Chan Yeob Yeun
Orcid: 0000-0002-1398-952X
According to our database1,
Chan Yeob Yeun
authored at least 119 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., December, 2024
IEEE Consumer Electron. Mag., March, 2024
Comput. Secur., January, 2024
A comprehensive survey of text classification techniques and their research applications: Observational and experimental insights.
Comput. Sci. Rev., 2024
A Robust Adversary Detection-Deactivation Method for Metaverse-oriented Collaborative Deep Learning.
CoRR, 2024
Privacy enhanced data aggregation based on federated learning in Internet of Vehicles (IoV).
Comput. Commun., 2024
Comparative study of novel packet loss analysis and recovery capability between hybrid TLI-µTESLA and other variant TESLA protocols.
Ad Hoc Networks, 2024
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024
Investigating How Data Poising Attacks Can Impact An EEG-Based Federated Learning Model.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024
Data Poisoning Against Federated Learning: Comparative Analysis Under Label-Flipping Attacks and GAN-Generated EEG Data.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024
Reputation-Based Federated Learning Defense to Mitigate Threats in EEG Signal Classification.
Proceedings of the 16th International Conference on Computer and Automation Engineering, 2024
2023
Enhancing security and robustness of Cyphal on Controller Area Network in unmanned aerial vehicle environments.
Comput. Secur., December, 2023
On the Robustness of Random Forest Against Untargeted Data Poisoning: An Ensemble-Based Approach.
IEEE Trans. Sustain. Comput., 2023
Fused Weighted Federated Deep Extreme Machine Learning Based on Intelligent Lung Cancer Disease Prediction Model for Healthcare 5.0.
Int. J. Intell. Syst., 2023
Explainable Data Poison Attacks on Human Emotion Evaluation Systems Based on EEG Signals.
IEEE Access, 2023
Revolutionizing Cyber Security: Exploring the Synergy of Machine Learning and Logical Reasoning for Cyber Threats and Mitigation.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2023
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023
Next Generation Healthcare with Explainable AI: IoMT-Edge-Cloud Based Advanced eHealth.
Proceedings of the IEEE Global Communications Conference, 2023
2022
A Novel Grayscale Image Encryption Scheme Based on the Block-Level Swapping of Pixels and the Chaotic System.
Sensors, 2022
Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions.
Sensors, 2022
J. King Saud Univ. Comput. Inf. Sci., 2022
CoRR, 2022
CoRR, 2022
Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research.
IEEE Access, 2022
Empirical Studies of TESLA Protocol: Properties, Implementations, and Replacement of Public Cryptography Using Biometric Authentication.
IEEE Access, 2022
Enhanced Inf-TESLA Protocol: A Continuous Connectivity and Low Overhead Authentication Protocol via IoT Devices.
IEEE Access, 2022
Blockchain Interoperability in Unmanned Aerial Vehicles Networks: State-of-the-Art and Open Issues.
IEEE Access, 2022
Proceedings of the Information Security Practice and Experience, 2022
Explainable Artificial Intelligence to Detect Image Spam Using Convolutional Neural Network.
Proceedings of the 2022 International Conference on Cyber Resilience (ICCR), 2022
A Cyber-Security Framework For Boiler of Steam Power Plant Using Simulation Data to Train Machine Learning Model.
Proceedings of the 2022 International Conference on Cyber Resilience (ICCR), 2022
2021
Techniques for Measuring the Probability of Adjacency between Carved Video Fragments: The VidCarve Approach.
IEEE Trans. Sustain. Comput., 2021
CoRR, 2021
Explainable artificial intelligence to evaluate industrial internal security using EEG signals in IoT framework.
Ad Hoc Networks, 2021
Robust Deep Identification using ECG and Multimodal Biometrics for Industrial Internet of Things.
Ad Hoc Networks, 2021
A Novel Implementation of an AI-Based Smart Construction Safety Inspection Protocol in the UAE.
IEEE Access, 2021
A Verified Protocol for Secure Autonomous and Cooperative Public Transportation in Smart Cities.
Proceedings of the IEEE International Conference on Communications Workshops, 2021
2020
Deep Learning-Based Arrhythmia Detection Using RR-Interval Framed Electrocardiograms.
CoRR, 2020
BMC Bioinform., 2020
IMPACT: Impersonation Attack Detection via Edge Computing Using Deep Autoencoder and Feature Abstraction.
IEEE Access, 2020
Novel EEG Sensor-Based Risk Framework for the Detection of Insider Threats in Safety Critical Industrial Infrastructure.
IEEE Access, 2020
A Novel Monitoring System for the Data Integrity of Reactor Protection System Using Blockchain Technology.
IEEE Access, 2020
Proceedings of the 3rd International Conference on Signal Processing and Information Security, 2020
Proceedings of the 7th International Conference on Behavioural and Social Computing, 2020
Novel EEG Risk Framework to Identify Insider Threats in National Critical Infrastructure Using Deep Learning Techniques.
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020
2019
Wirel. Pers. Commun., 2019
An Enhanced Electrocardiogram Biometric Authentication System Using Machine Learning.
CoRR, 2019
An Enhanced Machine Learning-Based Biometric Authentication System Using RR-Interval Framed Electrocardiograms.
IEEE Access, 2019
IEEE Access, 2019
An Enhanced Electrocardiogram Biometric Authentication System Using Machine Learning.
IEEE Access, 2019
Proceedings of the 2019 IEEE World Congress on Services, 2019
2018
J. Netw. Comput. Appl., 2018
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018
Proceedings of the IEEE Global Communications Conference, 2018
Embedding a Digital Wallet to Pay-with-a-Selfie, Defining the System Architecture as Blockchain Based.
Proceedings of the Emerging Technologies for Developing Countries, 2018
Embedding a Digital Wallet to Pay-with-a-Selfie, from Functional Requirements to Prototype.
Proceedings of the Emerging Technologies for Developing Countries, 2018
2017
Enhancement of Key Derivation in Web Service Security - Performance Bottleneck in Real-Time Messaging Systems.
Wirel. Pers. Commun., 2017
BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications.
Secur. Commun. Networks, 2017
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017
Proceedings of the 2nd IEEE International Workshops on Foundations and Applications of Self* Systems, 2017
A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017
Proceedings of the 24th IEEE International Conference on Electronics, Circuits and Systems, 2017
Proceedings of the Emerging Technologies for Developing Countries, 2017
2016
Proceedings of the IEEE 59th International Midwest Symposium on Circuits and Systems, 2016
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016
2015
Novel Performance Analysis of Multi-Access MIMO Relay Cooperative RM-DCSK over Nakagami-m Fading Subject to AWGGN.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015
Data Sharing on the Cloud: A Scalable Proxy-Based Protocol for Privacy-Preserving Queries.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
2014
Electron. Commer. Res., 2014
2013
Wirel. Pers. Commun., 2013
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
2012
Pers. Ubiquitous Comput., 2012
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks.
Math. Comput. Model., 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Smart-frame: A flexible, scalable, and secure information management framework for smart grids.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
2011
J. Inf. Process. Syst., 2011
A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication.
Int. J. Commun. Syst., 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
2010
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings.
Comput. Electr. Eng., 2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
2008
Inf. Secur. Tech. Rep., 2008
Inf. Secur. Tech. Rep., 2008
2005
2004
A secure and privacy enhanced protocol for location-based services in ubiquitous society.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
2003
Flexible Delegation Security for Improved Distribution in Ubiquitous Environments.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
2000
1999
Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison.
Proceedings of the Cryptography and Coding, 1999
1998