Graduate School of Information Study

  • Korea, Republic of

Research Output

Filter
Article
2020

A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure

Lee, S., Cho, S. M., Kim, H. & Hong, S., 2020 Jan 1, In : IEEE Access. 8, p. 5244-5255 12 p., 8948409.

Research output: Contribution to journalArticle

Open Access

Analysis of job stress's impact on job performance and turnover of cybersecurity professionals

Cho, J., Yoo, J. & Lim, J. I., 2020 Jan 1, In : ICIC Express Letters. 14, 4, p. 409-415 7 p.

Research output: Contribution to journalArticle

An automated end-to-end side channel analysis based on probabilistic model

Hwang, J. & Yoon, J. W., 2020 Apr 1, In : Applied Sciences (Switzerland). 10, 7, 2369.

Research output: Contribution to journalArticle

Open Access

Cyber attack and defense emulation agents

Yoo, J. D., Park, E., Lee, G., Ahn, M. K., Kim, D., Seo, S. & Kim, H. K., 2020 Mar 1, In : Applied Sciences (Switzerland). 10, 6, 2140.

Research output: Contribution to journalArticle

Open Access

Interceptor complexity analysis for mixed BPSK–QPSK modulated frequency hopping spread spectrum systems

Park, J. W., Yoo, D. S. & Oh, S. J., 2020 Jun, In : Physical Communication. 40, 101063.

Research output: Contribution to journalArticle

In-vehicle network intrusion detection using deep convolutional neural network

Song, H. M., Woo, J. & Kim, H. K., 2020 Jan, In : Vehicular Communications. 21, 100198.

Research output: Contribution to journalArticle

Open Access

Malware Detection in Self-Driving Vehicles Using Machine Learning Algorithms

Park, S. & Choi, J. Y., 2020 Jan 1, In : Journal of Advanced Transportation. 2020, 3035741.

Research output: Contribution to journalArticle

Open Access

MAuth-CAN: Masquerade-Attack-Proof Authentication for In-Vehicle Networks

Jo, H. J., Kim, J. H., Choi, H. Y., Choi, W., Lee, D. H. & Lee, I., 2020 Feb, In : IEEE Transactions on Vehicular Technology. 69, 2, p. 2204-2218 15 p., 8939382.

Research output: Contribution to journalArticle

New hybrid method for isogeny-based cryptosystems using edwards curves

Kim, S., Yoon, K., Kwon, J., Park, Y. H. & Hong, S., 2020 Mar, In : IEEE Transactions on Information Theory. 66, 3, p. 1934-1943 10 p., 8822753.

Research output: Contribution to journalArticle

1 Citation (Scopus)

On the Unlinkability of Fingerprint Shell

Lee, S. & Jeong, I. R., 2020 Jan 1, In : Security and Communication Networks. 2020, 8256929.

Research output: Contribution to journalArticle

Open Access

Parallelly Running k-Nearest Neighbor Classification over Semantically Secure Encrypted Data in Outsourced Environments

Park, J. & Lee, D. H., 2020 Jan 1, In : IEEE Access. 8, p. 64617-64633 17 p., 9051788.

Research output: Contribution to journalArticle

Open Access

Phantom Eavesdropping with Whitened RF Leakage

Shao, C., Jang, W., Park, H., Sung, J., Jung, Y. & Lee, W., 2020 Feb, In : IEEE Wireless Communications Letters. 9, 2, p. 232-235 4 p., 8882327.

Research output: Contribution to journalArticle

PhantomFS: File-Based Deception Technology for Thwarting Malicious Users

Lee, J., Choi, J., Lee, G., Shim, S. W. & Kim, T., 2020 Jan 1, In : IEEE Access. 8, p. 32203-32214 12 p., 8998256.

Research output: Contribution to journalArticle

Open Access

Power-balancing software implementation to mitigate side-channel attacks without using look-up tables

Kim, H. B., Kim, H. S. & Hong, S., 2020 Apr 1, In : Applied Sciences (Switzerland). 10, 7, 2454.

Research output: Contribution to journalArticle

Open Access

Reassembling Linux-based Hybrid RAID

Choi, J. H., Park, J. & Lee, S., 2020 May 1, In : Journal of Forensic Sciences. 65, 3, p. 966-973 8 p.

Research output: Contribution to journalArticle

Recent advances in deep learning-based side-channel analysis

Jin, S., Kim, S., Kim, H. S. & Hong, S., 2020 Jan 1, (Accepted/In press) In : ETRI Journal.

Research output: Contribution to journalArticle

Open Access

Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach

Lee, J. K., Chang, Y., Kwon, H. Y. & Kim, B., 2020 Jan 1, (Accepted/In press) In : Information Systems Frontiers.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

Single trace analysis against HyMES by exploitation of joint distributions of leakages

Park, B. G., Kim, S., Hong, S., Kim, H. S. & Seo, S. C., 2020 Mar 1, In : Applied Sciences (Switzerland). 10, 5, 1831.

Research output: Contribution to journalArticle

Open Access

User-Number Threshold-Based Small-Cell On/Off Control Scheme: Performance Evaluation and Optimization

Park, J. W., Yoo, D. S. & Oh, S. J., 2020 Jan, In : IEEE Transactions on Wireless Communications. 19, 1, p. 367-379 13 p., 8866747.

Research output: Contribution to journalArticle

2019

A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms

Song, B. K., Yoo, J. S., Hong, M. & Yoon, J. W., 2019 Jan 1, In : Security and Communication Networks. 2019, 3648671.

Research output: Contribution to journalArticle

Open Access

A Cancelable Template for the Low-Quality Fingerprints from Wearable Devices

Lee, S., Jeong, I. R. & Araujo, A., 2019 Jan 1, In : Security and Communication Networks. 2019, 4202671.

Research output: Contribution to journalArticle

Open Access

Advanced insider threat detection model to apply periodic work atmosphere

Oh, J., Kim, T. H. & Lee, K. H., 2019 Mar 31, In : KSII Transactions on Internet and Information Systems. 13, 3, p. 1722-1737 16 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis

Kim, D. & Kim, H. K., 2019 Jan 1, In : Security and Communication Networks. 2019, 6268476.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

Behavior analysis and anomaly detection for a digital substation on cyber-physical system

Kwon, Y., Lee, S., King, R., Lim, J. I. & Kim, H. K., 2019 Mar 1, In : Electronics (Switzerland). 8, 3, 326.

Research output: Contribution to journalArticle

Open Access

Catch ID if You CAN: Dynamic ID Virtualization Mechanism for the Controller Area Network

Sun, H., Lee, S. Y., Joo, K., Jin, H. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 158237-158249 13 p., 8886494.

Research output: Contribution to journalArticle

Open Access

Design of Processing-"Inside"-Memory Optimized for DRAM Behaviors

Lee, W. J., Kim, C. H., Paik, Y., Park, J., Park, I. & Kim, S. W., 2019 Jan 1, In : IEEE Access. 7, p. 82633-82648 16 p., 8743357.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

Efficient cancelable iris template generation for wearable sensors

Jeong, J. Y. & Jeong, I. R., 2019 Jan 1, In : Security and Communication Networks. 2019, 7473591.

Research output: Contribution to journalArticle

Open Access

EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method

Seo, M., Kim, S., Lee, D. H. & Park, J. H., 2019 Jan 1, In : International Journal of Information Security.

Research output: Contribution to journalArticle

Enabling Service Queue Isolation in Multi-Tenant Data Centers

Kim, G. & Lee, W., 2019 Nov, In : IEEE Communications Letters. 23, 11, p. 1949-1952 4 p., 8826238.

Research output: Contribution to journalArticle

Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication

Seo, M., Hwang, J. Y., Lee, D. H., Kim, S., Kim, S. H. & Park, J. H., 2019 Jan 1, In : IEEE Access. 7, p. 69892-69906 15 p., 8723318.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

How to guarantee the right to use PSI in the age of open data: Lessons from the data policy of South Korea

Yoon, S. P., Joo, M. H. & Kwon, H-Y., 2019 Jan 1, In : Information Polity. 24, 2, p. 131-146 16 p.

Research output: Contribution to journalArticle

Improving TCP performance in vehicle-to-grid (V2G) communication

Park, J., Kim, H. & Choi, J. Y., 2019 Nov, In : Electronics (Switzerland). 8, 11, 1206.

Research output: Contribution to journalArticle

Open Access

New approach to constructing noise source based on race conditions

Kim, S. G., Lee, S. J., Hong, D., Sung, J. & Hong, S., 2019 Jan 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E102A, 9, p. 1272-1284 13 p.

Research output: Contribution to journalArticle

Physical layer security of autonomous driving: Secure vehicle-to-vehicle communication in a security cluster

Ahn, N. Y. & Lee, D. H., 2019 Jan 1, In : Ad-Hoc and Sensor Wireless Networks. 45, 3-4, p. 293-336 44 p.

Research output: Contribution to journalArticle

Power grid estimation using electric network frequency signals

Bang, W. & Yoon, J. W., 2019 Jan 1, In : Security and Communication Networks. 2019, 1982168.

Research output: Contribution to journalArticle

Open Access

Practical silicon-backside-protection method for abnormally detection

Yi, K., Park, M., Cha, S. & Kim, S., 2019 Dec, In : Journal of Semiconductor Technology and Science. 19, 6, p. 577-584 8 p.

Research output: Contribution to journalArticle

Ransomware protection using the moving target defense perspective

Lee, S., Kim, H. K. & Kim, K., 2019 Sep 1, In : Computers and Electrical Engineering. 78, p. 288-299 12 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Reversible data hiding in JPEG images using quantized DC

Kim, S., Huang, F. & Kim, H. J., 2019 Jan 1, In : Entropy. 21, 9, 835.

Research output: Contribution to journalArticle

Open Access

Schemes for Privacy Data Destruction in a NAND Flash Memory

Ahn, N. Y. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 181305-181313 9 p., 8930558.

Research output: Contribution to journalArticle

Open Access

Secure and Lightweight Subflow Establishment of Multipath-TCP

Noh, G., Park, H., Roh, H. & Lee, W., 2019 Jan 1, In : IEEE Access. 7, p. 177438-177448 11 p., 8922596.

Research output: Contribution to journalArticle

Open Access

Securing Ultrasonic Sensors against Signal Injection Attacks Based on a Mathematical Model

Lee, S., Choi, W. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 107716-107729 14 p., 8786810.

Research output: Contribution to journalArticle

Open Access
Open Access
4 Citations (Scopus)

Transitive signature schemes for undirected graphs from lattices

Noh, G. & Jeong, I. R., 2019 Jun 30, In : KSII Transactions on Internet and Information Systems. 13, 6, p. 3316-3332 17 p.

Research output: Contribution to journalArticle

WebProfiler: User interaction prediction framework for web applications

Joo, M. & Lee, W., 2019 Jan 1, In : IEEE Access. 7, p. 154946-154958 13 p., 8880603.

Research output: Contribution to journalArticle

Open Access
2018

De-identification policy and risk distribution framework for securing personal information

Joo, M. H., Yoon, S. P., Kwon, H-Y. & Lim, J. I., 2018 Jan 1, In : Information Polity. 23, 2, p. 195-219 25 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks

Choi, W., Jo, H. J., Woo, S., Chun, J. Y., Park, J. & Lee, D. H., 2018 Jun 1, In : IEEE Transactions on Vehicular Technology. 67, 6, p. 4757-4770 14 p.

Research output: Contribution to journalArticle

28 Citations (Scopus)

Privacy preserving k-nearest neighbor for medical diagnosis in e-health cloud

Park, J. & Lee, D. H., 2018 Jan 1, In : Journal of Healthcare Engineering. 2018, 4073103.

Research output: Contribution to journalArticle

Open Access
3 Citations (Scopus)

Security Architecture for a Secure Database on Android

Park, J. H., Yoo, S. M., Kim, I-S. & Lee, D. H., 2018 Jan 26, In : IEEE Access. 6, p. 11482-11501 20 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2017

Establishing cyberspace norms using bright internet principles: In the case of the Korean legal system

Yoon, S. P. & Kwon, H-Y., 2017 Jan 1, In : Journal of Engineering and Applied Sciences. 12, Specialissue3, p. 6498-6509 12 p.

Research output: Contribution to journalArticle

2016

Characteristics of the legal framework of Korea in the age of data and looking forward - from media theory point of view

Park, S. J., Kim, S. Y., Kim, B. Y., Kim, D. W. & Kwon, H-Y., 2016 Jan 1, In : International Journal of Software Engineering and its Applications. 10, 5, p. 109-124 16 p.

Research output: Contribution to journalArticle