Junggab Son

Orcid: 0000-0002-6206-083X

According to our database1, Junggab Son authored at least 57 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Blockchain-Based One-Time Authentication for Secure V2X Communication Against Insiders and Authority Compromise Attacks.
IEEE Internet Things J., April, 2023

3-Multi ranked encryption with enhanced security in cloud computing.
Digit. Commun. Networks, April, 2023

An empirical analysis of image augmentation against model inversion attack in federated learning.
Clust. Comput., February, 2023

Leveraging Smart Contracts for Secure and Asynchronous Group Key Exchange Without Trusted Third Party.
IEEE Trans. Dependable Secur. Comput., 2023

2022
A Novel TCP/IP Header Hijacking Attack on SDN.
Proceedings of the IEEE INFOCOM 2022, 2022

Improving Fashion Attribute Classification Accuracy with Limited Labeled Data Using Transfer Learning.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

Defensive Adversarial Training for Enhancing Robustness of ECG based User Identification.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

2021
Efficient yet Robust Privacy Preservation for MPEG-DASH-Based Video Streaming.
Secur. Commun. Networks, 2021

Digestive neural networks: A novel defense strategy against inference attacks in federated learning.
Comput. Secur., 2021

On Defensive Neural Networks Against Inference Attack in Federated Learning.
Proceedings of the ICC 2021, 2021

Tackling Cold Start of Serverless Applications by Efficient and Adaptive Container Runtime Reusing.
Proceedings of the IEEE International Conference on Cluster Computing, 2021

2020
Privacy Enhanced Location Sharing for Mobile Online Social Networks.
IEEE Trans. Sustain. Comput., 2020

Research Challenges and Security Threats to AI-Driven 5G Virtual Emotion Applications Using Autonomous Vehicles, Drones, and Smart Devices.
IEEE Netw., 2020

A Federated Approach for Fine-Grained Classification of Fashion Apparel.
CoRR, 2020

Rethinking the Weakness of Stream Ciphers and Its Application to Encrypted Malware Detection.
IEEE Access, 2020

Recent Advances in Smart Contracts: A Technical Overview and State of the Art.
IEEE Access, 2020

Leveraging Smart Contracts for Asynchronous Group Key Agreement in Internet of Things.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020

SuperB: Superior Behavior-based Anomaly Detection Defining Authorized Users' Traffic Patterns.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

A Novel Resource Allocation scheme for NOMA-V2X-Femtocell with Channel Aggregation.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis<sup>*</sup>.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

2018
Nearest neighbor search with locally weighted linear regression for heartbeat classification.
Soft Comput., 2018

Secure and Privacy-Aware Incentives-Based Witness Service in Social Internet of Vehicles Clouds.
IEEE Internet Things J., 2018

A New Fog-Cloud Storage Framework with Transparency and Auditability.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Lightweight and Transparent Compensation Mechanism for Fog-Cloud Storage Framework.
Proceedings of the Fourth IEEE International Conference on Big Data Computing Service and Applications, 2018

2017
PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability.
Wirel. Commun. Mob. Comput., 2017

Maximum Lifetime Combined Barrier-Coverage of Weak Static Sensors and Strong Mobile Sensors.
IEEE Trans. Mob. Comput., 2017

Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection.
Sensors, 2017

A new outsourcing conditional proxy re-encryption suitable for mobile cloud environment.
Concurr. Comput. Pract. Exp., 2017

PB-MII: replacing static RSUs with public buses-based mobile intermediary infrastructure in urban VANET-based clouds.
Clust. Comput., 2017

2016
Event-driven partial barriers in wireless sensor networks.
Proceedings of the 2016 International Conference on Computing, 2016

A New Mobile Online Social Network Based Location Sharing with Enhanced Privacy Protection.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

A Hybrid Trust Management Framework for Vehicular Social Networks.
Proceedings of the Computational Social Networks - 5th International Conference, 2016

Toward VANET Utopia: A New Privacy Preserving Trustworthiness Management Scheme for VANET.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

2015
PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability.
CoRR, 2015

A New Privacy-Aware Mutual Authentication Mechanism for Charging-on-the-Move in Online Electric Vehicles.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

Privacy aware incentive mechanism to collect mobile data while preventing duplication.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Bandwidth-aware breach-free barrier construction with VANET nodes for realtime fugitive search.
Proceedings of the 34th IEEE Military Communications Conference, 2015

2014
SC-DVR: a secure cloud computing based framework for DVR service.
IEEE Trans. Consumer Electron., 2014

Two new multi-path routing algorithms for fault-tolerant communications in smart grid.
Ad Hoc Networks, 2014

Trade-off between Service Granularity and User Privacy in Smart Meter Operation.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

Conditional proxy re-encryption for secure big data group sharing in cloud environment.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

On secure data sharing in cloud environment.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

Media cloud: A secure and efficient virtualization framework for media service.
Proceedings of the IEEE International Conference on Consumer Electronics, 2014

C-DVR: Secure cloud based DVR framework based on personal virtualization.
Proceedings of the IEEE International Conference on Consumer Electronics, 2014

Using public buses as mobile gateways in vehicular clouds.
Proceedings of the IEEE International Conference on Consumer Electronics, 2014

Combining SVC and CAS modules to support heterogeneous devices.
Proceedings of the International Conference on Electronics, Information and Communications, 2014

2013
Privacy-aware route tracing and revocation games in VANET-based clouds.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

Privacy Preserving Cloud-Based Computing Platform (PPCCP) for Using Location Based Services.
Proceedings of the IEEE/ACM 6th International Conference on Utility and Cloud Computing, 2013

Traffic information system: A lightweight geocast-based piggybacking strategy for cooperative awareness in VANET.
Proceedings of the IEEE International Conference on Consumer Electronics, 2013

Vehicle Witnesses as a Service: Leveraging Vehicles as Witnesses on the Road in VANET Clouds.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Towards Achieving Anonymity in LBS: A Cloud Based Untrusted Middleware.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

TIaaS: Secure Cloud-assisted Traffic Information Dissemination in Vehicular Ad Hoc Networks.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013

2012
ID-based key management scheme using threshold decryption for OPMD environment.
Proceedings of the IEEE International Conference on Consumer Electronics, 2012

Key management scheme using secret sharing for multi-device based DRM.
Proceedings of the IEEE International Conference on Consumer Electronics, 2012

Conditional privacy preserving security protocol for NFC applications.
Proceedings of the IEEE International Conference on Consumer Electronics, 2012

Rethinking Vehicular Communications: Merging VANET with cloud computing.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2011
PVR: a novel PVR scheme for content protection.
IEEE Trans. Consumer Electron., 2011


  Loading...