, Y., Kim, J., Park, J. H. & Hong, S., 2012, Future Information Technology, Application, and Service, FutureTech 2012. VOL. 1 ed. p. 407-416 10 p. (Lecture Notes in Electrical Engineering; vol. 164 LNEE, no. VOL. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Energy efficient broadcast in multiradio multichannel wireless networks

    Ma, C., Li, D., Du, H., Ma, H., Wang, Y. & Lee, W., 2012, 2012 Proceedings IEEE INFOCOM, INFOCOM 2012. p. 1907-1915 9 p. 6195566. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Extended NIST prime family for efficient modular reduction

    Cho, Y. I., Chang, N. S., Kim, C. H. & Hong, S., 2012, Computer Science and Convergence, CSA 2011 and WCC 2011 Proceedings. p. 105-111 7 p. (Lecture Notes in Electrical Engineering; vol. 114 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Forensic analysis of android phone using Ext4 file system journal log

    Kim, D., Park, J., Lee, K. G. & Lee, S., 2012, Future Information Technology, Application, and Service, FutureTech 2012. VOL. 1 ed. p. 435-446 12 p. (Lecture Notes in Electrical Engineering; vol. 164 LNEE, no. VOL. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Citations (Scopus)
  • Formal specifications for software-defined networking

    Kang, M., Park, J., Shin, J., Nam, K. H., Shin, M. K. & Choi, J. Y., 2012, Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12. p. 51 1 p. (Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Improved differential fault analysis on block cipher SEED-128

    Lee, Y., Kim, J., Hong, S. & Lee, C., 2012, Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012. p. 675-680 6 p. 6354905. (Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Methodology for digital forensic investigation of iCloud

    Lee, J., Chung, H., Lee, C. & Lee, S., 2012, Information Technology Convergence, Secure and Trust Computing, and Data Management, ITCS 2012 and STA 2012. p. 197-206 10 p. (Lecture Notes in Electrical Engineering; vol. 180 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Methodology for digital investigation of illegal sharing using BitTorrent

    Park, S., Chung, H., Lee, C. & Lee, S., 2012, Information Technology Convergence, Secure and Trust Computing, and Data Management, ITCS 2012 and STA 2012. p. 187-195 9 p. (Lecture Notes in Electrical Engineering; vol. 180 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Modeling of bot usage diffusion across social networks in MMORPGs

    Woo, J., Kang, A. R. & Kim, H. K., 2012, Proceedings - WASA 2012: Workshop at SIGGRAPH Asia 2012. p. 13-18 6 p. (Proceedings - WASA 2012: Workshop at SIGGRAPH Asia 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • On the security of an novel protocol for downloadable CAS

    Jeong, H., Kim, S. & Won, D., 2012, Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12. 65. (Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Process algebraic specification of software defined networks

    Kang, M., Park, J., Choi, J. Y., Nam, K. H. & Shin, M. K., 2012, Proceedings - 2012 4th International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2012. p. 359-363 5 p. 6274368. (Proceedings - 2012 4th International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Recognizing numbers from the low-resolution patterns in digital images

    Tsomko, E. & Kim, H. J., 2012, 2012 13th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2012. 6226777. (International Workshop on Image Analysis for Multimedia Interactive Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security analysis of the keyschedule of ARIA-128

    Kang, H., Lee, Y., Jeong, K., Sung, J. & Hong, S., 2012, Computer Science and Its Applications, CSA 2012. p. 243-251 9 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Silhouette: Volume shadow copy analyzer

    Bang, J. & Lee, S., 2012, Future Information Technology, Application, and Service, FutureTech 2012. VOL. 1 ed. p. 721-730 10 p. (Lecture Notes in Electrical Engineering; vol. 164 LNEE, no. VOL. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution