Soonhong Kwon

Orcid: 0009-0000-2729-3948

According to our database1, Soonhong Kwon authored at least 17 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A DID-based one-time session key authentication mechanism for secure human-AI chatbot communication.
Comput. Electr. Eng., 2025

Policy-driven contextual risk evaluation in OAuth 2.0 authentication frameworks for AI chatbot-based RPA systems.
Comput. Electr. Eng., 2025

Homomorphic Encryption-Based Facial Recognition for Dual-Layer Similarity Analysis of Modified Images.
IEEE Access, 2025

2024
Decentralized identifier based illegal digital content distribution tracking system using the format-preserving encryption algorithm.
Softw. Pract. Exp., 2024

Smart Contract Kill Switch for Security in a Private Blockchain-based Software Transaction System.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2024

Secure User-to-Chatbot Authentication Using One-Time Session Keys Based on DID.
Proceedings of the 2024 International Conference on Intelligent Computing and its Emerging Applications, 2024

OAuth 2.0 Authentication Framework with Context-based Risk Assessment for AI Chatbot-based RPA.
Proceedings of the 2024 International Conference on Intelligent Computing and its Emerging Applications, 2024

2023
UCI and EICN Integrated Model for Copyright Distribution Management.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Holographic Multi-Channel QR Code based Copyright Distribution Management System.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

OTT Service Copyright Management Framework Using ODRL Based on Hyperledger Fabric.
Proceedings of the 2023 International Conference on Intelligent Computing and Its Emerging Applications, 2023

VDIRS: Vulnerable Docker Image Response System.
Proceedings of the 2023 International Conference on Intelligent Computing and Its Emerging Applications, 2023

Simulation of Data Hijacking Attacks for a 5G-Advanced Core Network.
Proceedings of the 2023 Joint European Conference on Networks and Communications & 6G Summit, 2023

2021
Protocol fuzzing to find security vulnerabilities of RabbitMQ.
Concurr. Comput. Pract. Exp., 2021

2020
DIVDS: Docker Image Vulnerability Diagnostic System.
IEEE Access, 2020

Machine Learning based Malware Detection with the 2019 KISA Data Challenge Dataset.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

Automatic Seed Generation based Hybrid Fuzzing for Code Coverage Efficiency.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

2019
A Technical Survey on Methods for Detecting Rogue Access Points.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019


  Loading...