
{"id":7129,"date":"2020-03-28T20:48:31","date_gmt":"2020-03-28T11:48:31","guid":{"rendered":"http:\/\/infosec.pusan.ac.kr\/?page_id=7129"},"modified":"2024-08-27T21:23:48","modified_gmt":"2024-08-27T12:23:48","slug":"sub41","status":"publish","type":"page","link":"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41\/","title":{"rendered":"SCI"},"content":{"rendered":"<p><!-- research count --><\/p>\n<div class=\"research_count\">\n<ul>\n<li>\n<div>\n<ol>\n<li><img decoding=\"async\" src=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2020\/03\/sub41_1.gif\" \/><\/li>\n<li>SCI\n<p class=\"count\">60<\/p>\n<\/li>\n<\/ol>\n<\/div>\n<\/li>\n<li>\n<div>\n<ol>\n<li><img decoding=\"async\" src=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2020\/03\/sub41_2.gif\" \/><\/li>\n<li>\ud2b9\ud5c8\n<p class=\"count\">66<\/p>\n<\/li>\n<\/ol>\n<\/div>\n<\/li>\n<li>\n<div>\n<ol>\n<li><img decoding=\"async\" src=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2020\/03\/sub41_3.gif\" \/><\/li>\n<li>\ud504\ub85c\uc81d\ud2b8\n<p class=\"count\">44<\/p>\n<\/li>\n<\/ol>\n<\/div>\n<\/li>\n<\/ul>\n<\/div>\n<div class=\"space40\"><\/div>\n<div id=\"sub31_tab1\" class=\"sub31\">\n<p><!-- sub tab --><\/p>\n<div class=\"sub_tab\">\n<ul>\n<li><a class=\"on\" href=\"index.php\/sub41\">SCI<\/a><\/li>\n<li><a href=\"index.php\/sub44\">\uad6d\uc81c\ud559\uc220\ub300\ud68c<\/a><\/li>\n<li><a href=\"index.php\/sub45\">\uad6d\ub0b4\ub17c\ubb38 \ubc0f \uad6d\ub0b4\ud559\uc220\ub300\ud68c<\/a><\/li>\n<li><a href=\"index.php\/sub42\">\ud2b9\ud5c8\uc2e4\uc801<\/a><\/li>\n<li><a href=\"index.php\/sub43\">\ud504\ub85c\uc81d\ud2b8<\/a><\/li>\n<\/ul>\n<\/div>\n<div class=\"space20 pc840\"><\/div>\n<div class=\"space40 mobile840\"><\/div>\n<div class=\"sub_content_title\">SCI paper<\/div>\n<div class=\"research_list\"><div class=\"mb-widget\"><div class=\"mb-latest-basic mb-widget-shortcode\"><div class=\"mb-latest-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/\" title=\"sub41_2\">sub41_2<\/a><\/div><div class=\"mb-latest-box\"><table  cellspacing=\"0\" cellpadding=\"0\" border=\"0\" class=\"table table-latest\"><colgroup><col style=\"width:100%\" \/><\/colgroup><tbody><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=372\" title=\"Andro Aprila Adiputra; Sehwa Ko; Thi-Thu-Huong Le; JunYoung Son; Howon Kim, &quot;RV-DroneEye: Unity-based framework for a Synthetic dataset for robust UAV recognition&quot;, IEEE Access, 2026-Apr\"><span class=\"mb-latest-item-title-text\">Andro Aprila Adiputra; Sehwa Ko; Thi-Thu-Huong Le; JunYoung Son; Howon Kim, &quot;RV-DroneEye: Unity-based framework for a Synthetic dataset for robust UAV recognition&quot;, IEEE Access, 2026-Apr<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=369\" title=\"Thi-Thu-Huong Le, Andro, Agung, Hyunjin Jang, Howon Kim, &quot;Lightweight CNN-Based Intrusion Detection for CAN Bus Networks&quot;, IEEE Access, 2026 Jan.\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Andro, Agung, Hyunjin Jang, Howon Kim, &quot;Lightweight CNN-Based Intrusion Detection for CAN Bus Networks&quot;, IEEE Access, 2026 Jan.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=360\" title=\"Thi-Thu-Huong Le, Yeonjeong Hwang, Ahmada Yusril Kadiptya, JunYoung Son, and Howon Kim. 2025. &quot;A Robust Framework for Coffee Bean Package Label Recognition: Integrating Image Enhancement with Vision\u2013Language OCR Models&quot; Sensors 25, no. 20: 6484. https:\/\/doi.org\/10.3390\/s25206484\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Yeonjeong Hwang, Ahmada Yusril Kadiptya, JunYoung Son, and Howon Kim. 2025. &quot;A Robust Framework for Coffee Bean Package Label Recognition: Integrating Image Enhancement with Vision\u2013Language OCR Models&quot; Sensors 25, no. 20: 6484. https:\/\/doi.org\/10.3390\/s25206484<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=359\" title=\"Putranto, D. S. C., Wardhani, Rini Wisnu; Kim Howon. (2025). Enhancing Quantum Cryptanalysis of Binary Elliptic Curves through Optimized Out-of-Place Point Addition and ECPM Integration.\u202fIEEE Access, 2025, Volume: 13, Page(s): 148304 \u2013 1648317, Date of Publication: 22 Agustus 2025, Electronic ISSN: 2169-3536, DOI: 10.1109\/ACCESS.2025.3601565. Publisher: IEEE https:\/\/doi.org\/10.1109\/ACCESS.2025.3601565  \"><span class=\"mb-latest-item-title-text\">Putranto, D. S. C., Wardhani, Rini Wisnu; Kim Howon. (2025). Enhancing Quantum Cryptanalysis of Binary Elliptic Curves through Optimized Out-of-Place Point Addition and ECPM Integration.\u202fIEEE Access, 2025, Volume: 13, Page(s): 148304 \u2013 1648317, Date of Publication: 22 Agustus 2025, Electronic ISSN: 2169-3536, DOI: 10.1109\/ACCESS.2025.3601565. Publisher: IEEE https:\/\/doi.org\/10.1109\/ACCESS.2025.3601565  <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=358\" title=\"Thi-Thu-Huong Le, Changwoo Choi, JunYoung Son, Howon Kim, Leverage Gaussian Interpolation Features Extraction and Advanced Encode-Decode Models for 2D Steady State Flows Estimation,  in IEEE Access, doi: 10.1109\/ACCESS.2025.3585402.\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Changwoo Choi, JunYoung Son, Howon Kim, Leverage Gaussian Interpolation Features Extraction and Advanced Encode-Decode Models for 2D Steady State Flows Estimation,  in IEEE Access, doi: 10.1109\/ACCESS.2025.3585402.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=357\" title=\"Thi-Thu-Huong Le; Yeonjeong Hwang; Junyoung Son; Howon Kim,&quot;Leverage Sampling Methods and Deep Neural Networks for Fuzzer CAN Bus Message Detection,&quot; in IEEE Access, vol. 13, pp. 91533-91551, 2025, doi: 10.1109\/ACCESS.2025.3572573.\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le; Yeonjeong Hwang; Junyoung Son; Howon Kim,&quot;Leverage Sampling Methods and Deep Neural Networks for Fuzzer CAN Bus Message Detection,&quot; in IEEE Access, vol. 13, pp. 91533-91551, 2025, doi: 10.1109\/ACCESS.2025.3572573.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=356\" title=\"Thi-Thu-Huong Le, Andro Aprila Adiputra, Jiwon Yun, Howon Kim, Anomaly Detection in Industrial Machine Sounds Using High-Frequency Features and Gate Recurrent Unit Networks, IEEE Access, May 2025\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Andro Aprila Adiputra, Jiwon Yun, Howon Kim, Anomaly Detection in Industrial Machine Sounds Using High-Frequency Features and Gate Recurrent Unit Networks, IEEE Access, May 2025<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=355\" title=\"Thi-Thu-Huong Le; Shinwook Heo; Jaehan Cho; Howon Kim. DDoSBERT: Fine-tuning variant text classification bidirectional encoder representations from transformers for DDoS detection. Computer Networks, https:\/\/doi.org\/10.1016\/j.comnet.2025.111150. 2025-03.\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le; Shinwook Heo; Jaehan Cho; Howon Kim. DDoSBERT: Fine-tuning variant text classification bidirectional encoder representations from transformers for DDoS detection. Computer Networks, https:\/\/doi.org\/10.1016\/j.comnet.2025.111150. 2025-03.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=354\" title=\"Naufal Suryanto; Andro Aprila Adiputra; Ahmada Yusril Kadiptya;Thi-Thu-Huong Le; Derry Pratama; Yongsu Kim; Howon Kim, &quot;Cityscape-Adverse: Benchmarking Robustness of Semantic Segmentation with Realistic Scene Modifications via Diffusion-Based Image Editing,&quot; in IEEE Access, doi: 10.1109\/ACCESS.2025.3537981. , 2025-02\"><span class=\"mb-latest-item-title-text\">Naufal Suryanto; Andro Aprila Adiputra; Ahmada Yusril Kadiptya;Thi-Thu-Huong Le; Derry Pratama; Yongsu Kim; Howon Kim, &quot;Cityscape-Adverse: Benchmarking Robustness of Semantic Segmentation with Realistic Scene Modifications via Diffusion-Based Image Editing,&quot; in IEEE Access, doi: 10.1109\/ACCESS.2025.3537981. , 2025-02<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=336\" title=\"Thi-Thu-Huong Le, Yeonjeong Hwang, Changwoo Choi, Rini Wisnu Wardhani, Dedy Septono Catur Putranto, Howon Kim , Enhancing SQL Injection Detection with Trustworthy Ensemble Learning and Boosting Models Using Local Explanation Techniques, Electronics, 2024 Nov\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Yeonjeong Hwang, Changwoo Choi, Rini Wisnu Wardhani, Dedy Septono Catur Putranto, Howon Kim , Enhancing SQL Injection Detection with Trustworthy Ensemble Learning and Boosting Models Using Local Explanation Techniques, Electronics, 2024 Nov<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=335\" title=\"Thi-Thu-Huong Le, YeonJeong Hwang, Hyoeun Kang, Howon Kim. Robust Credit Card Fraud Detection Based on Efficient Kolmogorov-Arnold Network Models. IEEE Access, 2024 Oct\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, YeonJeong Hwang, Hyoeun Kang, Howon Kim. Robust Credit Card Fraud Detection Based on Efficient Kolmogorov-Arnold Network Models. IEEE Access, 2024 Oct<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=334\" title=\"Thi-Thu-Huong Le, Jaehyun Kim, Sangmyeong Lee, Howon Kim. Robust Vulnerability Detection in Solidity-Based Ethereum Smart Contracts Using Fine-Tuned Transformer Encoder Models. IEEE Access, 2024 Oct\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Jaehyun Kim, Sangmyeong Lee, Howon Kim. Robust Vulnerability Detection in Solidity-Based Ethereum Smart Contracts Using Fine-Tuned Transformer Encoder Models. IEEE Access, 2024 Oct<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=333\" title=\"Thi-Thu-Huong Le, Yeongjae Shin, Myeongkil Kim, Howon Kim, Towards unbalanced multiclass intrusion detection with hybrid sampling methods and ensemble classification, Applied Soft Computing, Volume 157, 2024, 111517, doi.org\/10.1016\/j.asoc.2024.111517\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Yeongjae Shin, Myeongkil Kim, Howon Kim, Towards unbalanced multiclass intrusion detection with hybrid sampling methods and ensemble classification, Applied Soft Computing, Volume 157, 2024, 111517, doi.org\/10.1016\/j.asoc.2024.111517<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=332\" title=\"Rini Wisnu Wardhani;Dedy Septono Catur Putranto;Thi-Thu-Huong Le;Janghyun Ji;Howon Kim &quot;Towards Hybrid Classical Deep Learning-Quantum Methods for Steganalysis,&quot; in IEEE Access, doi: 10.1109\/ACCESS.2024.3381615. \"><span class=\"mb-latest-item-title-text\">Rini Wisnu Wardhani;Dedy Septono Catur Putranto;Thi-Thu-Huong Le;Janghyun Ji;Howon Kim &quot;Towards Hybrid Classical Deep Learning-Quantum Methods for Steganalysis,&quot; in IEEE Access, doi: 10.1109\/ACCESS.2024.3381615. <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=331\" title=\"R. W. Wardhani, D. S. C. Putranto and H. Kim, &quot;High- and Half-Degree Quantum Multiplication for Post-Quantum Security Evaluation,&quot; in IEEE Access, vol. 12, pp. 8806-8821, 2024, doi: 10.1109\/ACCESS.2024.3352157. \"><span class=\"mb-latest-item-title-text\">R. W. Wardhani, D. S. C. Putranto and H. Kim, &quot;High- and Half-Degree Quantum Multiplication for Post-Quantum Security Evaluation,&quot; in IEEE Access, vol. 12, pp. 8806-8821, 2024, doi: 10.1109\/ACCESS.2024.3352157. <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=330\" title=\"Yustus Eko Oktian, Thi-Thu-Huong Le, Uk Jo, Agus Mahardika Ari Laksmono, Howon Kim.  Secure decentralized firmware update delivery service for Internet of Things.&quot; Internet of Things (2024): 101136. \"><span class=\"mb-latest-item-title-text\">Yustus Eko Oktian, Thi-Thu-Huong Le, Uk Jo, Agus Mahardika Ari Laksmono, Howon Kim.  Secure decentralized firmware update delivery service for Internet of Things.&quot; Internet of Things (2024): 101136. <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=329\" title=\"Thi-Thu-Huong Le; Rini Wisnu Wardhani; Dedy Septono Catur Putranto; Uk Jo; Howon Kim &quot;Towards Enhanced Attack Detection and Explanation in Intrusion Detection System-based IoT Environment Data,&quot; in IEEE Access, Nov 2023, doi: 10.1109\/ACCESS.2023.3336678.\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le; Rini Wisnu Wardhani; Dedy Septono Catur Putranto; Uk Jo; Howon Kim &quot;Towards Enhanced Attack Detection and Explanation in Intrusion Detection System-based IoT Environment Data,&quot; in IEEE Access, Nov 2023, doi: 10.1109\/ACCESS.2023.3336678.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=327\" title=\"Thi-Thu-Huong Le, Yustus Eko Oktian, Uk Jo, and Howon Kim. 2023. &quot;Time Series Electrical Motor Drives Forecasting Based on Simulation Modeling and Bidirectional Long-Short Term Memory&quot; Sensors 23, no. 17: 7647. https:\/\/doi.org\/10.3390\/s23177647\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Yustus Eko Oktian, Uk Jo, and Howon Kim. 2023. &quot;Time Series Electrical Motor Drives Forecasting Based on Simulation Modeling and Bidirectional Long-Short Term Memory&quot; Sensors 23, no. 17: 7647. https:\/\/doi.org\/10.3390\/s23177647<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=322\" title=\"D. S. C. Putranto, R. W. Wardhani, H. T. Larasati, J. Ji and H. Kim, &quot;Depth-Optimization of Quantum Cryptanalysis on Binary Elliptic Curves,&quot; in IEEE Access, vol. 11, pp. 45083-45097, 2023, doi: 10.1109\/ACCESS.2023.3273601.\"><span class=\"mb-latest-item-title-text\">D. S. C. Putranto, R. W. Wardhani, H. T. Larasati, J. Ji and H. Kim, &quot;Depth-Optimization of Quantum Cryptanalysis on Binary Elliptic Curves,&quot; in IEEE Access, vol. 11, pp. 45083-45097, 2023, doi: 10.1109\/ACCESS.2023.3273601.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=321\" title=\"H. T. Larasati, D. S. C. Putranto, R. W. Wardhani, J. Park and H. Kim, &quot;Depth Optimization of FLT-Based Quantum Inversion Circuit,&quot; in IEEE Access, vol. 11, pp. 54910-54927, 2023, doi: 10.1109\/ACCESS.2023.3280632.\"><span class=\"mb-latest-item-title-text\">H. T. Larasati, D. S. C. Putranto, R. W. Wardhani, J. Park and H. Kim, &quot;Depth Optimization of FLT-Based Quantum Inversion Circuit,&quot; in IEEE Access, vol. 11, pp. 54910-54927, 2023, doi: 10.1109\/ACCESS.2023.3280632.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=319\" title=\"D. S. C. Putranto, R. W. Wardhani, H. T. Larasati and H. Kim, &quot;Space and Time-Efficient Quantum Multiplier in Post Quantum Cryptography Era,&quot; in IEEE Access, vol. 11, pp. 21848-21862, 2023, doi: 10.1109\/ACCESS.2023.3252504.\"><span class=\"mb-latest-item-title-text\">D. S. C. Putranto, R. W. Wardhani, H. T. Larasati and H. Kim, &quot;Space and Time-Efficient Quantum Multiplier in Post Quantum Cryptography Era,&quot; in IEEE Access, vol. 11, pp. 21848-21862, 2023, doi: 10.1109\/ACCESS.2023.3252504.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=318\" title=\"Haeyoung Kim, Harashta Tatimma Larasati, Jonguk Park, Howon Kim and Donghyun Kwon, &quot;DEMIX: Domain-Enforced Memory Isolation for Embedded System&quot;, Sensors 2023, 23(7), 3568; https:\/\/doi.org\/10.3390\/s23073568\"><span class=\"mb-latest-item-title-text\">Haeyoung Kim, Harashta Tatimma Larasati, Jonguk Park, Howon Kim and Donghyun Kwon, &quot;DEMIX: Domain-Enforced Memory Isolation for Embedded System&quot;, Sensors 2023, 23(7), 3568; https:\/\/doi.org\/10.3390\/s23073568<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=317\" title=\"Thi-Thu-Huong Le, Aji Teguh Prihatno, Yustus Eko Oktian, Hyoeun Kang, Howon Kim, \u201cExploring Local Explanation of Practical Industrial AI Applications: A Systematic Literature Review\u201d, Applied Sciences,\u00a0https:\/\/doi.org\/10.3390\/app13095809, May 2023, 13, 5809\u00a0\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Aji Teguh Prihatno, Yustus Eko Oktian, Hyoeun Kang, Howon Kim, \u201cExploring Local Explanation of Practical Industrial AI Applications: A Systematic Literature Review\u201d, Applied Sciences,\u00a0https:\/\/doi.org\/10.3390\/app13095809, May 2023, 13, 5809\u00a0<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=316\" title=\"Prihatno, Aji Teguh, Naufal Suryanto, Sangbong Oh, Thi-Thu-Huong Le, and Howon Kim. 2023. &quot;NFT Image Plagiarism Check Using EfficientNet-Based Deep Neural Network with Triplet Semi-Hard Loss&quot; Applied Sciences 13, no. 5: 3072. https:\/\/doi.org\/10.3390\/app13053072\"><span class=\"mb-latest-item-title-text\">Prihatno, Aji Teguh, Naufal Suryanto, Sangbong Oh, Thi-Thu-Huong Le, and Howon Kim. 2023. &quot;NFT Image Plagiarism Check Using EfficientNet-Based Deep Neural Network with Triplet Semi-Hard Loss&quot; Applied Sciences 13, no. 5: 3072. https:\/\/doi.org\/10.3390\/app13053072<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=314\" title=\"Hyoeun Kang, Yongsu Kim, Thi-Thu-Huong Le, Changwoo Choi, YoonYoung Hong, Seungdo Hong, Howon Kim &quot;A new fluid flow approximation method using a vision transformer and a U-shaped convolutional neural network&quot;, AIP Advances 13, 025233 (2023); https:\/\/doi.org\/10.1063\/5.0138515\"><span class=\"mb-latest-item-title-text\">Hyoeun Kang, Yongsu Kim, Thi-Thu-Huong Le, Changwoo Choi, YoonYoung Hong, Seungdo Hong, Howon Kim &quot;A new fluid flow approximation method using a vision transformer and a U-shaped convolutional neural network&quot;, AIP Advances 13, 025233 (2023); https:\/\/doi.org\/10.1063\/5.0138515<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=227\" title=\"Oktian, Yustus Eko, Thi-Thu-Huong Le, Uk Jo, and Howon Kim. 2022. &quot;RealPrice: Blockchain-Powered Real-Time Pricing for Software-Defined Enabled Edge Network&quot; Sensors 22, no. 24: 9639. https:\/\/doi.org\/10.3390\/s22249639\"><span class=\"mb-latest-item-title-text\">Oktian, Yustus Eko, Thi-Thu-Huong Le, Uk Jo, and Howon Kim. 2022. &quot;RealPrice: Blockchain-Powered Real-Time Pricing for Software-Defined Enabled Edge Network&quot; Sensors 22, no. 24: 9639. https:\/\/doi.org\/10.3390\/s22249639<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=226\" title=\"Yustus Eko Oktian, Thi-Thu-Huong Le, Uk Jo, and Howon Kim, &quot;Blockchain-Powered Bandwidth Trading on SDN-Enabled Edge Network,&quot; in IEEE Access, 2022, doi: 10.1109\/ACCESS.2022.3217534.\"><span class=\"mb-latest-item-title-text\">Yustus Eko Oktian, Thi-Thu-Huong Le, Uk Jo, and Howon Kim, &quot;Blockchain-Powered Bandwidth Trading on SDN-Enabled Edge Network,&quot; in IEEE Access, 2022, doi: 10.1109\/ACCESS.2022.3217534.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=225\" title=\"Thi-Thu-Huong Le, Hyoeun Kang, Howon Kim, &quot;Towards Incompressible Laminar Flow Estimation Based on Interpolated Feature Generation and Deep Learning&quot;, Sustainability 2022, 14, 11996. https:\/\/doi.org\/10.3390\/su141911996\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Hyoeun Kang, Howon Kim, &quot;Towards Incompressible Laminar Flow Estimation Based on Interpolated Feature Generation and Deep Learning&quot;, Sustainability 2022, 14, 11996. https:\/\/doi.org\/10.3390\/su141911996<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=224\" title=\"Y. E. Oktian, S. Heo and H. Kim, &quot;SIGNORA: A Blockchain-Based Framework for Dataflow Integrity Provisioning in an Untrusted Data Pipeline,&quot; in IEEE Access, 2022, doi: 10.1109\/ACCESS.2022.3199878.\"><span class=\"mb-latest-item-title-text\">Y. E. Oktian, S. Heo and H. Kim, &quot;SIGNORA: A Blockchain-Based Framework for Dataflow Integrity Provisioning in an Untrusted Data Pipeline,&quot; in IEEE Access, 2022, doi: 10.1109\/ACCESS.2022.3199878.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=223\" title=\"Thi-Thu-Huong Le, Yustus Eko Oktian, and Howon Kim, &quot;XGBoost for Imbalanced Multiclass Classification-Based Industrial Internet of Things Intrusion Detection Systems&quot;, Sustainability 2022, 14, 8707. https:\/\/doi.org\/10.3390\/su14148707\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Yustus Eko Oktian, and Howon Kim, &quot;XGBoost for Imbalanced Multiclass Classification-Based Industrial Internet of Things Intrusion Detection Systems&quot;, Sustainability 2022, 14, 8707. https:\/\/doi.org\/10.3390\/su14148707<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=222\" title=\"Thi-Thu-Huong Le, Haeyoung Kim, Hyoeun Kang, Howon Kim, \u201cClassification and Interpretability for Intrusion Detection System using Ensemble Trees and SHAP Method\u201d, Sensors 2022, 22, 1154. https:\/\/doi.org\/10.3390\/s22031154.\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Haeyoung Kim, Hyoeun Kang, Howon Kim, \u201cClassification and Interpretability for Intrusion Detection System using Ensemble Trees and SHAP Method\u201d, Sensors 2022, 22, 1154. https:\/\/doi.org\/10.3390\/s22031154.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=221\" title=\"A. M. Awaludin, Jonguk Park, R. W. Wardhani and Howon Kim, &quot;A High-Performance ECC Processor Over Curve448 Based on a Novel Variant of the Karatsuba Formula for Asymmetric Digit Multiplier,&quot; in IEEE Access, vol. 10, pp. 67470-67481, 2022, doi: 10.1109\/ACCESS.2022.3184786.\"><span class=\"mb-latest-item-title-text\">A. M. Awaludin, Jonguk Park, R. W. Wardhani and Howon Kim, &quot;A High-Performance ECC Processor Over Curve448 Based on a Novel Variant of the Karatsuba Formula for Asymmetric Digit Multiplier,&quot; in IEEE Access, vol. 10, pp. 67470-67481, 2022, doi: 10.1109\/ACCESS.2022.3184786.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=219\" title=\"Jinjae Lee; Derry Pratama; Minjae Kim; Howon Kim; Donghyun Kwon &quot;CoMeT: Configurable Tagged Memory Extension&quot; in Sensors, vol. 21, pp. 7771, November 2021\"><span class=\"mb-latest-item-title-text\">Jinjae Lee; Derry Pratama; Minjae Kim; Howon Kim; Donghyun Kwon &quot;CoMeT: Configurable Tagged Memory Extension&quot; in Sensors, vol. 21, pp. 7771, November 2021<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=218\" title=\"Thi-Thu-Huong Le; Hyoeun Kang; Howon Kim, &quot;Robust Adversarial Attack Against Explainable Deep Classification Models Based on Adversarial Images With Different Patch Sizes and Perturbation Ratios,&quot; in IEEE Access, vol. 9, pp. 133049-133061, September 2021\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le; Hyoeun Kang; Howon Kim, &quot;Robust Adversarial Attack Against Explainable Deep Classification Models Based on Adversarial Images With Different Patch Sizes and Perturbation Ratios,&quot; in IEEE Access, vol. 9, pp. 133049-133061, September 2021<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=217\" title=\"Yongsu Kim, Hyoeun Kang, Naufal Suryanto, Karashta Tatimma Larasati, Afifatul Mukaroh, Howon Kim. &quot;Extended Spatially Localized Perturbation GAN (eSLP-GAN) for Robust Adversarial Camouflage Patches.&quot; Sensors 21.16 (2021): 5323.\"><span class=\"mb-latest-item-title-text\">Yongsu Kim, Hyoeun Kang, Naufal Suryanto, Karashta Tatimma Larasati, Afifatul Mukaroh, Howon Kim. &quot;Extended Spatially Localized Perturbation GAN (eSLP-GAN) for Robust Adversarial Camouflage Patches.&quot; Sensors 21.16 (2021): 5323.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=216\" title=\"Larasati, Harashta T.; Awaludin, Asep M.; Ji, Janghyun; Kim, Howon. 2021. &quot;Quantum Circuit Design of Toom 3-Way Multiplication&quot; Appl. Sci. 11, no. 9: 3752. https:\/\/doi.org\/10.3390\/app11093752\"><span class=\"mb-latest-item-title-text\">Larasati, Harashta T.; Awaludin, Asep M.; Ji, Janghyun; Kim, Howon. 2021. &quot;Quantum Circuit Design of Toom 3-Way Multiplication&quot; Appl. Sci. 11, no. 9: 3752. https:\/\/doi.org\/10.3390\/app11093752<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=215\" title=\" Thi-Thu-Huong Le; Shinwook Heo; Howon Kim, &quot;Toward Load Identification Based on the Hilbert Transform and Sequence to Sequence Long Short-Term Memory,&quot; IEEE Transactions on Smart Grid, 12(4), 3252-3264\"><span class=\"mb-latest-item-title-text\"> Thi-Thu-Huong Le; Shinwook Heo; Howon Kim, &quot;Toward Load Identification Based on the Hilbert Transform and Sequence to Sequence Long Short-Term Memory,&quot; IEEE Transactions on Smart Grid, 12(4), 3252-3264<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=214\" title=\"Awaludin, Asep M.; Larasati, Harashta T.; Kim, Howon. 2021. &quot;High-Speed and Unified ECC Processor for Generic Weierstrass Curves over GF(p) on FPGA&quot; Sensors 21, no. 4: 1451. https:\/\/doi.org\/10.3390\/s21041451\"><span class=\"mb-latest-item-title-text\">Awaludin, Asep M.; Larasati, Harashta T.; Kim, Howon. 2021. &quot;High-Speed and Unified ECC Processor for Generic Weierstrass Curves over GF(p) on FPGA&quot; Sensors 21, no. 4: 1451. https:\/\/doi.org\/10.3390\/s21041451<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=212\" title=\"Afifatul Mukaroh, Thi-Thu-Huong Le, Howon Kim, &quot;Background Load Denoising across Complex Load Based on Generative Adversarial Network to Enhance Load Identification.&quot; Sensors 20.19 (2020): 5674.\"><span class=\"mb-latest-item-title-text\">Afifatul Mukaroh, Thi-Thu-Huong Le, Howon Kim, &quot;Background Load Denoising across Complex Load Based on Generative Adversarial Network to Enhance Load Identification.&quot; Sensors 20.19 (2020): 5674.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=211\" title=\"Naufal Suryanto,Hyoeun Kang,Yongsu Kim,Youngyeo Yun,Harashta Tatimma Larasati,Howon Kim, &quot;A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization.&quot; Sensors 20.24 (2020): 7158.\"><span class=\"mb-latest-item-title-text\">Naufal Suryanto,Hyoeun Kang,Yongsu Kim,Youngyeo Yun,Harashta Tatimma Larasati,Howon Kim, &quot;A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization.&quot; Sensors 20.24 (2020): 7158.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=209\" title=\"Zhe Liu, Reza Azarderakhsh, Howon Kim, Hwajeong Seo, &quot;Efficient Software Implementation of Ring-LWE Encryption on IoT Processors&quot;, IEEE TRANSACTIONS ON COMPUTERS, VOL. 69, NO. 10, October 2020\"><span class=\"mb-latest-item-title-text\">Zhe Liu, Reza Azarderakhsh, Howon Kim, Hwajeong Seo, &quot;Efficient Software Implementation of Ring-LWE Encryption on IoT Processors&quot;, IEEE TRANSACTIONS ON COMPUTERS, VOL. 69, NO. 10, October 2020<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=188\" title=\"Thi-Thu-Huong Le, Hyoeun Kang and Howon Kim, &quot;Household Appliance Classification Using Lower Odd-Numbered Harmonics and the Bagging Decision Tree&quot;, IEEE Access, Vol. 8, pp. 55937-55952, March 2020\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Hyoeun Kang and Howon Kim, &quot;Household Appliance Classification Using Lower Odd-Numbered Harmonics and the Bagging Decision Tree&quot;, IEEE Access, Vol. 8, pp. 55937-55952, March 2020<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=187\" title=\"Zhe Liu, Hwajeong Seo, Aniello Castiglione, Kim-Kwang Raymond Choo and Howon Kim, &quot;Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things&quot;, IEEE Transactions on Dependable and Secure Computing, Vol. 16, No. 3, pp. 521-529, 1 May-June 2019\"><span class=\"mb-latest-item-title-text\">Zhe Liu, Hwajeong Seo, Aniello Castiglione, Kim-Kwang Raymond Choo and Howon Kim, &quot;Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things&quot;, IEEE Transactions on Dependable and Secure Computing, Vol. 16, No. 3, pp. 521-529, 1 May-June 2019<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=186\" title=\"Thi-Thu-Huong Le, Yongsu Kim and Howon Kim, &quot;Network Intrusion Detection Based on Novel Feature Selection Model and Various Recurrent Neural Networks&quot;, Applied Sciences, Vol. 9, No. 7, pp. 1392-1420, April 2019\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Yongsu Kim and Howon Kim, &quot;Network Intrusion Detection Based on Novel Feature Selection Model and Various Recurrent Neural Networks&quot;, Applied Sciences, Vol. 9, No. 7, pp. 1392-1420, April 2019<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=36\" title=\"Thi-Thu-Huong Le and Howon Kim, \u201cNon-Intrusive Load Monitoring Based on Novel Transient Signal in Household Appliances with Low Sampling Rate\u201d, energies 11(12), Dec 2018(SCIE) \"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le and Howon Kim, \u201cNon-Intrusive Load Monitoring Based on Novel Transient Signal in Household Appliances with Low Sampling Rate\u201d, energies 11(12), Dec 2018(SCIE) <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=35\" title=\"Taehwan Park, Hwajeong Seo, Junsub Kim, Haeryong Park, and Howon Kim, \u201cEfficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor\u201d, Security and Communication Networks Vol 2018, Nov 2018(SCIE) \"><span class=\"mb-latest-item-title-text\">Taehwan Park, Hwajeong Seo, Junsub Kim, Haeryong Park, and Howon Kim, \u201cEfficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor\u201d, Security and Communication Networks Vol 2018, Nov 2018(SCIE) <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=34\" title=\"Taehwan Park, Hwajeong Seo, Sokjoon Lee, and Howon Kim, \u201cSecure Data Encryption for Cloud-Based Human Care Services\u201d, Journal of Sensors Vol 2018, 2018(SCIE) \"><span class=\"mb-latest-item-title-text\">Taehwan Park, Hwajeong Seo, Sokjoon Lee, and Howon Kim, \u201cSecure Data Encryption for Cloud-Based Human Care Services\u201d, Journal of Sensors Vol 2018, 2018(SCIE) <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=33\" title=\"Jihyun Kim, Howon Kim \u201cThe intelligent IoT common service platform architecture and service implementation\u201d, JOURNAL OF SUPERCOMPUTING 74(9): 4242-4260, 2018 (SCI)\"><span class=\"mb-latest-item-title-text\">Jihyun Kim, Howon Kim \u201cThe intelligent IoT common service platform architecture and service implementation\u201d, JOURNAL OF SUPERCOMPUTING 74(9): 4242-4260, 2018 (SCI)<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=32\" title=\"H Seo, J Kim, H Kim, Z Liu, \u201cPersonal identification number entry for Google glass\u201d, Computers &amp; Electrical Engineering (SCIE)\"><span class=\"mb-latest-item-title-text\">H Seo, J Kim, H Kim, Z Liu, \u201cPersonal identification number entry for Google glass\u201d, Computers &amp; Electrical Engineering (SCIE)<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=31\" title=\"Z Liu, R Azarderakhsh, H Kim, H Seo, \u201cEfficient Software Implementation of Ring-LWE Encryption on IoT Processors\u201d, IEEE Transactions on Computers (SCI)\"><span class=\"mb-latest-item-title-text\">Z Liu, R Azarderakhsh, H Kim, H Seo, \u201cEfficient Software Implementation of Ring-LWE Encryption on IoT Processors\u201d, IEEE Transactions on Computers (SCI)<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=30\" title=\"Jihyun Kim, Thi-Thu-Huong Le, Howon Kim,\u201cNon-Intrusive Load Monitoring Based on Advanced Deep Learning and Novel Signature\u201d, Hindawi Publishing Corporation, August, 2017 (SCIE)\"><span class=\"mb-latest-item-title-text\">Jihyun Kim, Thi-Thu-Huong Le, Howon Kim,\u201cNon-Intrusive Load Monitoring Based on Advanced Deep Learning and Novel Signature\u201d, Hindawi Publishing Corporation, August, 2017 (SCIE)<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=29\" title=\"Zhe Liu, Thomas Poppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Guneysu, Johann Gro\u00dfsch\u00e4dl, Howon Kim, Ingrid Verbauwhede,\u201cHigh-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers\u201d, ACM Transactions on Embedded Computing Systems, July, 2017 (SCIE) \"><span class=\"mb-latest-item-title-text\">Zhe Liu, Thomas Poppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Guneysu, Johann Gro\u00dfsch\u00e4dl, Howon Kim, Ingrid Verbauwhede,\u201cHigh-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers\u201d, ACM Transactions on Embedded Computing Systems, July, 2017 (SCIE) <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=28\" title=\"Hwajeong Seo, Zhe Liu, Johann Groszschaedl, Howon Kim, \u201cEfficient arithmetic on ARM\u2010NEON and its application for high\u2010speed RSA implementation,\u201d Security and Communication Networks, December, 2016, (SCIE) \"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Zhe Liu, Johann Groszschaedl, Howon Kim, \u201cEfficient arithmetic on ARM\u2010NEON and its application for high\u2010speed RSA implementation,\u201d Security and Communication Networks, December, 2016, (SCIE) <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=27\" title=\"Jongseok Choi, Seonhee Seok, Hwajeong Seo, Howon Kim, \u201cA fast ARX model-based image encryption scheme\u201d, Multimedia Tools and Applications, Nov, 2016, (SCIE)\"><span class=\"mb-latest-item-title-text\">Jongseok Choi, Seonhee Seok, Hwajeong Seo, Howon Kim, \u201cA fast ARX model-based image encryption scheme\u201d, Multimedia Tools and Applications, Nov, 2016, (SCIE)<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=26\" title=\"Zhe Liu, Hwajeong Seo, Chien-Ning Chen, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim, \u201cSecure GCM Implementation on AVR\u201d, Preprint submitted to Discrete Applied Mathematics, Nov, 2016, (SCI) \"><span class=\"mb-latest-item-title-text\">Zhe Liu, Hwajeong Seo, Chien-Ning Chen, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim, \u201cSecure GCM Implementation on AVR\u201d, Preprint submitted to Discrete Applied Mathematics, Nov, 2016, (SCI) <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=25\" title=\"Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim, \u201cBinary field multiplication on ARMv8\u201d, SECURITY AND COMMUNICATION NETWORKS, Sep, 2016,(SCIE)\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim, \u201cBinary field multiplication on ARMv8\u201d, SECURITY AND COMMUNICATION NETWORKS, Sep, 2016,(SCIE)<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=24\" title=\"Jihyun Kim, Yonghun Jeon, Howon Kim, \u201cThe intelligent IoT common service platform architecture and service implementation\u201d, The Journal of Supercomputing, Aug, 2016, (SCI)\"><span class=\"mb-latest-item-title-text\">Jihyun Kim, Yonghun Jeon, Howon Kim, \u201cThe intelligent IoT common service platform architecture and service implementation\u201d, The Journal of Supercomputing, Aug, 2016, (SCI)<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=23\" title=\"Zhe Liu, Hwajeong Seo, Howon Kim, Johann Groszschaedl, \u201cEfficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes,\u201d IEEE Transactions on Information Forensics &amp; Security, July, 2016, (SCI) \"><span class=\"mb-latest-item-title-text\">Zhe Liu, Hwajeong Seo, Howon Kim, Johann Groszschaedl, \u201cEfficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes,\u201d IEEE Transactions on Information Forensics &amp; Security, July, 2016, (SCI) <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=22\" title=\"Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim, \u201cHybrid Montgomery Reduction\u201d, ACM Transactions on Embedded Computing Systems, July, 2016 (SCIE)\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim, \u201cHybrid Montgomery Reduction\u201d, ACM Transactions on Embedded Computing Systems, July, 2016 (SCIE)<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=21\" title=\"Zhe Liu, Hwajeong Seo, Howon Kim, \u201cA Synthesis of Multi-Precision Multiplication and Squaring Techniques for 8-Bit Sensor Nodes: State-of-the-Art Research and Future Challenges\u201d, Journal of Computer Science and Technology, Mar, 2016, (SCIE) \"><span class=\"mb-latest-item-title-text\">Zhe Liu, Hwajeong Seo, Howon Kim, \u201cA Synthesis of Multi-Precision Multiplication and Squaring Techniques for 8-Bit Sensor Nodes: State-of-the-Art Research and Future Challenges\u201d, Journal of Computer Science and Technology, Mar, 2016, (SCIE) <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=20\" title=\"Zhe liu, Hwajeong Seo, Johann Grobschadl, Howon Kim, \u201cA Survey of Multi-Precision Multiplication and Squaring Techniques for 8-bit Sensor Nodes,\u201d Journal of Computer Science and Technology, (SCIE)\"><span class=\"mb-latest-item-title-text\">Zhe liu, Hwajeong Seo, Johann Grobschadl, Howon Kim, \u201cA Survey of Multi-Precision Multiplication and Squaring Techniques for 8-bit Sensor Nodes,\u201d Journal of Computer Science and Technology, (SCIE)<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=19\" title=\"Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim, \u201cOptimized Karatsuba Squaring on 8-bit AVR Processors,\u201d Security and communication networks, May, 2015, (SCIE)\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim, \u201cOptimized Karatsuba Squaring on 8-bit AVR Processors,\u201d Security and communication networks, May, 2015, (SCIE)<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=18\" title=\"Zhe Liu, Hwajeong Seo, Qiuliang Xu, \u201cPerformance Evaluation of Twisted Edwards-Form Elliptic Curve Cryptography for Wireless Sensor Nodes,\u201d security and communication networks, April, 2015, (SCIE)\"><span class=\"mb-latest-item-title-text\">Zhe Liu, Hwajeong Seo, Qiuliang Xu, \u201cPerformance Evaluation of Twisted Edwards-Form Elliptic Curve Cryptography for Wireless Sensor Nodes,\u201d security and communication networks, April, 2015, (SCIE)<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=17\" title=\"Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim, \u201cKaratsuba -Block Comb Technique for Elliptic Curve Cryptography over Binary Fields,\u201d Security and communication networks, March, 2015, (SCIE)\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim, \u201cKaratsuba -Block Comb Technique for Elliptic Curve Cryptography over Binary Fields,\u201d Security and communication networks, March, 2015, (SCIE)<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=16\" title=\"Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim, \u201cMontgomery Multiplication and Squaring for Optimal Prime Fields,\u201d COSE, March, 2015, (SCIE)\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim, \u201cMontgomery Multiplication and Squaring for Optimal Prime Fields,\u201d COSE, March, 2015, (SCIE)<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=15\" title=\"Hwajeong Seo, Yeoncheol Lee, Hyunjin Kim, Taehwan Park, and Howon Kim. \u201cBinary and prime field multiplication for public key cryptography on embedded microprocessors.\u201d Security and Communication Networks, Issue 4, Pages 774-787, April, 2014, (SCIE) \"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Yeoncheol Lee, Hyunjin Kim, Taehwan Park, and Howon Kim. \u201cBinary and prime field multiplication for public key cryptography on embedded microprocessors.\u201d Security and Communication Networks, Issue 4, Pages 774-787, April, 2014, (SCIE) <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=14\" title=\"Hwajeong Seo, Jihyun Kim, Jongseok Choi, Taehwan Park, Zhe Liu, Howon Kim, \u201cSmall Private Key MQPKS on Embedded Microprocessor.\u201d Sensors, Vol. 14, No. 3, pp. 5441-5458, March, 2014, (SCIE)\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Jihyun Kim, Jongseok Choi, Taehwan Park, Zhe Liu, Howon Kim, \u201cSmall Private Key MQPKS on Embedded Microprocessor.\u201d Sensors, Vol. 14, No. 3, pp. 5441-5458, March, 2014, (SCIE)<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=13\" title=\"Donggeon Lee, Dong-Chan Kim, Daesung Kwon, Howon Kim, \u201cEfficient Hardware Implementation of the Lightweight Block Encryption Algorithm LEA,\u201d Sensors, Vol. 14, No. 1, pp. 975-994, Jan, 2014, (SCIE)\"><span class=\"mb-latest-item-title-text\">Donggeon Lee, Dong-Chan Kim, Daesung Kwon, Howon Kim, \u201cEfficient Hardware Implementation of the Lightweight Block Encryption Algorithm LEA,\u201d Sensors, Vol. 14, No. 1, pp. 975-994, Jan, 2014, (SCIE)<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=12\" title=\"Hwajeong Seo, Hyunjin Kim, Taehwan Park, Yeoncheol Lee, Zhe Liu, Howon Kim, \u201cFixed-Base Comb with Window-Non-Adjacent Form (NAF) Method for Scalar Multiplication.\u201d Sensors, vol. 13, no. 7, pp. 9483-951, July, 2013, (SCIE) \"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Hyunjin Kim, Taehwan Park, Yeoncheol Lee, Zhe Liu, Howon Kim, \u201cFixed-Base Comb with Window-Non-Adjacent Form (NAF) Method for Scalar Multiplication.\u201d Sensors, vol. 13, no. 7, pp. 9483-951, July, 2013, (SCIE) <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=11\" title=\"Dong-geon Lee, Dooho Choi, Jungtaek Seo, and Howon Kim, \u201cReset Tree-based Optical Fault Detection\u201d, Sensors, vol. 13, no.5, pp.6713-6729, May, 2013, (SCIE)\"><span class=\"mb-latest-item-title-text\">Dong-geon Lee, Dooho Choi, Jungtaek Seo, and Howon Kim, \u201cReset Tree-based Optical Fault Detection\u201d, Sensors, vol. 13, no.5, pp.6713-6729, May, 2013, (SCIE)<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=10\" title=\"Hwajeong Seo, Kyung\u2010Ah Shim, and Howon Kim. \u201cPerformance enhancement of TinyECC based on multiplication optimizations.\u201d Security and Communication Networks,Volume 6, Issue 2, pages 151\u2013160, February, 2013, (SCIE) \"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Kyung\u2010Ah Shim, and Howon Kim. \u201cPerformance enhancement of TinyECC based on multiplication optimizations.\u201d Security and Communication Networks,Volume 6, Issue 2, pages 151\u2013160, February, 2013, (SCIE) <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=9\" title=\"You-Seok Lee, Kyung-Won Song, Dong-Guk Han, Ho-won Kim, and Hyoung-Nam Kim,\u201c Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals,\u201d, Vol.E95-A, No.6, pp.1091-1094, IEICE, June, 2012, (SCIE) \"><span class=\"mb-latest-item-title-text\">You-Seok Lee, Kyung-Won Song, Dong-Guk Han, Ho-won Kim, and Hyoung-Nam Kim,\u201c Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals,\u201d, Vol.E95-A, No.6, pp.1091-1094, IEICE, June, 2012, (SCIE) <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=8\" title=\"Shirase, Masaaki, Tsuyoshi Takagi, Dooho Choi, DongGuk Han, and Howon Kim. \u201cEfficient computation of Eta pairing over binary field with Vandermonde matrix.\u201d ETRI journal 31, no. 2, pp. 129-139, April, 2009, (SCI) \"><span class=\"mb-latest-item-title-text\">Shirase, Masaaki, Tsuyoshi Takagi, Dooho Choi, DongGuk Han, and Howon Kim. \u201cEfficient computation of Eta pairing over binary field with Vandermonde matrix.\u201d ETRI journal 31, no. 2, pp. 129-139, April, 2009, (SCI) <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=7\" title=\"Han, Dong-Guk, Dooho Choi, and Howon Kim. \u201cImproved computation of square roots in specific finite fields.\u201d Computers, IEEE Transactions on 58, no. 2, pp. 188-196, February, 2009, (SCI)\"><span class=\"mb-latest-item-title-text\">Han, Dong-Guk, Dooho Choi, and Howon Kim. \u201cImproved computation of square roots in specific finite fields.\u201d Computers, IEEE Transactions on 58, no. 2, pp. 188-196, February, 2009, (SCI)<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=6\" title=\"Choi, Dooho, Dongguk Han, and Howon Kim. \u201cConstruction of efficient and secure pairing algorithm and its application.\u201d Communications and Networks, Journal of 10, no. 4, pp. 437-443, December, 2008, (SCIE) \"><span class=\"mb-latest-item-title-text\">Choi, Dooho, Dongguk Han, and Howon Kim. \u201cConstruction of efficient and secure pairing algorithm and its application.\u201d Communications and Networks, Journal of 10, no. 4, pp. 437-443, December, 2008, (SCIE) <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=5\" title=\"Masaaki SHIRASE, Dong-Guk HAN, Yasushi HIBINO, Howon KIM, Tsuyoshi TAKAGI,\u201dA More Compact Representation of XTR Cryptosystem,\u201d IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E91-A, No.10, pp.2843-2850, Howon Kim, Thomas Wollinger, Dooho Choi, Dong-Guk Han, Munkyu Lee,\u201dHyperelliptic Curve Crypto-Coprocessor over Affine and Projective Coordinates,\u201d ETRI Journal, Vol. 30, No. 3, pp.365-376, June 2008 (SCI) \"><span class=\"mb-latest-item-title-text\">Masaaki SHIRASE, Dong-Guk HAN, Yasushi HIBINO, Howon KIM, Tsuyoshi TAKAGI,\u201dA More Compact Representation of XTR Cryptosystem,\u201d IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E91-A, No.10, pp.2843-2850, Howon Kim, Thomas Wollinger, Dooho Choi, Dong-Guk Han, Munkyu Lee,\u201dHyperelliptic Curve Crypto-Coprocessor over Affine and Projective Coordinates,\u201d ETRI Journal, Vol. 30, No. 3, pp.365-376, June 2008 (SCI) <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=3\" title=\"TaeHyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Howon Kim, and Jongin Lim,\u201dPower Analysis Attacks and Countermeasures on \u03b7T Pairing over Binary Fields,\u201d ETRI Journal, Vol. 30, No. 1, pp.68-80, February. 2008, (SCI) \"><span class=\"mb-latest-item-title-text\">TaeHyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Howon Kim, and Jongin Lim,\u201dPower Analysis Attacks and Countermeasures on \u03b7T Pairing over Binary Fields,\u201d ETRI Journal, Vol. 30, No. 1, pp.68-80, February. 2008, (SCI) <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=2\" title=\"Dong Kyue Kim, Mun-Kyu Lee, You Sung Kang, Sang-Hwa Chung, Won-Ju Yoon, Jung-Ki Min, and Howon Kim,\u201dDesign and Performance Analysis of Electronic Seal Protection Systems Based on AES,\u201d ETRI Journal, Vol.29, No.6, pp.755-768, December, 2007, (SCI) \"><span class=\"mb-latest-item-title-text\">Dong Kyue Kim, Mun-Kyu Lee, You Sung Kang, Sang-Hwa Chung, Won-Ju Yoon, Jung-Ki Min, and Howon Kim,\u201dDesign and Performance Analysis of Electronic Seal Protection Systems Based on AES,\u201d ETRI Journal, Vol.29, No.6, pp.755-768, December, 2007, (SCI) <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=SCI%20paper&#038;vid=1\" title=\"Howon-Kim, and Sunggu Lee\u201dDesign and Implementation of a Private and Public Key Crypto Processor and Its Application to a Security System,\u201d IEEE Trans. Consumer Electronics, Vol.50, No.1, pp.214-224, February. 2004 (SCI) \"><span class=\"mb-latest-item-title-text\">Howon-Kim, and Sunggu Lee\u201dDesign and Implementation of a Private and Public Key Crypto Processor and Its Application to a Security System,\u201d IEEE Trans. Consumer Electronics, Vol.50, No.1, pp.214-224, February. 2004 (SCI) <\/span><\/a><\/td><\/tr><\/tbody><\/table><\/div><\/div><\/div><\/div>\n<\/div>\n<div class=\"clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>SCI 60 \ud2b9\ud5c8 66 \ud504\ub85c\uc81d\ud2b8 44 SCI \uad6d\uc81c\ud559\uc220\ub300\ud68c \uad6d\ub0b4\ub17c\ubb38 \ubc0f \uad6d\ub0b4\ud559\uc220\ub300\ud68c \ud2b9\ud5c8\uc2e4\uc801 \ud504\ub85c\uc81d\ud2b8 SCI paper<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-sub4.php","meta":{"footnotes":""},"class_list":["post-7129","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/pages\/7129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/comments?post=7129"}],"version-history":[{"count":37,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/pages\/7129\/revisions"}],"predecessor-version":[{"id":8971,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/pages\/7129\/revisions\/8971"}],"wp:attachment":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/media?parent=7129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}