Donghyun Kim

Orcid: 0000-0002-4845-9369

Affiliations:
  • Georgia State University, Atlanta, GA, USA
  • Kennesaw State University, Marietta, Department of Computer Science
  • North Carolina Central University, Durham, Department of Mathematics and Physics
  • University of Texas at Dallas, Richardson
  • Hanyang University, Department of Computer Science and Engineering


According to our database1, Donghyun Kim authored at least 107 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Epidemic Vulnerability Index for Effective Vaccine Distribution Against Pandemic.
IEEE ACM Trans. Comput. Biol. Bioinform., 2023

2021
Group Delegated ID-Based Proxy Reencryption for the Enterprise IoT-Cloud Storage Environment.
Wirel. Commun. Mob. Comput., 2021

Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication.
Secur. Commun. Networks, 2021

On multi-path routing for reliable communications in failure interdependent complex networks.
J. Comb. Optim., 2021

Non-monotone submodular function maximization under k-system constraint.
J. Comb. Optim., 2021

An intelligent recommendation algorithm for red team strategy in edge computing powered massive Cyber Defense Exercise.
Comput. Commun., 2021

On Differential Privacy-Based Framework for Enhancing User Data Privacy in Mobile Edge Computing Environment.
IEEE Access, 2021

A Federated Framework for Fine-Grained Cloud Access Control for Intelligent Big Data Analytic by Service Providers.
IEEE Access, 2021

Differential Privacy using Fuzzy Convolution Neural Network (DP-FCNN) with Laplace Mechanism and Authenticated Access in Edge Computing.
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021

2020
Privacy Enhanced Location Sharing for Mobile Online Social Networks.
IEEE Trans. Sustain. Comput., 2020

Guest Editorial Introduction to the Special Section on Scalability and Privacy in Social Networks.
IEEE Trans. Netw. Sci. Eng., 2020

2019
Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis<sup>*</sup>.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

2018
On Practical Construction of Quality Fault-Tolerant Virtual Backbone in Homogeneous Wireless Networks.
IEEE/ACM Trans. Netw., 2018

Secure and Privacy-Aware Incentives-Based Witness Service in Social Internet of Vehicles Clouds.
IEEE Internet Things J., 2018

Guest Editorial: Special Issue on Combinatorial Optimization and Applications.
Algorithmica, 2018

On latency-aware tree topology construction for emergency responding VANET applications.
Proceedings of the IEEE INFOCOM 2018, 2018

A New Fog-Cloud Storage Framework with Transparency and Auditability.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Lightweight and Transparent Compensation Mechanism for Fog-Cloud Storage Framework.
Proceedings of the Fourth IEEE International Conference on Big Data Computing Service and Applications, 2018

2017
PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability.
Wirel. Commun. Mob. Comput., 2017

A New Comprehensive RSU Installation Strategy for Cost-Efficient VANET Deployment.
IEEE Trans. Veh. Technol., 2017

A New Constant Factor Approximation to Construct Highly Fault-Tolerant Connected Dominating Set in Unit Disk Graph.
IEEE/ACM Trans. Netw., 2017

On Theoretical Trajectory Planning of Multiple Drones To Minimize Latency in Search-and-Reconnaissance Operations.
IEEE Trans. Mob. Comput., 2017

Maximum Lifetime Combined Barrier-Coverage of Weak Static Sensors and Strong Mobile Sensors.
IEEE Trans. Mob. Comput., 2017

Maximizing target-temporal coverage of mission-driven camera sensor networks.
J. Comb. Optim., 2017

Integration of multi-omics data for integrative gene regulatory network inference.
Int. J. Data Min. Bioinform., 2017

A new outsourcing conditional proxy re-encryption suitable for mobile cloud environment.
Concurr. Comput. Pract. Exp., 2017

A new maximum fault-tolerance barrier-coverage problem in hybrid sensor network and its polynomial time exact algorithm.
Ad Hoc Networks, 2017

On Interdependent Failure Resilient Multi-path Routing in Smart Grid Communication Network.
Proceedings of the Combinatorial Optimization and Applications, 2017

Graph-Theory Based Simplification Techniques for Efficient Biological Network Analysis.
Proceedings of the Third IEEE International Conference on Big Data Computing Service and Applications, 2017

2016
Fault-Tolerant Connected Dominating Set.
Encyclopedia of Algorithms, 2016

Strengthening barrier-coverage of static sensor network with mobile sensor nodes.
Wirel. Networks, 2016

The first constant factor approximation for minimum partial connected dominating set problem in growth-bounded graphs.
Wirel. Networks, 2016

On Approximating Minimum 3-Connected m-Dominating Set Problem in Unit Disk Graph.
IEEE/ACM Trans. Netw., 2016

A joint optimization of data ferry trajectories and communication powers of ground sensors for long-term environmental monitoring.
J. Comb. Optim., 2016

An Adaptive Buffering Method for Practical HTTP Live Streaming on Smart OTT STBs.
KSII Trans. Internet Inf. Syst., 2016

Minimum (k, ω)-angle barrier coverage in wireless camera sensor networks.
Int. J. Sens. Networks, 2016

Editorial for special issue on Big Data and knowledge extraction for Cyber-Physical Systems 2016.
Int. J. Distributed Sens. Networks, 2016

On cost-aware biased respondent group selection for minority opinion survey.
Discret. Math. Algorithms Appl., 2016

Efficient respondents selection for biased survey using homophily-high social relation graph.
Discret. Math. Algorithms Appl., 2016

On efficient vaccine distribution strategy to suppress pandemic using social relation.
Discret. Math. Algorithms Appl., 2016

Cognitive radio based connectivity management for resilient end-to-end communications in VANETs.
Comput. Commun., 2016

Maximum lifetime dependable barrier-coverage in wireless sensor networks.
Ad Hoc Networks, 2016

Enhancing barrier coverage with β quality of monitoring in wireless camera sensor networks.
Ad Hoc Networks, 2016

Cost effective mobile and static road side unit deployment for vehicular adhoc networks.
Proceedings of the 2016 International Conference on Computing, 2016

A New Mobile Online Social Network Based Location Sharing with Enhanced Privacy Protection.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

A Simpler Constant Factor Approximation for the k-Connected m-Domination Set Problem in Unit Disk Graph.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Integrative Gene Regulatory Network inference using multi-omics data.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

Toward VANET Utopia: A New Privacy Preserving Trustworthiness Management Scheme for VANET.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

2015
Maximum lifetime suspect monitoring on the street with battery-powered camera sensors.
Wirel. Networks, 2015

Improving the influence under IC-N model in social networks.
Discret. Math. Algorithms Appl., 2015

PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability.
CoRR, 2015

Construction of higher spectral efficiency virtual backbone in wireless networks.
Ad Hoc Networks, 2015

On security and privacy issues of fog computing supported Internet of Things environment.
Proceedings of the 6th International Conference on the Network of the Future, 2015

A New Privacy-Aware Mutual Authentication Mechanism for Charging-on-the-Move in Online Electric Vehicles.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

Privacy aware incentive mechanism to collect mobile data while preventing duplication.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Bandwidth-aware breach-free barrier construction with VANET nodes for realtime fugitive search.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Covert communication based privacy preservation in mobile vehicular networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

A better constant approximation for minimum 3-connected m-dominating set problem in unit disk graph using Tutte decomposition.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

PTZ Camera Scheduling for Selected Area Coverage in Visual Sensor Networks.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Biased Respondent Group Selection Under Limited Budget for Minority Opinion Survey.
Proceedings of the Computational Social Networks - 4th International Conference, 2015

Social Relation Based Long-Term Vaccine Distribution Planning to Suppress Pandemic.
Proceedings of the Computational Social Networks - 4th International Conference, 2015

2014
Minimum Latency Multiple Data MULETrajectory Planning in Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2014

k-Fragility Maximization Problem to Attack Robust Terrorist Networks.
J. Inform. and Commun. Convergence Engineering, 2014

Computing an effective decision making group of a society using social network analysis.
J. Comb. Optim., 2014

Desperate Coverage Problem in Mission-Driven Camera Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Two new multi-path routing algorithms for fault-tolerant communications in smart grid.
Ad Hoc Networks, 2014

Fortifying Barrier-Coverage of Wireless Sensor Network with Mobile Sensor Nodes.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

Trade-off between Service Granularity and User Privacy in Smart Meter Operation.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

Imperfection Better Than Perfection: Beyond Optimal Lifetime Barrier Coverage in Wireless Sensor Networks.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

Barrier-Coverage for City Block Monitoring in Bandwidth Sensitive Vehicular Adhoc Networks.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

On Secure, Privacy-Aware, and Efficient Beacon Broadcasting among One-Hop Neighbors in VANETs.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Multiple heterogeneous data ferry trajectory planning in wireless sensor networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Conditional proxy re-encryption for secure big data group sharing in cloud environment.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

On secure data sharing in cloud environment.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

Constructing belt-barrier providing β-quality of monitoring with minimum camera sensors.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Influence maximization in social networks with user attitude modification.
Proceedings of the IEEE International Conference on Communications, 2014

Efficient Respondents Selection for Biased Survey Using Online Social Networks.
Proceedings of the Computing and Combinatorics - 20th International Conference, 2014

2013
On Construction of Quality Fault-Tolerant Virtual Backbone in Wireless Networks.
IEEE/ACM Trans. Netw., 2013

On bounding node-to-sink latency in wireless sensor networks with multiple sinks.
Int. J. Sens. Networks, 2013

Maximum lifetime effective-sensing partial target-coverage in camera sensor networks.
Proceedings of the 11th International Symposium and Workshops on Modeling and Optimization in Mobile, 2013

Sweep-Coverage with Energy-Restricted Mobile Wireless Sensor Nodes.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

On Combinatoric Approach to Circumvent Internet Censorship Using Decoy Routers.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Rumor restriction in Online Social Networks.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

Target-Temporal Effective-Sensing Coverage in Mission-Driven Camera Sensor Networks.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

A Dominating Set Based Approach to Identify Effective Leader Group of Social Network.
Proceedings of the Computing and Combinatorics, 19th International Conference, 2013

Vehicle Witnesses as a Service: Leveraging Vehicles as Witnesses on the Road in VANET Clouds.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
Constructing weakly connected dominating set for secure clustering in distributed sensor network.
J. Comb. Optim., 2012

Minimum Total Communication Power Connected Dominating Set in Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Minimizing data collection latency in wireless sensor network with multiple mobile elements.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

A Novel Multi-Channel Data Broadcast Scheme for Multimedia Database Systems.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

A New Localized Geometric Routing with Guaranteed Delivery on 3-D Wireless Networks.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

On sleep-wakeup scheduling of non-penetrable barrier-coverage of wireless sensors.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Minimum Data-Latency-Bound $k$-Sink Placement Problem in Wireless Sensor Networks.
IEEE/ACM Trans. Netw., 2011

2010
A Better Approximation Algorithm for Computing Connected Dominating Sets in Unit Ball Graphs.
IEEE Trans. Mob. Comput., 2010

Minimum average routing path clustering problem in multi-hop 2-D underwater sensor networks.
Optim. Lett., 2010

New dominating sets in social networks.
J. Glob. Optim., 2010

Hardness of <i>k</i>-Vertex-Connected Subgraph Augmentation Problem.
J. Comb. Optim., 2010

A Better Constant-Factor Approximation for Selected-Internal Steiner Minimum Tree.
Algorithmica, 2010

A New Constant Factor Approximation for Computing 3-Connected m-Dominating Sets in Homogeneous Wireless Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
Constructing Minimum Connected Dominating Sets with Bounded Diameters in Wireless Networks.
IEEE Trans. Parallel Distributed Syst., 2009

A Better Approximation for Minimum Average Routing Path Clustering Problem in 2-d Underwater Sensor Networks.
Discret. Math. Algorithms Appl., 2009

A PTAS for Minimum d-Hop Underwater Sink Placement Problem in 2-d Underwater Sensor Networks.
Discret. Math. Algorithms Appl., 2009

2008
Construction of Minimum Connected Dominating Set in 3-Dimensional Wireless Network.
Proceedings of the Wireless Algorithms, 2008

Recyclable Connected Dominating Set for Large Scale Dynamic Wireless Networks.
Proceedings of the Wireless Algorithms, 2008

(1+rho)-Approximation for Selected-Internal Steiner Minimum Tree.
Proceedings of the Computing and Combinatorics, 14th Annual International Conference, 2008

Two Constant Approximation Algorithms for Node-Weighted Steiner Tree in Unit Disk Graphs.
Proceedings of the Combinatorial Optimization and Applications, 2008

2005
Identity-Based Key Agreement Protocols in a Multiple PKG Environment.
Proceedings of the Computational Science and Its Applications, 2005


  Loading...