Graduate School of Information Study

  • Korea, Republic of

Research Output 1999 2020

Filter
Article
2020

In-vehicle network intrusion detection using deep convolutional neural network

Song, H. M., Woo, J. & Kim, H. K., 2020 Jan, In : Vehicular Communications. 21, 100198.

Research output: Contribution to journalArticle

Open Access
Intrusion detection
Neural networks
Controllers
Network security
Automotive industry
2019

A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms

Song, B. K., Yoo, J. S., Hong, M. & Yoon, J. W., 2019 Jan 1, In : Security and Communication Networks. 2019, 3648671.

Research output: Contribution to journalArticle

Open Access
Cryptography
Data mining
Logic design
Cloud computing

A Cancelable Template for the Low-Quality Fingerprints from Wearable Devices

Lee, S., Jeong, I. R. & Araujo, A., 2019 Jan 1, In : Security and Communication Networks. 2019, 4202671.

Research output: Contribution to journalArticle

Open Access
Biometrics
Authentication
Image quality
Sensors
1 Citation (Scopus)

Advanced insider threat detection model to apply periodic work atmosphere

Oh, J., Kim, T. H. & Lee, K. H., 2019 Mar 31, In : KSII Transactions on Internet and Information Systems. 13, 3, p. 1722-1737 16 p.

Research output: Contribution to journalArticle

Unsupervised learning
Learning algorithms
Feature extraction
Industry

Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis

Kim, D. & Kim, H. K., 2019 Jan 1, In : Security and Communication Networks. 2019, 6268476.

Research output: Contribution to journalArticle

Open Access
Malware

Behavior analysis and anomaly detection for a digital substation on cyber-physical system

Kwon, Y., Lee, S., King, R., Lim, J. I. & Kim, H. K., 2019 Mar 1, In : Electronics (Switzerland). 8, 3, 326.

Research output: Contribution to journalArticle

Open Access
Testbeds
Information technology
Transmission control protocol
Internet protocols
Electric power systems

Catch ID if You CAN: Dynamic ID Virtualization Mechanism for the Controller Area Network

Sun, H., Lee, S. Y., Joo, K., Jin, H. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 158237-158249 13 p., 8886494.

Research output: Contribution to journalArticle

Open Access
Controllers
Authentication
Cryptography
Virtualization

Design of Processing-"Inside"-Memory Optimized for DRAM Behaviors

Lee, W. J., Kim, C. H., Paik, Y., Park, J., Park, I. & Kim, S. W., 2019 Jan 1, In : IEEE Access. 7, p. 82633-82648 16 p., 8743357.

Research output: Contribution to journalArticle

Open Access
Dynamic random access storage
Data storage equipment
Processing
Bandwidth
Computer operating systems

Efficient cancelable iris template generation for wearable sensors

Jeong, J. Y. & Jeong, I. R., 2019 Jan 1, In : Security and Communication Networks. 2019, 7473591.

Research output: Contribution to journalArticle

Open Access
Biometrics
Authentication
Wireless networks
Experiments
Wearable sensors

EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method

Seo, M., Kim, S., Lee, D. H. & Park, J. H., 2019 Jan 1, In : International Journal of Information Security.

Research output: Contribution to journalArticle

Encapsulation
Cryptography
Gaussian distribution
Decoding
Concretes

Enabling Service Queue Isolation in Multi-Tenant Data Centers

Kim, G. & Lee, W., 2019 Nov, In : IEEE Communications Letters. 23, 11, p. 1949-1952 4 p., 8826238.

Research output: Contribution to journalArticle

Data Center
Isolation
Queue
Conservation
Transport Protocol
1 Citation (Scopus)

Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication

Seo, M., Hwang, J. Y., Lee, D. H., Kim, S., Kim, S. H. & Park, J. H., 2019 Jan 1, In : IEEE Access. 7, p. 69892-69906 15 p., 8723318.

Research output: Contribution to journalArticle

Open Access
Authentication
Biometrics
Bandwidth
Dust
Processing

How to guarantee the right to use PSI in the age of open data: Lessons from the data policy of South Korea

Yoon, S. P., Joo, M. H. & Kwon, H-Y., 2019 Jan 1, In : Information Polity. 24, 2, p. 131-146 16 p.

Research output: Contribution to journalArticle

South Korea
Information management
guarantee
public sector
Innovation

Improving TCP performance in vehicle-to-grid (V2G) communication

Park, J., Kim, H. & Choi, J. Y., 2019 Nov, In : Electronics (Switzerland). 8, 11, 1206.

Research output: Contribution to journalArticle

Open Access
Transmission control protocol
Communication
Cables
Internet
Railroad cars

New approach to constructing noise source based on race conditions

Kim, S. G., Lee, S. J., Hong, D., Sung, J. & Hong, S., 2019 Jan 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E102A, 9, p. 1272-1284 13 p.

Research output: Contribution to journalArticle

Hazards and race conditions
Entropy
Thread
Essential Component
Software

Power grid estimation using electric network frequency signals

Bang, W. & Yoon, J. W., 2019 Jan 1, In : Security and Communication Networks. 2019, 1982168.

Research output: Contribution to journalArticle

Open Access
Circuit theory
Feature extraction
Microphones
Electromagnetic fields

Ransomware protection using the moving target defense perspective

Lee, S., Kim, H. K. & Kim, K., 2019 Sep 1, In : Computers and Electrical Engineering. 78, p. 288-299 12 p.

Research output: Contribution to journalArticle

Malware
Degradation

Reversible data hiding in JPEG images using quantized DC

Kim, S., Huang, F. & Kim, H. J., 2019 Jan 1, In : Entropy. 21, 9, 835.

Research output: Contribution to journalArticle

Open Access
embedding
direct current
coefficients
files
alternating current

Schemes for Privacy Data Destruction in a NAND Flash Memory

Ahn, N. Y. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 181305-181313 9 p., 8930558.

Research output: Contribution to journalArticle

Open Access
Data privacy
Flash memory
Data storage equipment
Costs

Secure and Lightweight Subflow Establishment of Multipath-TCP

Noh, G., Park, H., Roh, H. & Lee, W., 2019 Jan 1, In : IEEE Access. 7, p. 177438-177448 11 p., 8922596.

Research output: Contribution to journalArticle

Open Access
Interfaces (computer)
Transmission control protocol
Authentication
Network protocols
Electronic document identification systems

Securing Ultrasonic Sensors against Signal Injection Attacks Based on a Mathematical Model

Lee, S., Choi, W. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 107716-107729 14 p., 8786810.

Research output: Contribution to journalArticle

Open Access
Ultrasonic sensors
Mathematical models
Jamming
Sensors
Distance measurement
4 Citations (Scopus)
Open Access
situational awareness
Internet
leakage
Equipment and Supplies
human behavior

Transitive signature schemes for undirected graphs from lattices

Noh, G. & Jeong, I. R., 2019 Jun 30, In : KSII Transactions on Internet and Information Systems. 13, 6, p. 3316-3332 17 p.

Research output: Contribution to journalArticle

WebProfiler: User interaction prediction framework for web applications

Joo, M. & Lee, W., 2019 Jan 1, In : IEEE Access. 7, p. 154946-154958 13 p., 8880603.

Research output: Contribution to journalArticle

Open Access
Websites
Navigation
World Wide Web
Vector spaces
Learning systems
2018

De-identification policy and risk distribution framework for securing personal information

Joo, M. H., Yoon, S. P., Kwon, H-Y. & Lim, J. I., 2018 Jan 1, In : Information Polity. 23, 2, p. 195-219 25 p.

Research output: Contribution to journalArticle

liability
responsibility
privacy
risk society
exemption
19 Citations (Scopus)

Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks

Choi, W., Jo, H. J., Woo, S., Chun, J. Y., Park, J. & Lee, D. H., 2018 Jun 1, In : IEEE Transactions on Vehicular Technology. 67, 6, p. 4757-4770 14 p.

Research output: Contribution to journalArticle

Electronics
Controller
Controllers
Unit
Attack
2 Citations (Scopus)

Privacy preserving k-nearest neighbor for medical diagnosis in e-health cloud

Park, J. & Lee, D. H., 2018 Jan 1, In : Journal of Healthcare Engineering. 2018, 4073103.

Research output: Contribution to journalArticle

Open Access
Privacy
Health
Cloud computing
Servers
Network protocols
2 Citations (Scopus)

Security Architecture for a Secure Database on Android

Park, J. H., Yoo, S. M., Kim, I-S. & Lee, D. H., 2018 Jan 26, In : IEEE Access. 6, p. 11482-11501 20 p.

Research output: Contribution to journalArticle

Application programs
Access control
Android (operating system)
Data privacy
Application programming interfaces (API)
2017

Establishing cyberspace norms using bright internet principles: In the case of the Korean legal system

Yoon, S. P. & Kwon, H-Y., 2017 Jan 1, In : Journal of Engineering and Applied Sciences. 12, Specialissue3, p. 6498-6509 12 p.

Research output: Contribution to journalArticle

Internet
Communication
Industry
2016

Characteristics of the legal framework of Korea in the age of data and looking forward - from media theory point of view

Park, S. J., Kim, S. Y., Kim, B. Y., Kim, D. W. & Kwon, H-Y., 2016 Jan 1, In : International Journal of Software Engineering and its Applications. 10, 5, p. 109-124 16 p.

Research output: Contribution to journalArticle

Preface

Shi, Y. Q., Kim, H. J., Pérez-González, F. & Echizen, I., 2016, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9569

Research output: Contribution to journalArticle

2015

Erratum: A novel statistical approach to detect card frauds using transaction patterns

Lee, C. C. & Yoon, J. W., 2015 Apr 1, In : IEICE Transactions on Information and Systems. E98D, 4, p. 999 1 p.

Research output: Contribution to journalArticle

2012

Preace

Shi, Y. Q., Kim, H. J. & Katzenbeisser, S., 2012 Dec 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7110

Research output: Contribution to journalArticle

2011

Preface

Shi, Y. Q., Kim, H. J. & Katzenbeisser, S., 2011 Dec 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6730 LNCS

Research output: Contribution to journalArticle

2009
Bioinformatics
Computer science
Artificial intelligence
Artificial Intelligence
Computer Science
2008
Bioinformatics
Computer science
Artificial intelligence
Artificial Intelligence
Computer Science
Bioinformatics
Computer science
Artificial intelligence
Artificial Intelligence
Computer Science
Data Hiding
Multimedia
Transactions
2007
Artificial Intelligence
Bioinformatics
Computational Biology
Computer science
Artificial intelligence
2005
Digital watermarking
Digital Watermarking
Education
2001
3 Citations (Scopus)

Minimizing mean squared deviation of completion times with maximum tardiness constraint

Seo, J. H., Kim, C. B. & Lee, D. H., 2001 Feb 15, In : European Journal of Operational Research. 129, 1, p. 95-104 10 p.

Research output: Contribution to journalArticle

Tardiness
Completion Time
Deviation
Scheduling
Common Due Date
1999

Negotiated disk admission control in video streaming

Lee, W. & Srivastava, J., 1999 Oct 14, In : Electronics Letters. 35, 21, p. 1810-1812 3 p.

Research output: Contribution to journalArticle

Video streaming
Access control
Servers
Scheduling algorithms
Telecommunication traffic