Souhwan Jung
Orcid: 0000-0003-2676-3412
  According to our database1,
  Souhwan Jung
  authored at least 71 papers
  between 1998 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
    IEEE Access, 2025
    
  
  2024
Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking.
    
  
    Proceedings of the Information Security Applications - 25th International Conference, 2024
    
  
Balance, Multiple Augmentation, and Re-synthesis: A Triad Training Strategy for Enhanced Audio Deepfake Detection.
    
  
    Proceedings of the 25th Annual Conference of the International Speech Communication Association, 2024
    
  
    Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
    
  
  2023
Container Instrumentation and Enforcement System for Runtime Security of Kubernetes Platform with eBPF.
    
  
    Intell. Autom. Soft Comput., 2023
    
  
The Trade-Off Between Performance and Security of Virtualized Trusted Execution Environment on Android.
    
  
    Comput. Syst. Sci. Eng., 2023
    
  
    IEEE Access, 2023
    
  
    Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes, 2023
    
  
    Proceedings of the IEEE International Conference on Acoustics, 2023
    
  
  2022
    J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
    
  
    J. Comput. Sci., 2022
    
  
  2021
    IEEE Access, 2021
    
  
AppPACK: A Packaging Model for Single-Purpose Lightweight Virtualization Environment.
    
  
    IEEE Access, 2021
    
  
  2020
Automatic Generation of MAEC and STIX Standards for Android Malware Threat Intelligence.
    
  
    KSII Trans. Internet Inf. Syst., 2020
    
  
    IEEE Access, 2020
    
  
Enhancing Notation-Based Code Cloning Method With an External-Based Identifier Model.
    
  
    IEEE Access, 2020
    
  
Virtualization Technologies in the Android Framework and Compatibility with SEAndroid.
    
  
    Proceedings of the Information Security Applications - 21st International Conference, 2020
    
  
Entropy-Based Feature Grouping in Machine Learning for Android Malware Classification.
    
  
    Proceedings of the Information Security Applications - 21st International Conference, 2020
    
  
    Proceedings of the NLPIR 2020: 4th International Conference on Natural Language Processing and Information Retrieval, 2020
    
  
  2019
    Proceedings of the Mobile Internet Security - 4th International Symposium, 2019
    
  
Implementation of Private Base Station in Android Container Environment for Mobile Communication.
    
  
    Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019
    
  
  2018
    Digit. Investig., 2018
    
  
    Proceedings of the 2018 International Conference on Information Networking, 2018
    
  
    Proceedings of the 2nd International Conference on Machine Learning and Soft Computing, 2018
    
  
  2017
    Secur. Commun. Networks, 2017
    
  
    Int. J. Distributed Sens. Networks, 2017
    
  
    Proceedings of the Information Security Applications - 18th International Conference, 2017
    
  
    Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
    
  
  2016
    Int. J. Distributed Sens. Networks, 2016
    
  
    Proceedings of the 2016 International Conference on Information Networking, 2016
    
  
  2015
ESSE: Efficient Secure Session Establishment for Internet-Integrated Wireless Sensor Networks.
    
  
    Int. J. Distributed Sens. Networks, 2015
    
  
Secure Bootstrapping and Rebootstrapping for Resource-Constrained Thing in Internet of Things.
    
  
    Int. J. Distributed Sens. Networks, 2015
    
  
    Proceedings of the Information Security Applications - 16th International Workshop, 2015
    
  
    Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015
    
  
    Proceedings of the International Conference on Information and Communication Technology Convergence, 2015
    
  
  2014
    Proceedings of the Information Security Applications - 15th International Workshop, 2014
    
  
    Proceedings of the International Conference on Information Networking 2014, 2014
    
  
  2013
An Integrated Handover Authentication for FMIPv6 Over Heterogeneous Access Link Technologies.
    
  
    Wirel. Pers. Commun., 2013
    
  
    Proceedings of the International Conference on Information Networking 2013, 2013
    
  
    Proceedings of the 2013 International Conference on IT Convergence and Security, 2013
    
  
  2012
Unified security architecture and protocols using third party identity in V2V and V2I networks.
    
  
    Wirel. Commun. Mob. Comput., 2012
    
  
Modeling and analysis of the wireless channel formed by LED angle in visible light communication.
    
  
    Proceedings of the 2012 International Conference on Information Networking, 2012
    
  
  2011
    Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011
    
  
  2010
    IEEE Commun. Lett., 2010
    
  
Session key exchange and mutual authentication scheme between mobile machines in WLAN based ad hoc networks.
    
  
    Proceedings of the International Conference on Information and Communication Technology Convergence, 2010
    
  
Mutual Identification and Key Exchange Scheme in Secure VANETs Based on Group Signature.
    
  
    Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010
    
  
    Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010
    
  
  2009
    Proceedings of the Smart Spaces and Next Generation Wired/Wireless Networking, 2009
    
  
A Fast and Efficient Handover Authentication Achieving Conditional Privacy in V2I Networks.
    
  
    Proceedings of the Smart Spaces and Next Generation Wired/Wireless Networking, 2009
    
  
    Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
    
  
    Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
    
  
  2008
A Secure and Efficient Handover Authentication Based on Light-Weight Diffie-Hellman on Mobile Node in FMIPv6.
    
  
    IEICE Trans. Commun., 2008
    
  
  2007
    IEICE Trans. Commun., 2007
    
  
  2006
A Hierarchical Key Management Scheme for Authentication of Roaming Mobile Nodes between Domains in Mobile Networks.
    
  
    IEICE Trans. Commun., 2006
    
  
    Proceedings of the Ubiquitous Computing Systems, Third International Symposium, 2006
    
  
    Proceedings of the Public Key Infrastructure, 2006
    
  
    Proceedings of the Computational Intelligence and Security, International Conference, 2006
    
  
  2005
    Proceedings of the Information Security Applications, 6th International Workshop, 2005
    
  
    Proceedings of the Information Security, 8th International Conference, 2005
    
  
  2004
    Proceedings of the Information Security Applications, 5th International Workshop, 2004
    
  
    Proceedings of the Information and Communications Security, 6th International Conference, 2004
    
  
    Proceedings of the Information and Communications Security, 6th International Conference, 2004
    
  
    Proceedings of the Applied Cryptography and Network Security, 2004
    
  
  2000
Time-domain approach using multiple Kalman filters and EM algorithm to speech enhancement with nonstationary noise.
    
  
    IEEE Trans. Speech Audio Process., 2000
    
  
Smoothing approach using forward-backward Kalman filter with Markov switching parameters for speech enhancement.
    
  
    Signal Process., 2000
    
  
  1998
Dynamic bandwidth allocation for VBR video traffic using adaptive wavelet prediction.
    
  
    Proceedings of the 1998 IEEE International Conference on Communications, 1998
    
  
    Proceedings of the 1998 IEEE International Conference on Communications, 1998