Name
Affiliation
Papers
CHANGHOON LEE
Center for Information Security Technologies(CIST), Korea University, Seoul, Korea
34
Collaborators
Citations 
PageRank 
86
123
15.40
Referers 
Referees 
References 
318
976
396
Search Limit
100976
Title
Citations
PageRank
Year
Smart seed selection-based effective black box fuzzing for IIoT protocol00.342020
Deep unsupervised learning of turbulence for inflow generation at various Reynolds numbers.20.372020
Color sensors and their applications based on real-time color image segmentation for cyber physical systems00.342018
Information-based management mode based on value network analysis for livestock enterprises10.402018
A Reliability Comparison Method for OSINT Validity Analysis.10.482018
CoWebDraw: a real-time collaborative graphical editing system supporting multi-clients based on HTML5.10.352018
An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things.40.452017
Spatial and temporal pyramid-based real-time gesture recognition.30.402017
Cryptanalysis of the XO-64 Suitable for Wireless Systems.10.402017
A privacy preserving authentication scheme for roaming in ubiquitous networks.10.362017
Guest Editorial: Data Mining and Machine Learning Technologies for Multimedia Information Retrieval and Recommendation.10.352016
Capability-based semantic matching for dynamic resource allocation in tactical edge environment.10.352016
Security analysis of SDDO-based block cipher for wireless sensor network00.342016
Performance analysis for contention adaptation of M2M devices with directional antennas50.412016
Editorial: A special section on "Emerging Platform Technologies".250.972016
The protocol design and New approach for SCADA security enhancement during sensors broadcasting system70.472016
A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.10.352016
Abnormal event detection in crowded scenes based on deep learning.180.532016
Guest Editorial: Automated Big Data Analysis for Social Multimedia Network Environments.00.342016
Related-key differential attacks on COSB-12800.342015
Methodology and implementation for tracking the file sharers using BitTorrent20.402015
Knowledge management technologies for semantic multimedia services10.352014
On-site investigation methodology for incident response in Windows environments.00.342013
Methodology for Digital Investigation of Illegal Sharing Using BitTorrent00.342012
Analysis Framework to Detect Artifacts of Portable Web Browser10.722012
Methodology for Digital Forensic Investigation of iCloud10.362012
A statistical model for network data analysis: KDD CUP 99’ data evaluation and its comparing with MIT Lincoln Laboratory network data20.382010
A power-, delay- and emergency-efficient protocol of ubiquitous sensor network systems for silver town applications20.362010
Update on SEED: SEED-192/25600.342009
Security analysis of the full-round DDO-64 block cipher60.682008
Provable security for an RC6-like structure and a MISTY-FO-like structure against differential cryptanalysis60.752006
Related-key attacks on the full-round cobra-f64a and cobra-f64b60.572006
Related-Key differential attacks on cobra-s128, cobra-f64a, and cobra-f64b110.692005
Related-Key attacks on DDP based ciphers: CIKS-128 and CIKS-128H130.772004