Thi-Thu-Huong Le, Andro Aprila Adiputra, Muhammad Iqbal, Yeonjeong Hwang, Howon Kim. Credit Card Fraud Detection Using Hybrid Sampling and Variant Deep Learning Models. PlatCon 2024. |
Thi-Thu-Huong Le, Jiwon Yun, Jaehyun Kim, Andro Aprila Adiputra, Howon Kim. Robust MQTT IoT Intrusion Detection Systems Using Boosting and Bagging Models. PlatCon 2024. |
Yeonjeong Hwang, Thi-Thu-Huong Le, Rini Wisnu Wardhani, Dedy Septono Catur Puranto, Howon Kim. Enhancing SQL Injection Detection Using Ensemble Learning and Boosting Models. PlatCon 2024. |
Jaehyun Kim, Thi-Thu-Huong Le, Sangmyeong Lee, Howon Kim. Leveraging Fine-Tuning DistilBERT for Detecting Vulnerabilities in Ethereum Smart Contracts. PlatCon 2024. |
Thi-Thu-Huong Le, Naufal Suryanto, Howon Kim, Janghyun Ji, Shinwook Heo, “Enhancing Intrusion Detection and Explanations for Imbalanced Vehicle CAN Network Data”, The 12th International Symposium on Information and Communication Technology, Ho Chi Minh, Vietnam, December 2023, DOI: https://doi.org/10.1145/3628797.3628994. |
H. T. Larasati, M. Firdaus and H. Kim, "Quantum Federated Learning: Remarks and Challenges," 2022 IEEE 9th International Conference on Cyber Security and Cloud Computing (CSCloud)/2022 IEEE 8th International Conference on Edge Computing and Scalable Cloud (EdgeCom), Xi'an, China, 2022, pp. 1-5, doi: 10.1109/CSCloud-EdgeCom54986.2022.00010. |
Aji Teguh Prihatno; Hyoeun Kang; Chang Woo Choi; Thi-Thu-Huong Le; Shinwook Heo; Myeongkil Kim; Howon Kim(2023, February). 2D Fluid Flows Prediction Based on U-Net Architecture. In 2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC) (pp. 452-456). IEEE, doi.org/10.1109/ICAIIC57133.2023.10066980. |
D. Kim, U. Jo, Y. Kim, Y. E. Oktian and H. Kim, "Design and Implementation of a Blockchain Based Interworking of oneM2M and LWM2M IoT Systems," Journal of Information Processing Systems, vol. 19, no. 1, pp. 89-97, 2023. DOI: 10.3745/JIPS.01.0093. |
Naufal Suryanto, Yongsu Kim, Hyoeun Kang, Harashta Tatimma Larasati, Youngyeo Yun, Thi-Thu-Huong Le, Hunmin Yang, Se-Yoon Oh, Howon Kim "DTA: Physical Camouflage Attacks using Differentiable Transformation Network", Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2022, pp. 15305-15314 |
Thi-Thu-Huong Le, Hyeoun Kang, Howon Kim (Feb 2019), “The Impact of PCA-Scale Improving GRU Performance for Intrusion Detection”, PlatCon2019, IEEE, https://ieeexplore.ieee.org/document/8668960. |
Thi-Thu-Huong Le, Taehwan Park, Dongkeun Cho, Howon Kim (Jul 2018), “An Effective Classifier for DoS Attack in Wireless Sensor Network”, (July 2018), The 10th International Conference on Ubiquitous and Future Networks (ICUNF), IEEE, https://ieeexplore.ieee.org/document/8436999. |
Thi-Thu-Huong Le, Jihyun Kim, Howon Kim (Feb 2017), “An Effective Intrusion Detection Classifier using Long Short-Term Memory with Gradient Descent Optimization”, In Proc. 2017 International Platform Technology and Service (PlatCon), DOI: 10.1109/PlatCon.2017.7883684, pp. 1-6, https://ieeexplore.ieee.org/abstract/document/7883684. |
Thi-Thu-Huong Le, Jihyun Kim, Howon Kim (Jul 2016), “Classification Performance using Gated Recurrent Unit Recurrent Neural Network on Energy Disaggregation”, In proceeding 2016 International Conference on Machine Learning and Cybernetics (ICMLC) (Rank B3), ISSN: 2160-1348, pp.105-110, DOI: 10.1109/ICMLC.2016.7860885, https://ieeexplore.ieee.org/document/7860885. |
Jihyun Kim, Jaehyun Kim, Huong Le Thi Thu, and Howon Kim (Feb 2016), “Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection”, In proceeding on the International Conference on Platform Technology and Service, pp.1-5, DOI: 10.1109/PlatCon.2016.7456805, https://ieeexplore.ieee.org/document/7456805. |
U. Jo, Y. E. Oktian, D. Kim, S. Oh, H. Lee and H. Kim, "A Zero-Knowledge-Range-Proof-based Privacy-Preserving Blockchain Platform for COVID-19 Contact Tracing," 2022 International Conference on Platform Technology and Service (PlatCon), Jeju, Korea, Republic of, 2022, pp. 53-58, doi: 10.1109/PlatCon55845.2022.9932053. |
T. -T. -H. Le, H. T. Larasati, A. T. Prihatno and H. Kim, "A Review of Dataset Distillation for Deep Learning," 2022 International Conference on Platform Technology and Service (PlatCon), Jeju, Korea, Republic of, 2022, pp. 34-37, doi: 10.1109/PlatCon55845.2022.9932086. |
H. T. Larasati, T. -T. -H. Le and H. Kim, "Trends of Quantum Computing Applications to Computer Vision," 2022 International Conference on Platform Technology and Service (PlatCon), Jeju, Korea, Republic of, 2022, pp. 7-12, doi: 10.1109/PlatCon55845.2022.9932103. |
Awaludin, A.M., Pratama, D., Kim, H. (2021). AnyTRNG: Generic, High-Throughput, Low-Area True Random Number Generator Based on Synchronous Edge Sampling. In: Kim, H. (eds) Information Security Applications. WISA 2021. Lecture Notes in Computer Science(), vol 13009. Springer, Cham. https://doi.org/10.1007/978-3-030-89432-0_13 |
Larasati, H.T., Kim, H. (2021). Quantum Cryptanalysis Landscape of Shor’s Algorithm for Elliptic Curve Discrete Logarithm Problem. In: Kim, H. (eds) Information Security Applications. WISA 2021. Lecture Notes in Computer Science(), vol 13009. Springer, Cham. https://doi.org/10.1007/978-3-030-89432-0_8 |
H. T. Larasati and H. Kim, "Simulation of Modular Exponentiation Circuit for Shor's Algorithm in Qiskit," 2020 14th International Conference on Telecommunication Systems, Services, and Applications (TSSA, Bandung, Indonesia, 2020, pp. 1-7, doi: 10.1109/TSSA51342.2020.9310794. |
Asep Muhamad Awaludin, Derry Pratama, and Howon Kim. "AnyTRNG: Generic, High-Throughput, Low-Area True Random Number Generator Based on Synchronous Edge Sampling." International Conference on Information Security Applications. Springer, Cham, 2021. |
Yongsu Kim, Hyoeun Kang, Afifatul Mukaroh, Naufal Suryanto, Harashta Tatimma Larasati, Howon Kim, "Spatially Localized Perturbation GAN (SLP-GAN) for Generating Invisible Adversarial Patches." International Conference on Information Security Applications. Springer, Cham, 2020. |
Yongsu Kim, Sanghyun Lee, Howon Kim, "A Real-time System to Predict Photovoltaic Power Generation of the Desired Time Section", FUTECH, 2020.01 |
Hwajeong Seo, Howon Kim, “Multi-precision Multiplication for Public Key Cryptography on Embedded Microprocessors,” WISA’12, 2012. 8 |
Hwajeong Seo, Taehwan Park, Shinwook Heo, Gyuwon Seo, Bongjin Bae, Zhi Hu, Lu Zhou, Yasuyuki Nogami, Youwen Zhu, and Howon Kim, “Parallel Implementations of LEA, Revisited”, WISA 2016, 2016.8 |
Jongseok Choi, Jong-gyu Park, Shinwook Heo, Namje Park, Howon Kim, “Slowloris DoS Countermeasure over WebSocket”, WISA 2016, 2016.8 |
Hwajeong Seo, Zhe Liu, Jongseok Choi , Howon Kim, “Multi-Precision Squaring for Public-key Cryptography on Embedded Microprocessors, A Step Forward”, WISA 2016, 2016.8 |
Thi-Thu-Huong Le, Jihyun Kim, Howon Kim, “The impact of activation functions applying to recurrent neural network on Intrusion Detection”, MITA 2016, 2016.7 |
Taehwan Park, Hwajeong Seo, Howon Kim. “Parallel Implementations of SIMON and SPECK.” 2016 International Conference on Platform Technology and Service (PlatCon). IEEE, 2016 |
Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Lu Zhou, Howon Kim, “Faster ECC over F_{2^521-1} (feat. NEON),” ICISC2015. 2015. 11. |
Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede, “Efficient Ring-LWE Encryption on 8-bit AVR Processors,” CHES2015. |
Taehwan Park, Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim, “Compact Implementations of LSH,” WISA2015. 2015. 8. |
Hwajeong Seo, Zhe Liu, Taehwan Park, Jongseok Choi, Howon Kim, “Compact Implementations of LEA Block Cipher for Low-End Microprocessors,” WISA2015. 2015. 8. |
Jihyun Kim, Howon Kim, “Applying Recurrent Neural Network to Intrusion Detection with Hessian Free Optimization,” WISA2015. 2015. 8. |
Hwajeong Seo, Chien Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim, “Secure Binary Field Multiplication,” WISA2015. 2015. 8. |
Hwajeong Seo, Zhe Liu, Gyuwon Seo, Taehwan Park, Jongseok Choi, Howon Kim, “Open Sesame! Hacking the Password,” WISA2015. 2015. 8. |
Yasuyuki Nogami, Hwajeong Seo, “Discrete Logarithms for Torsion Points on Elliptic Curve of Embedding Degree 1,” ICISC2014. 2014. 12. |
Hwajeong Seo, Zhe Liu, Jongseok Choi, Johann Groszschaedl, Howon Kim, “Montgomery Modular Multiplication on ARM-NEON Revisited,” ICISC2014. 2014. 12. |
Zhe Liu, Hwajeong Seo, Howon Kim and Johann Großschädl, “Reverse Product-Scanning Multiplication on 8-bit AVR Processors: Tradeoffs between Performance, Code Size and Scalability”, ICICS2014, 2014. 12 |
Ha V. Nguyen, Hwajeong Seo and Howon Kim, “Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA”, FDSE2014. 2014. 11 |
Zhe Liu, Hwajeong Seo, Zhi Hu, Xinyi Hunag, Johann Großschädl, “Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks”, ASIA CCS’15, 2014.10.30 |
Hwajeong Seo, Howon Kim, “Multi-precision Squaring on MSP and ARM processors,” ICTC’14, 2014. |
Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim, “Improved Modular Multiplication for Optimal Prime Fields,” WISA’14, 2014. 8 |
Yeoncheol Lee, Hwajeong Seo, Howon Kim, “The Unified Hardware Design for GCM and SGCM,” WISA’14, 2014. 8 . |
Jihyun Kim, Howon Kim, “The Prediction and Classification of Family Type by using Power Consumption Model over Smart Grid”, International Conference on Aritificial Intelligence 14, Vol. 2, pp.555-560, 2014 |
Hwajeong Seo, Jongseok Choi, Hyunjin Kim, Taehwan Park, Howon Kim, “Pseudo Random Number Generator and Hash Function for Embedded Microprocessors,” WF-IoT 2014. Mar. 2014. |
Hwajeong Seo, Jongseok Choi, Hyunjin Kim, Taehwan Park, Howon Kim, “Surveillance System with Light Sensor,” WF-IoT 2014. Mar. 2014. |
Jongseok Choi, Hwajeong Seo, Howon Kim, “TRAPA Three-way RFID Authentication preserving Anonymity”, UCES2013, 2013, 12 |
Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim, “Multiprecision Squaring for Public Key Cryptography on Embedded Microprocessors” INDOCRYPT13, 2013. 12 |
Hwajeong Seo,Taehwan Park, Hyunjin Kim, Yeoncheol Lee, Howon Kim, “High Performance LEA Design on FPGA”, UCES2013, 2013, 12 |
Donggeon Lee, Hwajeong Seo, Howon Kim, “Metastability-based Feedback Method for Enhancing FPGA-based TRNG”, ICCA 2013, Nov 2013. |
Hwajeong Seo, Zhe Liu, Taehwan Park, Hyunjin Kim, Yeoncheol Lee, Jongseok Choi, Howon Kim, “Parallel Implementations of LEA”, ICISC2013, 2013, 11. |
Zhe Liu, Hwajeong Seo, Johann Grobschadl, Howon Kim, “Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes,” ICICS’13, 2013. 11 |
Hwajeong Seo, Taehae Kim, Howon Kim, “A Three Dimensional Location based Two Factor TL-OTP Protocol,” WTA’13, 2013. 9 |
Jihyun Kim, Howon Kim, “Analysis for Memory Reduction of the UOV Scheme with the Application fo PRNG”, International Journal of Computer and Communication Engineering, Vol. 2, No. 3, pp.363-367 , 2013. 5 |
Jongseok Choi, Howon Kim, “Enhanced Attribute-Based Proxy Re-Encryption for Home Network”, International Journal of Computer and Communication Engineering, Vol. 2, No. 3, pp. 299-303, 2013. 5 |
Yunjin Lee, Howon Kim, “Insider Attack Resistant OTP(One-Time-Password) Based on Bilinear Maps”, International Journal of Computer and Communication Engineering, Vol. 2, No. 3, pp. 304-308, 2013. 5 |
Hwajeong Seo, Howon Kim, “Optimized Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors”, International Journal of Computer and Communication Engineering, Vol. 2, No. 3, pp. 255-259, 2013. 5 |
Dynamic Tag Identity-Based Encryption Scheme for Logistics System |
Jihyun Kim, Yanghyun Kwon, Yunjin Lee, Jungtaek Seo, and Howon Kim, “Access Control Mechanism supporting Scalability, Interoperability and Flexibility of Multi-Domain Smart Grid System”, Information Science and Industrial Applications, 2012. 6 |
Jongseok Choi and Howon Kim, “Designing Secure SMS Scheme on Android OS”, ISA 2012, 2012.4 |
Jongseok Choi and Howon Kim, “Broadcast-Based Anonymous Authentication”, CCA2012, 2012.3 |
Hwajeong Seo, Howon Kim, “Three-dimensional Localization System for Logistics Part,” International Conference on IML 2012, 2012. 2 |
Hwajeong Seo, Howon Kim, “Zigbee Security for Visitors in Home Automation using Attribute Based Proxy Re-encryption”, International Symposium on Consumer Electronics, 2011. 6 |
Hwajeong Seo, CheolSoo Kim, Howon Kim, “ZigBee Security For Home Automation Using Attribute-based Cryptography,”,2011 IEEE International Conference on Consumer Electronics, pp 375-376, 2011, 01 |
Hwajeong Seo, Ahreum Hwang, Cheol Soo Kim, Howon Kim, “Speed Optimized Implementation of Hummingbird Cryptographic Algorithm on 16-Bit Microcontrollers,” ICONI & APIC-IST 2010 , 2010. 12 |
Seongyun Kim, Sangho Chu, Donggeon Lee, Howon Kim,“OHLCAP based RFID Secure Protocol with Forward Secrecy”, ICONI & APIC-IST 2010, 2010. 12 |
Hwajeong Seo, Cheol Soo Kim, Howon Kim,”Performance Enhancement of TinyECC based on the Multiplication Optimizations”ICONI & APIC-IST 2010 , 2010. 12 |
Dong-geon Lee, Seongyun Kim, Howon Kim,“Mobile Platform for Networked RFID Applications”, ITNG 2010 Seventh International Conference on Information Technology : New Generations, 2010. 04 |