Changhoon Lee

Orcid: 0000-0003-4292-5792

According to our database1, Changhoon Lee authored at least 115 papers between 1993 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Conditional Cube Attack on Lightweight Sycon-AEAD-64.
IEEE Internet Things J., April, 2024

Software-Defined Cryptography: A Design Feature of Cryptographic Agility.
IACR Cryptol. ePrint Arch., 2024

2023
Digital forensic investigation framework for the metaverse.
J. Supercomput., June, 2023

TPTNet: A Data-Driven Temperature Prediction Model Based on Turbulent Potential Temperature.
CoRR, 2023

Partial Granger causality-based feature selection algorithm for workload prediction in cloud systems.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

Optimization of Cloud Computing Workload Prediction Model with Domain-based Feature Selection Method.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2023

2022
CoVAC: A P2P smart contract-based intelligent smart city architecture for vaccine manufacturing.
Comput. Ind. Eng., 2022

2021
Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks.
KSII Trans. Internet Inf. Syst., 2021

Deep Particulate Matter Forecasting Model Using Correntropy-Induced Loss.
CoRR, 2021

2020
Smart seed selection-based effective black box fuzzing for IIoT protocol.
J. Supercomput., 2020

Deep unsupervised learning of turbulence for inflow generation at various Reynolds numbers.
J. Comput. Phys., 2020

HANMRE - An authenticated encryption secure against side-channel attacks for nonce-misuse and lightweight approaches.
Appl. Soft Comput., 2020

2019
Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor.
Int. J. Distributed Sens. Networks, 2019

Design and analysis of an effective graphics collaborative editing system.
EURASIP J. Image Video Process., 2019

Early-Bird or Last-Minute? The Impact of Mobile Channel Adoption on Purchasing Behavior.
Proceedings of the 40th International Conference on Information Systems, 2019

2018
A Reliability Comparison Method for OSINT Validity Analysis.
IEEE Trans. Ind. Informatics, 2018

Cryptanalysis on SDDO-Based BM123-64 Designs Suitable for Various IoT Application Targets.
Symmetry, 2018

CoWebDraw: a real-time collaborative graphical editing system supporting multi-clients based on HTML5.
Multim. Tools Appl., 2018

Efficient monolithic projection method for time-dependent conjugate heat transfer problems.
J. Comput. Phys., 2018

Color sensors and their applications based on real-time color image segmentation for cyber physical systems.
EURASIP J. Image Video Process., 2018

Information-based management mode based on value network analysis for livestock enterprises.
Enterp. Inf. Syst., 2018

2017
An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things.
Wirel. Pers. Commun., 2017

Cryptanalysis of the XO-64 Suitable for Wireless Systems.
Wirel. Pers. Commun., 2017

Spatial and temporal pyramid-based real-time gesture recognition.
J. Real Time Image Process., 2017

Fully decoupled monolithic projection method for natural convection problems.
J. Comput. Phys., 2017

An immersed boundary method for nonuniform grids.
J. Comput. Phys., 2017

Feature Selection Algorithm for Intrusions Detection System using Sequential Forward Search and Random Forest Classifier.
KSII Trans. Internet Inf. Syst., 2017

A privacy preserving authentication scheme for roaming in ubiquitous networks.
Clust. Comput., 2017

2016
Capability-based semantic matching for dynamic resource allocation in tactical edge environment.
J. Supercomput., 2016

Security analysis of SDDO-based block cipher for wireless sensor network.
J. Supercomput., 2016

Performance analysis for contention adaptation of M2M devices with directional antennas.
J. Supercomput., 2016

Editorial: A special section on "Emerging Platform Technologies".
J. Supercomput., 2016

A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.
Sensors, 2016

The protocol design and New approach for SCADA security enhancement during sensors broadcasting system.
Multim. Tools Appl., 2016

Guest Editorial: Data Mining and Machine Learning Technologies for Multimedia Information Retrieval and Recommendation.
Multim. Tools Appl., 2016

Guest Editorial: Automated Big Data Analysis for Social Multimedia Network Environments.
Multim. Tools Appl., 2016

Abnormal event detection in crowded scenes based on deep learning.
Multim. Tools Appl., 2016

A Security Protection Framework for Cloud Computing.
J. Inf. Process. Syst., 2016

A pre-conditioned implicit direct forcing based immersed boundary method for incompressible viscous flows.
J. Comput. Phys., 2016

A decoupled monolithic projection method for natural convection problems.
J. Comput. Phys., 2016

Analysis of velocity-components decoupled projection method for the incompressible Navier-Stokes equations.
Comput. Math. Appl., 2016

2015
Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis.
Peer-to-Peer Netw. Appl., 2015

Methodology and implementation for tracking the file sharers using BitTorrent.
Multim. Tools Appl., 2015

Related-Key Differential Attacks on COSB-128.
Int. J. Distributed Sens. Networks, 2015

A reconstruction method of intra-ventricular blood flow using color flow ultrasound: a simulation study.
Proceedings of the Medical Imaging 2015: Biomedical Applications in Molecular, 2015

New Efficient Padding Methods Secure Against Padding Oracle Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

Segment-wise online learning based on greedy algorithm for real-time multi-target tracking.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

2014
An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks.
J. Supercomput., 2014

Biclique cryptanalysis of PRESENT-80 and PRESENT-128.
J. Supercomput., 2014

Posted price model based on GRS and its optimization for improving grid resource sharing efficiency.
Telecommun. Syst., 2014

Editorial: special issue on "Recent advanced in ubiquitous infrastructure technology".
Telecommun. Syst., 2014

Knowledge management technologies for semantic multimedia services.
Multim. Tools Appl., 2014

Special issue on convergence of real-time 3D imaging and optical communications.
J. Real Time Image Process., 2014

Test-driven forensic analysis of satellite automotive navigation systems.
J. Intell. Manuf., 2014

A New Approach to Web Data Mining Based on Cloud Computing.
J. Comput. Sci. Eng., 2014

Special section on human-centric computing.
Inf. Sci., 2014

Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing.
Int. J. Distributed Sens. Networks, 2014

Greedy algorithm for real-time multi-object tracking.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

2013
Angle and ranging based localization method for ad hoc network.
J. Supercomput., 2013

Damaged backup data recovery method for Windows mobile.
J. Supercomput., 2013

Efficient three-party key exchange protocols with round efficiency.
Telecommun. Syst., 2013

ACM HotMobile 2013 demo: bringing in-situ social awareness to mobile systems: everyday interaction monitoring and its applications.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2013

Links organization for channel assignment in multi-radio wireless mesh networks.
Multim. Tools Appl., 2013

A numerical method for the calculation of drag and lift of a deformable droplet in shear flow.
J. Comput. Phys., 2013

Security Analysis of Scalable Block Cipher PP-1 Applicable to Distributed Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks.
EURASIP J. Wirel. Commun. Netw., 2013

A framework for unified digital evidence management in security convergence.
Electron. Commer. Res., 2013

On-site investigation methodology for incident response in Windows environments.
Comput. Math. Appl., 2013

2012
A learning automata-based fault-tolerant routing algorithm for mobile ad hoc networks.
J. Supercomput., 2012

The effective method of database server forensics on the enterprise environment.
Secur. Commun. Networks, 2012

Recent advances and future directions in multimedia and mobile computing.
Multim. Tools Appl., 2012

On-the-spot digital investigation by means of LDFS: Live Data Forensic System.
Math. Comput. Model., 2012

Task-based behavior detection of illegal codes.
Math. Comput. Model., 2012

Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED.
IACR Cryptol. ePrint Arch., 2012

Improved Differential Fault Analysis on Block Cipher SEED-128.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Methodology for Digital Investigation of Illegal Sharing Using BitTorrent.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

Methodology for Digital Forensic Investigation of iCloud.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

Analysis Framework to Detect Artifacts of Portable Web Browser.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

Related-Key Attack on the MD-64 Block Cipher Suitable for Pervasive Computing Environments.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes.
Comput. Commun., 2011

Cryptanalysis of CIKS-128 and CIKS-128H Suitable for Intelligent Multimedia and Ubiquitous Computing Systems.
Comput. Informatics, 2011

The Method of Database Server Detection and Investigation in the Enterprise Environment.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

2010
Robust Deniable Authentication Protocol.
Wirel. Pers. Commun., 2010

A power-, delay- and emergency-efficient protocol of ubiquitous sensor network systems for silver town applications.
J. Supercomput., 2010

Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device.
Telecommun. Syst., 2010

Special issue on "Modeling and simulation techniques for future generation communication networks".
Simul. Model. Pract. Theory, 2010

A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data.
Simul. Model. Pract. Theory, 2010

Context-Aware Middleware and Intelligent Agents for Smart Environments.
IEEE Intell. Syst., 2010

Chaos-based secure satellite imagery cryptosystem.
Comput. Math. Appl., 2010

2009
Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments.
J. Univers. Comput. Sci., 2009

Security analysis of the SCO-family using key schedules.
Inf. Sci., 2009

Implementation of a Smart Antenna Base Station for Mobile WiMAX Based on OFDMA.
EURASIP J. Wirel. Commun. Netw., 2009

Update on SEED: SEED-192/256.
Proceedings of the Advances in Information Security and Assurance, 2009

Design for Security Operating System.
Proceedings of the Third Asia International Conference on Modelling & Simulation, 2009

2008
Security analysis of the full-round DDO-64 block cipher.
J. Syst. Softw., 2008

Analysis of electronic structures and chemical bonding of metal-rich compounds. I. Density functional study of Pt metal, LiPt<sub>2</sub>, LiPt, and Li<sub>2</sub>Pt.
J. Comput. Chem., 2008

Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

2007
Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

Sized-Based Replacement-k Replacement Policy in Data Grid Environments.
Proceedings of the Parallel and Distributed Processing and Applications, 2006

Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis.
Proceedings of the Computational Science and Its Applications, 2006

HIGHT: A New Block Cipher Suitable for Low-Resource Device.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
Minimum-Maximum Exclusive Weighted-Mean Filter with Adaptive Window.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds.
Proceedings of the WEWoRC 2005, 2005

Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b.
Proceedings of the Progress in Cryptology, 2005

Related-Key Differential Attacks on Cobra-H64 and Cobra-H128.
Proceedings of the Cryptography and Coding, 2005

2004
Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H.
Proceedings of the Progress in Cryptology, 2004

Padding Oracle Attacks on Multiple Modes of Operation.
Proceedings of the Information Security and Cryptology, 2004

Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
Impossible Differential Cryptanalysis for Block Cipher Structures.
Proceedings of the Progress in Cryptology, 2003

Impossible Differential Attack on 30-Round SHACAL-2.
Proceedings of the Progress in Cryptology, 2003

2002
A Chosen Plaintext Linear Attack on Block Cipher CIKS-1.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

1993
Short Waves in a Rotating, Shallow Tank with Bathymetry: A Model Equation in the Mild-Slope Approximation.
SIAM J. Appl. Math., 1993


  Loading...