Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Daniel P. Kennedy
Dan Graur
Barbara Aquilani
Ahmed Al-Madi
Maximilian Dürr
Jhonathan Pinzon
Liangliang Shang
Abdul Kashif Janjua
Jun Kim
Chen Ma
Home
/
Author
/
CHANGHOON LEE
Author Info
Open Visualization
Name
Affiliation
Papers
CHANGHOON LEE
Center for Information Security Technologies(CIST), Korea University, Seoul, Korea
34
Collaborators
Citations
PageRank
86
123
15.40
Referers
Referees
References
318
976
396
Search Limit
100
976
Publications (34 rows)
Collaborators (86 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Smart seed selection-based effective black box fuzzing for IIoT protocol
0
0.34
2020
Deep unsupervised learning of turbulence for inflow generation at various Reynolds numbers.
2
0.37
2020
Color sensors and their applications based on real-time color image segmentation for cyber physical systems
0
0.34
2018
Information-based management mode based on value network analysis for livestock enterprises
1
0.40
2018
A Reliability Comparison Method for OSINT Validity Analysis.
1
0.48
2018
CoWebDraw: a real-time collaborative graphical editing system supporting multi-clients based on HTML5.
1
0.35
2018
An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things.
4
0.45
2017
Spatial and temporal pyramid-based real-time gesture recognition.
3
0.40
2017
Cryptanalysis of the XO-64 Suitable for Wireless Systems.
1
0.40
2017
A privacy preserving authentication scheme for roaming in ubiquitous networks.
1
0.36
2017
Guest Editorial: Data Mining and Machine Learning Technologies for Multimedia Information Retrieval and Recommendation.
1
0.35
2016
Capability-based semantic matching for dynamic resource allocation in tactical edge environment.
1
0.35
2016
Security analysis of SDDO-based block cipher for wireless sensor network
0
0.34
2016
Performance analysis for contention adaptation of M2M devices with directional antennas
5
0.41
2016
Editorial: A special section on "Emerging Platform Technologies".
25
0.97
2016
The protocol design and New approach for SCADA security enhancement during sensors broadcasting system
7
0.47
2016
A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.
1
0.35
2016
Abnormal event detection in crowded scenes based on deep learning.
18
0.53
2016
Guest Editorial: Automated Big Data Analysis for Social Multimedia Network Environments.
0
0.34
2016
Related-key differential attacks on COSB-128
0
0.34
2015
Methodology and implementation for tracking the file sharers using BitTorrent
2
0.40
2015
Knowledge management technologies for semantic multimedia services
1
0.35
2014
On-site investigation methodology for incident response in Windows environments.
0
0.34
2013
Methodology for Digital Investigation of Illegal Sharing Using BitTorrent
0
0.34
2012
Analysis Framework to Detect Artifacts of Portable Web Browser
1
0.72
2012
Methodology for Digital Forensic Investigation of iCloud
1
0.36
2012
A statistical model for network data analysis: KDD CUP 99’ data evaluation and its comparing with MIT Lincoln Laboratory network data
2
0.38
2010
A power-, delay- and emergency-efficient protocol of ubiquitous sensor network systems for silver town applications
2
0.36
2010
Update on SEED: SEED-192/256
0
0.34
2009
Security analysis of the full-round DDO-64 block cipher
6
0.68
2008
Provable security for an RC6-like structure and a MISTY-FO-like structure against differential cryptanalysis
6
0.75
2006
Related-key attacks on the full-round cobra-f64a and cobra-f64b
6
0.57
2006
Related-Key differential attacks on cobra-s128, cobra-f64a, and cobra-f64b
11
0.69
2005
Related-Key attacks on DDP based ciphers: CIKS-128 and CIKS-128H
13
0.77
2004
1