• 585 Citations
  • 10 h-Index
20062020

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Ji Won Yoon is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

  • 585 Citations
  • 10 h-Index
  • 32 Conference contribution
  • 25 Article

An automated end-to-end side channel analysis based on probabilistic model

Hwang, J. & Yoon, J. W., 2020 Apr 1, In : Applied Sciences (Switzerland). 10, 7, 2369.

Research output: Contribution to journalArticle

Open Access

Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression

Hong, M. Y. & Yoon, J. W., 2020 Jan 1, Information Security Applications - 20th International Conference, WISA 2019, Revised Selected Papers. You, I. (ed.). Springer, p. 155-166 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11897 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms

    Song, B. K., Yoo, J. S., Hong, M. & Yoon, J. W., 2019 Jan 1, In : Security and Communication Networks. 2019, 3648671.

    Research output: Contribution to journalArticle

    Open Access
  • A Bitwise Logistic Regression Using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme

    Yoo, J. S., Hwang, J. H., Song, B. K. & Yoon, J. W., 2019 Jan 1, Information Security Practice and Experience - 15th International Conference, ISPEC 2019, Proceedings. Heng, S-H. & Lopez, J. (eds.). Springer, p. 20-40 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11879 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A new bayesian approach to exploring damaged assets by monitoring mission failures caused by undetected attack

    Shim, S. & Yoon, J. W., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 185-196 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution