Changhee Hahn

Orcid: 0000-0003-4334-0411

Affiliations:
  • Chung-Ang University, Seoul, School of Computer Science and Engineering
  • Korea University, Department of Computer Science and Engineering


According to our database1, Changhee Hahn authored at least 36 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Deep Learning-Based Detection for Multiple Cache Side-Channel Attacks.
IEEE Trans. Inf. Forensics Secur., 2024

Detecting Backdoors Embedded in Ensembles.
Proceedings of the International Conference on Electronics, Information, and Communication, 2024

2023
Delegatable Order-Revealing Encryption for Reliable Cross-Database Query.
IEEE Trans. Serv. Comput., 2023

Multi-Key Similar Data Search on Encrypted Storage With Secure Pay-Per-Query.
IEEE Trans. Inf. Forensics Secur., 2023

Certificate Transparency With Enhanced Privacy.
IEEE Trans. Dependable Secur. Comput., 2023

VerSA: Verifiable Secure Aggregation for Cross-Device Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Shedding Light on Blind Spot of Backward Privacy in Dynamic Searchable Symmetric Encryption.
IEEE Access, 2023

Priest: Adversarial Attack Detection Techniques for Signal Injection Attacks.
IEEE Access, 2023

2022
Enabling Fast Public Auditing and Data Dynamics in Cloud Services.
IEEE Trans. Serv. Comput., 2022

Efficient IoT Management With Resilience to Unauthorized Access to Cloud Storage.
IEEE Trans. Cloud Comput., 2022

Verifiable Outsourced Decryption of Encrypted Data From Heterogeneous Trust Networks.
IEEE Internet Things J., 2022

Order-Hiding Range Query Over Encrypted Cloud Data.
IEEE Access, 2022

Asymptotically Optimal and Secure Multiwriter/Multireader Similarity Search.
IEEE Access, 2022

Downgrading Backward Privacy of Searchable Encryption.
Proceedings of the International Conference on Information Networking, 2022

2021
Enabling Fast Public Auditing and Data Dynamics in Cloud Services.
Proceedings of the IEEE World Congress on Services, 2021

Real-time Detection of Cache Side-channel Attack Using Non-cache Hardware Events.
Proceedings of the International Conference on Information Networking, 2021

2020
(In-)Security of Cookies in HTTPS: Cookie Theft by Removing Cookie Flags.
IEEE Trans. Inf. Forensics Secur., 2020

Forward Secure Public Key Encryption with Keyword Search for Cloud-assisted IoT.
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020

2019
Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage.
Wirel. Pers. Commun., 2019

Secure deduplication with reliable and revocable key management in fog computing.
Peer-to-Peer Netw. Appl., 2019

Trustworthy Delegation Toward Securing Mobile Healthcare Cyber-Physical Systems.
IEEE Internet Things J., 2019

Analysis of Forward Private Searchable Encryption and Its Application to Multi-Client Settings.
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019

2018
Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks.
Multim. Tools Appl., 2017

Secure deduplication for multimedia data with user revocation in cloud storage.
Multim. Tools Appl., 2017

Cloud-based biometrics processing for privacy-preserving identification.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Privacy-preserving public auditing for educational multimedia data in cloud computing.
Multim. Tools Appl., 2016

Enhanced authentication for outsourced educational contents through provable block possession.
Multim. Tools Appl., 2016

Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks.
Mob. Inf. Syst., 2016

Efficient and privacy-preserving biometric identification in cloud.
ICT Express, 2016

A survey on MITM and its countermeasures in the TLS handshake protocol.
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016

POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Scalable and secure Private Set intersection for big data.
Proceedings of the 2016 International Conference on Big Data and Smart Computing, 2016

2014
Secure Device-to-Device Authentication in Mobile Multi-hop Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

A Privacy Threat in 4th Generation Mobile Telephony and Its Countermeasure.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014


  Loading...