If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Ji Won Yoon is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Cryptography Engineering & Materials Science
Nuclear magnetic resonance Engineering & Materials Science
Brain Engineering & Materials Science
Communication Engineering & Materials Science
Fluorescence Medicine & Life Sciences
Target Tracking Mathematics
Homomorphic Encryption Mathematics
Extended Kalman filters Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2006 2019

  • 559 Citations
  • 10 h-Index
  • 28 Conference contribution
  • 22 Article

A new bayesian approach to exploring damaged assets by monitoring mission failures caused by undetected attack

Shim, S. & Yoon, J. W., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 185-196 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bayesian networks
Bayesian Approach
Computer systems
Attack
Monitoring

Logarithm design on encrypted data with bitwise operation

Yoo, J. S., Song, B. K. & Yoon, J. W., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 105-116 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Logarithm
Cryptography
Homomorphic Encryption
Privacy Preserving
Taylor Expansion

An Efficient Method for Securely Storing and Handling of Genomic Data

Ki, Y. & Yoon, J. W., 2018 Jun 21, Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017. Institute of Electrical and Electronics Engineers Inc., p. 121-125 5 p. (Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing

Model Parameter Estimation and Inference on Encrypted Domain: Application to Noise Reduction in Encrypted Images

Lee, S. & Yoon, J. W., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 115-126 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Homomorphic Encryption
Noise Reduction
Noise abatement
Parameter estimation
Cryptography
1 Citation (Scopus)

A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers

Kim, H., Kim, H. & Yoon, J. W., 2017 Jan 10, Proceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015. Institute of Electrical and Electronics Engineers Inc., p. 7-12 6 p. 7812939

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry