Kyung Hyune Rhee

Orcid: 0000-0003-0466-8254

According to our database1, Kyung Hyune Rhee authored at least 120 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Privacy-Preserving Decentralized Biometric Identity Verification in Car-Sharing System.
J. Multim. Inf. Syst., 2024

Personalized Federated Learning for Statistical Heterogeneity.
CoRR, 2024

2023
A Blockchain-Based Auditable Semi-Asynchronous Federated Learning for Heterogeneous Clients.
IEEE Access, 2023

Towards Trustworthy Collaborative Healthcare Data Sharing.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

2022
A Joint Framework to Privacy-Preserving Edge Intelligence in Vehicular Networks.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

A Secure Federated Learning Framework using Blockchain and Differential Privacy.
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022

2021
A Novel User Collusion-Resistant Decentralized Multi-Authority Attribute-Based Encryption Scheme Using the Deposit on a Blockchain.
Wirel. Commun. Mob. Comput., 2021

Decentralized Trusted Data Sharing Management on Internet of Vehicle Edge Computing (IoVEC) Networks Using Consortium Blockchain.
Sensors, 2021

Blockchain-Enabled 5G Edge Networks and Beyond: An Intelligent Cross-Silo Federated Learning Approach.
Secur. Commun. Networks, 2021

A Data Provenance System for Myanmar Rice Cycle Based on Ethereum Blockchain.
J. Multim. Inf. Syst., 2021

An Investigation of Pseudonymization Techniques in Decentralized Transactions.
J. Internet Serv. Inf. Secur., 2021

Enhancing data privacy through a decentralised predictive model with blockchain-based revenue.
Int. J. Ad Hoc Ubiquitous Comput., 2021

PDPM: A Patient-Defined Data Privacy Management with Nudge Theory in Decentralized E-Health Environments.
IEICE Trans. Inf. Syst., 2021

Unlinkable Collaborative Learning Transactions: Privacy-Awareness in Decentralized Approaches.
IEEE Access, 2021

2020
PyRos: A State Channel-Based Access Control System for a Public Blockchain Network.
Secur. Commun. Networks, 2020

The Dilemma of Parameterizing Propagation Time in Blockchain P2P Network.
J. Inf. Process. Syst., 2020

Reliable Collaborative Learning with Commensurate Incentive Schemes.
Proceedings of the IEEE International Conference on Blockchain, 2020

Implicit Authentication in Neural Key Exchange Based on the Randomization of the Public Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2020

2019
Authorized Client-Side Deduplication Using CP-ABE in Cloud Storage.
Wirel. Commun. Mob. Comput., 2019

Toward Privacy-Preserving Shared Storage in Untrusted Blockchain P2P Networks.
Wirel. Commun. Mob. Comput., 2019

An in-depth experimental study of anomaly detection using gradient boosted machine.
Neural Comput. Appl., 2019

Tree-based classifier ensembles for early detection method of diabetes: an exploratory study.
Artif. Intell. Rev., 2019

TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System.
IEEE Access, 2019

2018
Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing.
J. Supercomput., 2018

Smart Contract-Based Review System for an IoT Data Marketplace.
Sensors, 2018

Self-Controllable Secure Location Sharing for Trajectory-Based Message Delivery on Cloud-Assisted VANETs.
Sensors, 2018

A Secure Incentive Scheme for Vehicular Delay Tolerant Networks Using Cryptocurrency.
Secur. Commun. Networks, 2018

A Comparative Study of Phishing Websites Classification Based on Classifier Ensembles.
J. Multim. Inf. Syst., 2018

In-depth analysis of neural network ensembles for early detection method of diabetes disease.
Int. J. Medical Eng. Informatics, 2018

A comparative study of classifier ensembles for detecting inactive learner in university.
Int. J. Data Anal. Tech. Strateg., 2018

Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage.
IEEE Access, 2018

Preliminary of Selfish Mining Strategy on the Decentralized Model of Personal Health Information.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

A Blockchain-Based Access Control with Micropayment Channels.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

A Preliminary Approach of Blockchain Technology in Supply Chain System.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

2017
A Detailed Analysis of Classifier Ensembles for Intrusion Detection in Wireless Network.
J. Inf. Process. Syst., 2017

Performance evaluation of intrusion detection system using classifier ensembles.
Int. J. Internet Protoc. Technol., 2017

HFSTE: Hybrid Feature Selections and Tree-Based Classifiers Ensemble for Intrusion Detection System.
IEICE Trans. Inf. Syst., 2017

An extensive empirical evaluation of classifier ensembles for intrusion detection task.
Comput. Syst. Sci. Eng., 2017

A Novel Anomaly Detection Method in Wireless Network Using Multi-level Classifier Ensembles.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

Secure vehicle location-sharing for trajectory-based message delivery on VANETs.
Proceedings of the 26th IEEE International Symposium on Industrial Electronics, 2017

A Framework for Blockchain Based Secure Smart Green House Farming.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

An Improved Model of Anomaly Detection Using Two-Level Classifier Ensemble.
Proceedings of the 12th Asia Joint Conference on Information Security, 2017

2016
R-to-R Extraction and Preprocessing Procedure for an Automated Diagnosis of Various Diseases from ECG Data.
J. Multim. Inf. Syst., 2016

Enhancing Accuracy Performance of Fuzzy Vault Non-Random Chaff Point Generator for Mobile Payment Authentication.
J. Multim. Inf. Syst., 2016

Pseudonymous authentication for secure V2I services in cloud-based vehicular networks.
J. Ambient Intell. Humaniz. Comput., 2016

An efficient and secure navigation protocol based on vehicular cloud.
Int. J. Comput. Math., 2016

A secure billing protocol over attribute-based encryption in vehicular cloud computing.
EURASIP J. Wirel. Commun. Netw., 2016

Data preparation step for automated diagnosis based on HRV analysis and machine learning.
Proceedings of the 6th International Conference on System Engineering and Technology, 2016

Security analysis testing for secure instant messaging in Android with study case: Telegram.
Proceedings of the 6th International Conference on System Engineering and Technology, 2016

Fast non-random chaff point generator for fuzzy vault biometric cryptosystems.
Proceedings of the 6th International Conference on System Engineering and Technology, 2016

Classifier Ensemble Design with Rotation Forest to Enhance Attack Detection of IDS in Wireless Network.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
A Fine-Grained Privacy Preserving Protocol over Attribute Based Access Control for VANETs.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

Preface - WISA 2014.
Comput. Secur., 2015

Performance Analysis of Multiple Classifier System in DoS Attack Detection.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

A Combination of PSO-Based Feature Selection and Tree-Based Classifiers Ensemble for Intrusion Detection Systems.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

Secure Traffic Data Transmission Protocol for Vehicular Cloud.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

2014
Performance of Distributed Text Processing System Using Hadoop.
J. Internet Serv. Inf. Secur., 2014

An enhanced audio ownership protection scheme based on visual cryptography.
EURASIP J. Inf. Secur., 2014

The efficient implementation of distributed indexing with Hadoop for digital investigations on Big Data.
Comput. Sci. Inf. Syst., 2014

2013
A Privacy Preserving Message Delivery Protocol Using Identity-Hidden Index in VDTNs.
J. Univers. Comput. Sci., 2013

An Improved Privacy-Preserving Navigation Protocol in {VANET}s.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Exploiting reference images for image splicing verification.
Digit. Investig., 2013

Design and implementation of E-discovery as a service based on cloud computing.
Comput. Sci. Inf. Syst., 2013

A blind forgery detection scheme using image compatibility metrics.
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013

Certificate-Based Proxy Re-encryption for Public Cloud Storage.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

An Improved Greedy Forwarding Routing Protocol for Cooperative VANETs.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

A Simplified Privacy Preserving Message Delivery Protocol in VDTNs.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Robust Copy-Move Forgery Detection Based on Dual-Transform.
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013

2012
A Study on Design and Implementation of E-Discovery Service based on Cloud Computing.
J. Internet Serv. Inf. Secur., 2012

An Image Splicing Detection Based on Interpolation Analysis.
Proceedings of the Advances in Multimedia Information Processing - PCM 2012, 2012

Image Splicing Verification Based on Pixel-Based Alignment Method.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Design and Analysis of a Fragile Watermarking Scheme Based on Block-Mapping.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
A Privacy-Preserving Location Assurance Protocol for Location-Aware Services in VANETs.
Wirel. Pers. Commun., 2011

A Secure and Location Assurance Protocol for Location-Aware Services in VANETs.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Securing Location-Aware Services Based on Online/Offline Signatures in VANETs.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

A Novel Secure Image Hashing Based on Reversible Watermarking for Forensic Analysis.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
An Efficient Anonymous Authentication Protocol for Secure Vehicular Communications.
J. Inf. Sci. Eng., 2010

A Survey on Image Hashing for Image Authentication.
IEICE Trans. Inf. Syst., 2010

Discriminative Image Hashing Based on Region of Interest.
Proceedings of the Advances in Multimedia Modeling, 2010

Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption.
Proceedings of the Communications and Multimedia Security, 2010

2009
A robust and efficient anonymous authentication protocol in VANETs.
J. Commun. Networks, 2009

An Authenticated On-Demand Routing Protocol with Key Exchange for Secure MANET.
IEICE Trans. Inf. Syst., 2009

A Robust Conditional Privacy-Preserving Authentication Protocol in VANET.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET.
Proceedings of the Mobile Lightweight Wireless Systems, 2009

A Fast and Fully Format Compliant Protection of JPEG2000 Code-Streams.
Proceedings of the Advances in Multimedia Modeling, 2009

2008
An Improved Flexible Access Control Scheme for JPEG2000 Codestreams.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

2007
Region-Based Selective Encryption for Medical Imaging.
Proceedings of the Frontiers in Algorithmics, First Annual International Workshop, 2007

Multi-receiver Certificate-Based Encryption and Application to Public Key Broadcast Encryption.
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007

Authenticated On-Demand Ad Hoc Routing Protocol without Pre-shared Key Distribution.
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007

A New DRM System Based on Graded Contents Sharing and Time-Block Distribution for Home Networks.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
A New Design for a Practical Secure Cookies System.
J. Inf. Sci. Eng., 2006

A New Efficient Protocol for Authentication and Certificate Status Management in Personal Area Networks.
Proceedings of the Computer and Information Sciences, 2006

High Capacity Lossless Data Hiding.
Proceedings of the Information Systems Security, Second International Conference, 2006

Reversible Data Embedding for Tamper-Proof Watermarks.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Lossless Data Hiding for High Embedding Capacity.
Proceedings of the Distributed Computing and Internet Technology, 2006

A Proactive Secret Sharing for Server Assisted Threshold Signatures.
Proceedings of the High Performance Computing and Communications, 2006

Distributing Security-Mediated PKI Revisited.
Proceedings of the Public Key Infrastructure, 2006

An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks.
Proceedings of the Management of Convergence Networks and Services, 2006

Reliable P2P File Sharing Service.
Proceedings of the Agents and Peer-to-Peer Computing - 5th International Workshop, 2006

2005
A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks.
J. Inf. Sci. Eng., 2005

How to Break COT-Based Fingerprinting Schemes and Design New One.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

A Fair and Reliable P2P E-Commerce Model Based on Collaboration with Distributed Peers.
Proceedings of the Distributed Computing, 2005

Generating authentication data without keeping a private key for Mobility.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Securing Admission Control in Ubiquitous Computing Environment.
Proceedings of the Networking, 2005

Design of a Secure Digital Contents Delivery System in P2P Networks.
Proceedings of the Digital Rights Management: Technologies, 2005

2004
An architecture for key management in hierarchical mobile ad-hoc networks.
J. Commun. Networks, 2004

A Simplified Approach to User Controllable Threshold Signatures.
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004

Practical Modification of an Efficient Public-Key Framework.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

2003
Secure group key management for storage area networks.
IEEE Commun. Mag., 2003

Distributed Certified E-mail System for Mobile Users.
Proceedings of the Distributed Computing, 2003

ROCEM: Robust Certified E-mail System Based on Server-Supported Signature.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

2002
The Design and Implementation of Improved Secure Cookies Based on Certificate.
Proceedings of the Progress in Cryptology, 2002

2001
A New Design of the Hash Functions With All-or-Nothing Property.
J. Inf. Sci. Eng., 2001

An End-to-End Authentication Protocol in Wireless Application Protocol.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
All-or-Nothing Transform and Remotely Keyed Encription Protocols.
Proceedings of the Public Key Cryptography, 2000

1999
Hash Functions and the MAC Using All-or-Nothing Property.
Proceedings of the Public Key Cryptography, 1999

A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption.
Proceedings of the Information Security, Second International Workshop, 1999

1998
A New Hash Function Based on MDx-Family and Its Application to MAC.
Proceedings of the Public Key Cryptography, 1998

A secure hash function based on cellular automata.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998


  Loading...