Chan Yeob Yeun

Orcid: 0000-0002-1398-952X

According to our database1, Chan Yeob Yeun authored at least 119 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Bio-Integrated Hybrid TESLA: A Fully Symmetric Lightweight Authentication Protocol.
IEEE Internet Things J., December, 2024

Blockchain Data Structures and Integrated Adaptive Learning: Features and Futures.
IEEE Consumer Electron. Mag., March, 2024

Learning a deep-feature clustering model for gait-based individual identification.
Comput. Secur., January, 2024

A comprehensive survey of text classification techniques and their research applications: Observational and experimental insights.
Comput. Sci. Rev., 2024

Text Classification: A Review, Empirical, and Experimental Evaluation.
CoRR, 2024

A Robust Adversary Detection-Deactivation Method for Metaverse-oriented Collaborative Deep Learning.
CoRR, 2024

Privacy enhanced data aggregation based on federated learning in Internet of Vehicles (IoV).
Comput. Commun., 2024

Comparative study of novel packet loss analysis and recovery capability between hybrid TLI-µTESLA and other variant TESLA protocols.
Ad Hoc Networks, 2024

Advanced Machine Learning Based Malware Detection Systems.
IEEE Access, 2024

Multimodal Biometric Authentication Systems: Exploring Iris and EEG Data.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

Examining the Security Landscape of Mobile Payment Systems.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

Investigating How Data Poising Attacks Can Impact An EEG-Based Federated Learning Model.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

Data Poisoning Against Federated Learning: Comparative Analysis Under Label-Flipping Attacks and GAN-Generated EEG Data.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

Reputation-Based Federated Learning Defense to Mitigate Threats in EEG Signal Classification.
Proceedings of the 16th International Conference on Computer and Automation Engineering, 2024

2023
Enhancing security and robustness of Cyphal on Controller Area Network in unmanned aerial vehicle environments.
Comput. Secur., December, 2023

On the Robustness of Random Forest Against Untargeted Data Poisoning: An Ensemble-Based Approach.
IEEE Trans. Sustain. Comput., 2023

Fused Weighted Federated Deep Extreme Machine Learning Based on Intelligent Lung Cancer Disease Prediction Model for Healthcare 5.0.
Int. J. Intell. Syst., 2023

Explainable Label-flipping Attacks on Human Emotion Assessment System.
CoRR, 2023

Explainable Data Poison Attacks on Human Emotion Evaluation Systems Based on EEG Signals.
IEEE Access, 2023

Revolutionizing Cyber Security: Exploring the Synergy of Machine Learning and Logical Reasoning for Cyber Threats and Mitigation.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2023

Pervasive AI for Secure and Scalable IoT- Edge-Cloud Continuum: A Big Picture.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

Next Generation Healthcare with Explainable AI: IoMT-Edge-Cloud Based Advanced eHealth.
Proceedings of the IEEE Global Communications Conference, 2023

2022
A Novel Grayscale Image Encryption Scheme Based on the Block-Level Swapping of Pixels and the Chaotic System.
Sensors, 2022

Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions.
Sensors, 2022

Fog-based distributed trust and reputation management system for internet of things.
J. King Saud Univ. Comput. Inf. Sci., 2022

New data poison attacks on machine learning classifiers for mobile exfiltration.
CoRR, 2022

On the Robustness of Ensemble-Based Machine Learning Against Data Poisoning.
CoRR, 2022

Poisoning Attacks and Defenses on Artificial Intelligence: A Survey.
CoRR, 2022

Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research.
IEEE Access, 2022

Empirical Studies of TESLA Protocol: Properties, Implementations, and Replacement of Public Cryptography Using Biometric Authentication.
IEEE Access, 2022

Enhanced Inf-TESLA Protocol: A Continuous Connectivity and Low Overhead Authentication Protocol via IoT Devices.
IEEE Access, 2022

Blockchain Interoperability in Unmanned Aerial Vehicles Networks: State-of-the-Art and Open Issues.
IEEE Access, 2022

A New Scalable Mutual Authentication in Fog-Edge Drone Swarm Environment.
Proceedings of the Information Security Practice and Experience, 2022

Explainable Artificial Intelligence to Detect Image Spam Using Convolutional Neural Network.
Proceedings of the 2022 International Conference on Cyber Resilience (ICCR), 2022

A Cyber-Security Framework For Boiler of Steam Power Plant Using Simulation Data to Train Machine Learning Model.
Proceedings of the 2022 International Conference on Cyber Resilience (ICCR), 2022

2021

Techniques for Measuring the Probability of Adjacency between Carved Video Fragments: The VidCarve Approach.
IEEE Trans. Sustain. Comput., 2021

Trusting Testcases Using Blockchain-Based Repository Approach.
Symmetry, 2021

Blockchain Interoperability in UAV Networks: State-of-the-art and Open Issues.
CoRR, 2021

Explainable artificial intelligence to evaluate industrial internal security using EEG signals in IoT framework.
Ad Hoc Networks, 2021

Robust Deep Identification using ECG and Multimodal Biometrics for Industrial Internet of Things.
Ad Hoc Networks, 2021

A Novel Implementation of an AI-Based Smart Construction Safety Inspection Protocol in the UAE.
IEEE Access, 2021

A Verified Protocol for Secure Autonomous and Cooperative Public Transportation in Smart Cities.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

2020
Deep Learning-Based Arrhythmia Detection Using RR-Interval Framed Electrocardiograms.
CoRR, 2020

Correction to: Deep user identification model with multiple biometric data.
BMC Bioinform., 2020

Deep user identification model with multiple biometric data.
BMC Bioinform., 2020

IMPACT: Impersonation Attack Detection via Edge Computing Using Deep Autoencoder and Feature Abstraction.
IEEE Access, 2020

Novel EEG Sensor-Based Risk Framework for the Detection of Insider Threats in Safety Critical Industrial Infrastructure.
IEEE Access, 2020

A Novel Monitoring System for the Data Integrity of Reactor Protection System Using Blockchain Technology.
IEEE Access, 2020

Digital Forensic Analysis of Files Using Deep Learning.
Proceedings of the 3rd International Conference on Signal Processing and Information Security, 2020

An Emerging Security Framework for Connected Autonomous Vehicles.
Proceedings of the 7th International Conference on Behavioural and Social Computing, 2020

Novel EEG Risk Framework to Identify Insider Threats in National Critical Infrastructure Using Deep Learning Techniques.
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020

2019
A Novel Protocol for Security of Location Based Services in Multi-agent Systems.
Wirel. Pers. Commun., 2019

Deep User Identification Model with Multiple Biometrics.
CoRR, 2019

An Enhanced Electrocardiogram Biometric Authentication System Using Machine Learning.
CoRR, 2019

An Enhanced Machine Learning-Based Biometric Authentication System Using RR-Interval Framed Electrocardiograms.
IEEE Access, 2019

A Machine Learning Framework for Biometric Authentication Using Electrocardiogram.
IEEE Access, 2019

An Enhanced Electrocardiogram Biometric Authentication System Using Machine Learning.
IEEE Access, 2019

New Two-Level µTESLA Protocol for IoT Environments.
Proceedings of the 2019 IEEE World Congress on Services, 2019

2018
A new adaptive trust and reputation model for Mobile Agent Systems.
J. Netw. Comput. Appl., 2018

IoT Applications: From Mobile Agents to Microservices Architecture.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018

Secure Autonomous Mobile Agents for Web Services.
Proceedings of the IEEE Global Communications Conference, 2018

Embedding a Digital Wallet to Pay-with-a-Selfie, Defining the System Architecture as Blockchain Based.
Proceedings of the Emerging Technologies for Developing Countries, 2018

Embedding a Digital Wallet to Pay-with-a-Selfie, from Functional Requirements to Prototype.
Proceedings of the Emerging Technologies for Developing Countries, 2018

2017
Enhancement of Key Derivation in Web Service Security - Performance Bottleneck in Real-Time Messaging Systems.
Wirel. Pers. Commun., 2017

BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications.
Secur. Commun. Networks, 2017

Pay-with-a-Selfie, a human-centred digital payment system.
CoRR, 2017

New secure healthcare system using cloud of things.
Clust. Comput., 2017

Secure lightweight ECC-based protocol for multi-agent IoT systems.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

A Scattering Technique for Protecting Cryptographic Keys in the Cloud.
Proceedings of the 2nd IEEE International Workshops on Foundations and Applications of Self* Systems, 2017

A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

Security enhancements to TLS for improved national control.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Monitoring darknet activities by using network telescope.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Performance comparison between container-based and VM-based services.
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017

A novel secure conference communication in IoT devices based on memristors.
Proceedings of the 24th IEEE International Conference on Electronics, Circuits and Systems, 2017

Porting the Pay with a (Group) Selfie (PGS) Payment System to Crypto Currency.
Proceedings of the Emerging Technologies for Developing Countries, 2017

2016
Novel microscale memristor with uniqueness property for securing communications.
Proceedings of the IEEE 59th International Midwest Symposium on Circuits and Systems, 2016

The evolution of distributed systems towards microservices architecture.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

Linear and differential cryptanalysis of small-sized random (n, m)-S-boxes.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

2015
Novel Performance Analysis of Multi-Access MIMO Relay Cooperative RM-DCSK over Nakagami-m Fading Subject to AWGGN.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

Recent Advances in VANET Security: A Survey.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

Data Sharing on the Cloud: A Scalable Proxy-Based Protocol for Privacy-Preserving Queries.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Emerging new trends of location based systems security.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

Recent advances of smart glass application security and privacy.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

Security and privacy framework for ubiquitous healthcare IoT devices.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

2014
Lightweight secure storage model with fault-tolerance in cloud environment.
Electron. Commer. Res., 2014

2013
A Novel Security Scheme for the Smart Grid and SCADA Networks.
Wirel. Pers. Commun., 2013

Securing E-Seal real time tracking system for Internet of Things.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Secure Framework for the Return Routability Procedure in MIPv6.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

2012
Secure and efficient public key management in next generation mobile networks.
Pers. Ubiquitous Comput., 2012

Enhanced secure anonymous authentication scheme for roaming service in global mobility networks.
Math. Comput. Model., 2012

A new lightweight hybrid cryptographic algorithm for the internet of things.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Data integration of electronic health records using artificial neural networks.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Smart-frame: A flexible, scalable, and secure information management framework for smart grids.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Smart authentication for real-time business process monitoring.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2011
Security Framework for RFID-based Applications in Smart Home Environment.
J. Inf. Process. Syst., 2011

Ensuring Anonymity for LBSs in Smartphone Environment.
J. Inf. Process. Syst., 2011

A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication.
Int. J. Commun. Syst., 2011

The use of Boolean functions in stream ciphers.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

A unified countermeasure against side channel attacks on cryptographic RFID.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Survey on certificateless public key cryptography.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Study on Secret Sharing Schemes (SSS) and their applications.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Understanding the security challenges of virtualized environments.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Formal modeling and verification of DLK protocol.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Survey on computationally hard problems and their applications to cryptography.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

2010
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings.
Comput. Electr. Eng., 2010

Enhancement of anonymous authentication scheme in wireless sensor network.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Reconsidering Ryu-Takagi RFID authentication protocol.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

New authentication protocol for IP CAS of IPTV.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

2009
Practical Implementations for Securing VoIP Enabled Mobile Devices.
Proceedings of the Third International Conference on Network and System Security, 2009

RFID lightweight mutual authentication using shrinking generator.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

2008
Secure authenticated group key agreement protocol in the MANET environment.
Inf. Secur. Tech. Rep., 2008

New mutual agreement protocol to secure mobile RFID-enabled devices.
Inf. Secur. Tech. Rep., 2008

2005
Supporting User Privacy in Location Based Services.
IEICE Trans. Commun., 2005

2004
A secure and privacy enhanced protocol for location-based services in ubiquitous society.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Flexible Delegation Security for Improved Distribution in Ubiquitous Environments.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

2000
Design, analysis and applications of cryptographic techniques.
PhD thesis, 2000

1999
Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison.
Proceedings of the Cryptography and Coding, 1999

1998
Fixing a Problem in the Helsinki Protocol.
ACM SIGOPS Oper. Syst. Rev., 1998


  Loading...