Home / SCI

    1. SCI


    1. 특허


    1. 프로젝트


SCI paper
Thi-Thu-Huong Le, Yeongjae Shin, Myeongkil Kim, Howon Kim, Towards unbalanced multiclass intrusion detection with hybrid sampling methods and ensemble classification, Applied Soft Computing, Volume 157, 2024, 111517,
Rini Wisnu Wardhani;Dedy Septono Catur Putranto;Thi-Thu-Huong Le;Janghyun Ji;Howon Kim "Towards Hybrid Classical Deep Learning-Quantum Methods for Steganalysis," in IEEE Access, doi: 10.1109/ACCESS.2024.3381615.
R. W. Wardhani, D. S. C. Putranto and H. Kim, "High- and Half-Degree Quantum Multiplication for Post-Quantum Security Evaluation," in IEEE Access, vol. 12, pp. 8806-8821, 2024, doi: 10.1109/ACCESS.2024.3352157.
Yustus Eko Oktian, Thi-Thu-Huong Le, Uk Jo, Agus Mahardika Ari Laksmono, Howon Kim. Secure decentralized firmware update delivery service for Internet of Things." Internet of Things (2024): 101136.
Thi-Thu-Huong Le; Rini Wisnu Wardhani; Dedy Septono Catur Putranto; Uk Jo; Howon Kim "Towards Enhanced Attack Detection and Explanation in Intrusion Detection System-based IoT Environment Data," in IEEE Access, Nov 2023, doi: 10.1109/ACCESS.2023.3336678.
Thi-Thu-Huong Le, Yustus Eko Oktian, Uk Jo, and Howon Kim. 2023. "Time Series Electrical Motor Drives Forecasting Based on Simulation Modeling and Bidirectional Long-Short Term Memory" Sensors 23, no. 17: 7647.
D. S. C. Putranto, R. W. Wardhani, H. T. Larasati, J. Ji and H. Kim, "Depth-Optimization of Quantum Cryptanalysis on Binary Elliptic Curves," in IEEE Access, vol. 11, pp. 45083-45097, 2023, doi: 10.1109/ACCESS.2023.3273601.
H. T. Larasati, D. S. C. Putranto, R. W. Wardhani, J. Park and H. Kim, "Depth Optimization of FLT-Based Quantum Inversion Circuit," in IEEE Access, vol. 11, pp. 54910-54927, 2023, doi: 10.1109/ACCESS.2023.3280632.
D. S. C. Putranto, R. W. Wardhani, H. T. Larasati and H. Kim, "Space and Time-Efficient Quantum Multiplier in Post Quantum Cryptography Era," in IEEE Access, vol. 11, pp. 21848-21862, 2023, doi: 10.1109/ACCESS.2023.3252504.
Haeyoung Kim, Harashta Tatimma Larasati, Jonguk Park, Howon Kim and Donghyun Kwon, "DEMIX: Domain-Enforced Memory Isolation for Embedded System", Sensors 2023, 23(7), 3568;
Thi-Thu-Huong Le, Aji Teguh Prihatno, Yustus Eko Oktian, Hyoeun Kang, Howon Kim, “Exploring Local Explanation of Practical Industrial AI Applications: A Systematic Literature Review”, Applied Sciences,, May 2023, 13, 5809 
Prihatno, Aji Teguh, Naufal Suryanto, Sangbong Oh, Thi-Thu-Huong Le, and Howon Kim. 2023. "NFT Image Plagiarism Check Using EfficientNet-Based Deep Neural Network with Triplet Semi-Hard Loss" Applied Sciences 13, no. 5: 3072.
Hyoeun Kang, Yongsu Kim, Thi-Thu-Huong Le, Changwoo Choi, YoonYoung Hong, Seungdo Hong, Howon Kim "A new fluid flow approximation method using a vision transformer and a U-shaped convolutional neural network", AIP Advances 13, 025233 (2023);
Oktian, Yustus Eko, Thi-Thu-Huong Le, Uk Jo, and Howon Kim. 2022. "RealPrice: Blockchain-Powered Real-Time Pricing for Software-Defined Enabled Edge Network" Sensors 22, no. 24: 9639.
Yustus Eko Oktian, Thi-Thu-Huong Le, Uk Jo, and Howon Kim, "Blockchain-Powered Bandwidth Trading on SDN-Enabled Edge Network," in IEEE Access, 2022, doi: 10.1109/ACCESS.2022.3217534.
Thi-Thu-Huong Le, Hyoeun Kang, Howon Kim, "Towards Incompressible Laminar Flow Estimation Based on Interpolated Feature Generation and Deep Learning", Sustainability 2022, 14, 11996.
Y. E. Oktian, S. Heo and H. Kim, "SIGNORA: A Blockchain-Based Framework for Dataflow Integrity Provisioning in an Untrusted Data Pipeline," in IEEE Access, 2022, doi: 10.1109/ACCESS.2022.3199878.
Thi-Thu-Huong Le, Yustus Eko Oktian, and Howon Kim, "XGBoost for Imbalanced Multiclass Classification-Based Industrial Internet of Things Intrusion Detection Systems", Sustainability 2022, 14, 8707.
Thi-Thu-Huong Le, Haeyoung Kim, Hyoeun Kang, Howon Kim, “Classification and Interpretability for Intrusion Detection System using Ensemble Trees and SHAP Method”, Sensors 2022, 22, 1154.
A. M. Awaludin, Jonguk Park, R. W. Wardhani and Howon Kim, "A High-Performance ECC Processor Over Curve448 Based on a Novel Variant of the Karatsuba Formula for Asymmetric Digit Multiplier," in IEEE Access, vol. 10, pp. 67470-67481, 2022, doi: 10.1109/ACCESS.2022.3184786.
Jinjae Lee; Derry Pratama; Minjae Kim; Howon Kim; Donghyun Kwon "CoMeT: Configurable Tagged Memory Extension" in Sensors, vol. 21, pp. 7771, November 2021
Thi-Thu-Huong Le; Hyoeun Kang; Howon Kim, "Robust Adversarial Attack Against Explainable Deep Classification Models Based on Adversarial Images With Different Patch Sizes and Perturbation Ratios," in IEEE Access, vol. 9, pp. 133049-133061, September 2021
Yongsu Kim, Hyoeun Kang, Naufal Suryanto, Karashta Tatimma Larasati, Afifatul Mukaroh, Howon Kim. "Extended Spatially Localized Perturbation GAN (eSLP-GAN) for Robust Adversarial Camouflage Patches." Sensors 21.16 (2021): 5323.
Larasati, Harashta T.; Awaludin, Asep M.; Ji, Janghyun; Kim, Howon. 2021. "Quantum Circuit Design of Toom 3-Way Multiplication" Appl. Sci. 11, no. 9: 3752.
Thi-Thu-Huong Le; Shinwook Heo; Howon Kim, "Toward Load Identification Based on the Hilbert Transform and Sequence to Sequence Long Short-Term Memory," IEEE Transactions on Smart Grid, 12(4), 3252-3264
Awaludin, Asep M.; Larasati, Harashta T.; Kim, Howon. 2021. "High-Speed and Unified ECC Processor for Generic Weierstrass Curves over GF(p) on FPGA" Sensors 21, no. 4: 1451.
Afifatul Mukaroh, Thi-Thu-Huong Le, Howon Kim, "Background Load Denoising across Complex Load Based on Generative Adversarial Network to Enhance Load Identification." Sensors 20.19 (2020): 5674.
Naufal Suryanto,Hyoeun Kang,Yongsu Kim,Youngyeo Yun,Harashta Tatimma Larasati,Howon Kim, "A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization." Sensors 20.24 (2020): 7158.
Zhe Liu, Reza Azarderakhsh, Howon Kim, Hwajeong Seo, "Efficient Software Implementation of Ring-LWE Encryption on IoT Processors", IEEE TRANSACTIONS ON COMPUTERS, VOL. 69, NO. 10, October 2020
Thi-Thu-Huong Le, Hyoeun Kang and Howon Kim, "Household Appliance Classification Using Lower Odd-Numbered Harmonics and the Bagging Decision Tree", IEEE Access, Vol. 8, pp. 55937-55952, March 2020
Zhe Liu, Hwajeong Seo, Aniello Castiglione, Kim-Kwang Raymond Choo and Howon Kim, "Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things", IEEE Transactions on Dependable and Secure Computing, Vol. 16, No. 3, pp. 521-529, 1 May-June 2019
Thi-Thu-Huong Le, Yongsu Kim and Howon Kim, "Network Intrusion Detection Based on Novel Feature Selection Model and Various Recurrent Neural Networks", Applied Sciences, Vol. 9, No. 7, pp. 1392-1420, April 2019
Thi-Thu-Huong Le and Howon Kim, “Non-Intrusive Load Monitoring Based on Novel Transient Signal in Household Appliances with Low Sampling Rate”, energies 11(12), Dec 2018(SCIE)
Taehwan Park, Hwajeong Seo, Junsub Kim, Haeryong Park, and Howon Kim, “Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor”, Security and Communication Networks Vol 2018, Nov 2018(SCIE)
Taehwan Park, Hwajeong Seo, Sokjoon Lee, and Howon Kim, “Secure Data Encryption for Cloud-Based Human Care Services”, Journal of Sensors Vol 2018, 2018(SCIE)
Jihyun Kim, Howon Kim “The intelligent IoT common service platform architecture and service implementation”, JOURNAL OF SUPERCOMPUTING 74(9): 4242-4260, 2018 (SCI)
H Seo, J Kim, H Kim, Z Liu, “Personal identification number entry for Google glass”, Computers & Electrical Engineering (SCIE)
Z Liu, R Azarderakhsh, H Kim, H Seo, “Efficient Software Implementation of Ring-LWE Encryption on IoT Processors”, IEEE Transactions on Computers (SCI)
Jihyun Kim, Thi-Thu-Huong Le, Howon Kim,“Non-Intrusive Load Monitoring Based on Advanced Deep Learning and Novel Signature”, Hindawi Publishing Corporation, August, 2017 (SCIE)
Zhe Liu, Thomas Poppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Guneysu, Johann Großschädl, Howon Kim, Ingrid Verbauwhede,“High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers”, ACM Transactions on Embedded Computing Systems, July, 2017 (SCIE)
Hwajeong Seo, Zhe Liu, Johann Groszschaedl, Howon Kim, “Efficient arithmetic on ARM‐NEON and its application for high‐speed RSA implementation,” Security and Communication Networks, December, 2016, (SCIE)
Jongseok Choi, Seonhee Seok, Hwajeong Seo, Howon Kim, “A fast ARX model-based image encryption scheme”, Multimedia Tools and Applications, Nov, 2016, (SCIE)
Zhe Liu, Hwajeong Seo, Chien-Ning Chen, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim, “Secure GCM Implementation on AVR”, Preprint submitted to Discrete Applied Mathematics, Nov, 2016, (SCI)
Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim, “Binary field multiplication on ARMv8”, SECURITY AND COMMUNICATION NETWORKS, Sep, 2016,(SCIE)
Jihyun Kim, Yonghun Jeon, Howon Kim, “The intelligent IoT common service platform architecture and service implementation”, The Journal of Supercomputing, Aug, 2016, (SCI)
Zhe Liu, Hwajeong Seo, Howon Kim, Johann Groszschaedl, “Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes,” IEEE Transactions on Information Forensics & Security, July, 2016, (SCI)
Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim, “Hybrid Montgomery Reduction”, ACM Transactions on Embedded Computing Systems, July, 2016 (SCIE)
Zhe Liu, Hwajeong Seo, Howon Kim, “A Synthesis of Multi-Precision Multiplication and Squaring Techniques for 8-Bit Sensor Nodes: State-of-the-Art Research and Future Challenges”, Journal of Computer Science and Technology, Mar, 2016, (SCIE)
Zhe liu, Hwajeong Seo, Johann Grobschadl, Howon Kim, “A Survey of Multi-Precision Multiplication and Squaring Techniques for 8-bit Sensor Nodes,” Journal of Computer Science and Technology, (SCIE)
Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim, “Optimized Karatsuba Squaring on 8-bit AVR Processors,” Security and communication networks, May, 2015, (SCIE)
Zhe Liu, Hwajeong Seo, Qiuliang Xu, “Performance Evaluation of Twisted Edwards-Form Elliptic Curve Cryptography for Wireless Sensor Nodes,” security and communication networks, April, 2015, (SCIE)
Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim, “Karatsuba -Block Comb Technique for Elliptic Curve Cryptography over Binary Fields,” Security and communication networks, March, 2015, (SCIE)
Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim, “Montgomery Multiplication and Squaring for Optimal Prime Fields,” COSE, March, 2015, (SCIE)
Hwajeong Seo, Yeoncheol Lee, Hyunjin Kim, Taehwan Park, and Howon Kim. “Binary and prime field multiplication for public key cryptography on embedded microprocessors.” Security and Communication Networks, Issue 4, Pages 774-787, April, 2014, (SCIE)
Hwajeong Seo, Jihyun Kim, Jongseok Choi, Taehwan Park, Zhe Liu, Howon Kim, “Small Private Key MQPKS on Embedded Microprocessor.” Sensors, Vol. 14, No. 3, pp. 5441-5458, March, 2014, (SCIE)
Donggeon Lee, Dong-Chan Kim, Daesung Kwon, Howon Kim, “Efficient Hardware Implementation of the Lightweight Block Encryption Algorithm LEA,” Sensors, Vol. 14, No. 1, pp. 975-994, Jan, 2014, (SCIE)
Hwajeong Seo, Hyunjin Kim, Taehwan Park, Yeoncheol Lee, Zhe Liu, Howon Kim, “Fixed-Base Comb with Window-Non-Adjacent Form (NAF) Method for Scalar Multiplication.” Sensors, vol. 13, no. 7, pp. 9483-951, July, 2013, (SCIE)
Dong-geon Lee, Dooho Choi, Jungtaek Seo, and Howon Kim, “Reset Tree-based Optical Fault Detection”, Sensors, vol. 13, no.5, pp.6713-6729, May, 2013, (SCIE)
Hwajeong Seo, Kyung‐Ah Shim, and Howon Kim. “Performance enhancement of TinyECC based on multiplication optimizations.” Security and Communication Networks,Volume 6, Issue 2, pages 151–160, February, 2013, (SCIE)
You-Seok Lee, Kyung-Won Song, Dong-Guk Han, Ho-won Kim, and Hyoung-Nam Kim,“ Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals,”, Vol.E95-A, No.6, pp.1091-1094, IEICE, June, 2012, (SCIE)
Shirase, Masaaki, Tsuyoshi Takagi, Dooho Choi, DongGuk Han, and Howon Kim. “Efficient computation of Eta pairing over binary field with Vandermonde matrix.” ETRI journal 31, no. 2, pp. 129-139, April, 2009, (SCI)
Han, Dong-Guk, Dooho Choi, and Howon Kim. “Improved computation of square roots in specific finite fields.” Computers, IEEE Transactions on 58, no. 2, pp. 188-196, February, 2009, (SCI)
Choi, Dooho, Dongguk Han, and Howon Kim. “Construction of efficient and secure pairing algorithm and its application.” Communications and Networks, Journal of 10, no. 4, pp. 437-443, December, 2008, (SCIE)
Masaaki SHIRASE, Dong-Guk HAN, Yasushi HIBINO, Howon KIM, Tsuyoshi TAKAGI,”A More Compact Representation of XTR Cryptosystem,” IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E91-A, No.10, pp.2843-2850, Howon Kim, Thomas Wollinger, Dooho Choi, Dong-Guk Han, Munkyu Lee,”Hyperelliptic Curve Crypto-Coprocessor over Affine and Projective Coordinates,” ETRI Journal, Vol. 30, No. 3, pp.365-376, June 2008 (SCI)
TaeHyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Howon Kim, and Jongin Lim,”Power Analysis Attacks and Countermeasures on ηT Pairing over Binary Fields,” ETRI Journal, Vol. 30, No. 1, pp.68-80, February. 2008, (SCI)
Dong Kyue Kim, Mun-Kyu Lee, You Sung Kang, Sang-Hwa Chung, Won-Ju Yoon, Jung-Ki Min, and Howon Kim,”Design and Performance Analysis of Electronic Seal Protection Systems Based on AES,” ETRI Journal, Vol.29, No.6, pp.755-768, December, 2007, (SCI)
Howon-Kim, and Sunggu Lee”Design and Implementation of a Private and Public Key Crypto Processor and Its Application to a Security System,” IEEE Trans. Consumer Electronics, Vol.50, No.1, pp.214-224, February. 2004 (SCI)