Soohyung Kim

Orcid: 0000-0002-3190-0293

According to our database1, Soohyung Kim authored at least 27 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Insecurity of Chait et al.'s RSA-Based Aggregate Signature Scheme.
IEEE Access, 2024

2023
Facial Landmark, Head Pose, and Occlusion Analysis Using Multitask Stacked Hourglass.
IEEE Access, 2023

LAFD: Local-Differentially Private and Asynchronous Federated Learning With Direct Feedback Alignment.
IEEE Access, 2023

2022
Deep rank hashing network for cancellable face identification.
Pattern Recognit., 2022

A Key Recovery Protocol for Multiparty Threshold ECDSA Schemes.
IEEE Access, 2022

Performance Benchmarking of Local Differential Privacy for Mobile Devices.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

Lightweight Signature-based Range Proof.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

2021
Comments on "Identity-Based Revocation From Subset Difference Methods Under Simple Assumptions".
IEEE Access, 2021

LSFD: Lightweight Single Stage Masked Face Detector with a CPU Real-time Speed.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021

2020
Learning New Words from Keystroke Data with Local Differential Privacy.
IEEE Trans. Knowl. Data Eng., 2020

Open-set face identification with index-of-max hashing by learning.
Pattern Recognit., 2020

Is Your Android App Insecure? Patching Security Functions With Dynamic Policy Based on a Java Reflection Technique.
IEEE Access, 2020

2019
An anonymization protocol for continuous and dynamic privacy-preserving data collection.
Future Gener. Comput. Syst., 2019

Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication.
IEEE Access, 2019

2018
Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing.
IEEE Trans. Inf. Forensics Secur., 2018

Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment.
J. Inf. Process. Syst., 2018

AppWrapper: Patching Security Functions with Dynamic Policy on Your Insecure Android Apps.
Proceedings of the 2018 IEEE International Symposium on Software Reliability Engineering Workshops, 2018

Design of aging-resistant Wi-Fi fingerprint-based localization system with continuous active learning.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

2017
Utility-preserving anonymization for health data publishing.
BMC Medical Informatics Decis. Mak., 2017

Privacy-preserving data cube for electronic medical records: An experimental evaluation.
Int. J. Medical Informatics, 2017

A New and Practical Design of Cancellable Biometrics: Index-of-Max Hashing.
CoRR, 2017

A Cancellable Ranking Based Hashing Method for Fingerprint Template Protection.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

2016
Keystroke dynamics for authentication in smartphone.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

2015
Anomaly detection of access patterns in database.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015

2014
A framework to preserve the privacy of electronic health data streams.
J. Biomed. Informatics, 2014

2013
Tajo: A distributed data warehouse system on large clusters.
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

2006
Adaptive-Tangent Space Representation for Image Retrieval Based on Kansei.
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006


  Loading...