Changho Seo

Orcid: 0000-0002-0779-3539

According to our database1, Changho Seo authored at least 53 papers between 1995 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SDBA: A Stealthy and Long-Lasting Durable Backdoor Attack in Federated Learning.
CoRR, 2024

Optimal Fuzzy Logic Enabled EEG Motor Imagery Classification for Brain Computer Interface.
IEEE Access, 2024

2022
Evaluating differentially private decision tree model over model inversion attack.
Int. J. Inf. Sec., 2022

A Survey on Password Guessing.
CoRR, 2022

The MAP/PH/N/∞ Queueing-Inventory System With Demands From a Random Environment.
IEEE Access, 2022

NoSQL Database Performance Diagnosis through System Call-level Introspection.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

2021
Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems.
Secur. Commun. Networks, 2021

Real time object detection and trackingsystem for video surveillance system.
Multim. Tools Appl., 2021

Evaluating Differentially Private Generative Adversarial Networks Over Membership Inference Attack.
IEEE Access, 2021

2020
A novel multi-channel MAC protocol for cluster tree based wireless USB networks.
Wirel. Networks, 2020

Integrating IoT and Blockchain for Ensuring Road Safety: An Unconventional Approach.
Sensors, 2020

A Novel Fuzzy Logic-Based Medical Expert System for Diagnosis of Chronic Kidney Disease.
Mob. Inf. Syst., 2020

Influence of multimedia and seating location in academic engagement and grade performance of students.
Comput. Appl. Eng. Educ., 2020

Automatic Vehicle License Plate Recognition Using Optimal K-Means With Convolutional Neural Network for Intelligent Transportation Systems.
IEEE Access, 2020

Resource Provisioning for Cyber-Physical-Social System in Cloud-Fog-Edge Computing Using Optimal Flower Pollination Algorithm.
IEEE Access, 2020

Efficient Bit-Parallel Multiplier for All Trinomials Based on n-Term Karatsuba Algorithm.
IEEE Access, 2020

Space Efficient $GF(2^m)$ Multiplier for Special Pentanomials Based on $n$ -Term Karatsuba Algorithm.
IEEE Access, 2020

Towards Sensor-Cloud Based Efficient Smart Healthcare Monitoring Framework using Machine Learning.
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020

2019
Trajectory tracking optimization of mobile robot using artificial immune system.
Multim. Tools Appl., 2019

An Attack-Based Evaluation Method for Differentially Private Learning Against Model Inversion Attack.
IEEE Access, 2019

Low Space Complexity $GF(2^m)$ Multiplier for Trinomials Using $n$ -Term Karatsuba Algorithm.
IEEE Access, 2019

Efficient Privacy-Preserving Machine Learning for Blockchain Network.
IEEE Access, 2019

2018
Distributed quality of service routing protocol for multimedia traffic in WiMedia networks.
Wirel. Networks, 2018

A secure ECC-based RFID mutual authentication protocol for internet of things.
J. Supercomput., 2018

Subquadratic Space Complexity Multiplier Using Even Type GNB Based on Efficient Toeplitz Matrix-Vector Product.
IEEE Trans. Computers, 2018

A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments.
Secur. Commun. Networks, 2018

Efficient multiplier based on hybrid approach for Toeplitz matrix-vector product.
Inf. Process. Lett., 2018

Efficient Three-Way Split Formulas for Binary Polynomial Multiplication and Toeplitz Matrix Vector Product.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Efficient Approach for Mitigating Mobile Phishing Attacks.
IEICE Trans. Commun., 2018

Differential property of Present-like structure.
Discret. Appl. Math., 2018

TRNG (True Random Number Generator) Method Using Visible Spectrum for Secure Communication on 5G Network.
IEEE Access, 2018

2017
New Block Recombination for Subquadratic Space Complexity Polynomial Multiplication Based on Overlap-Free Approach.
IEEE Trans. Computers, 2017

Multipath routing technique for responding to sniffing attacks in wireless multimedia sensor network environment.
Int. J. Sens. Networks, 2017

2016
Symmetric searchable encryption with efficient range query using multi-layered linked chains.
J. Supercomput., 2016

Comments on "Multiway Splitting Method for Toeplitz Matrix Vector Product".
IEEE Trans. Computers, 2016

DRM cloud framework to support heterogeneous digital rights management systems.
Multim. Tools Appl., 2016

Explicit formulae for Mastrovito matrix and its corresponding Toeplitz matrix for all irreducible pentanomials using shifted polynomial basis.
Integr., 2016

Efficient Multiplication Based on Dickson Bases over Any Finite Fields.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Cyber threats to mobile messenger apps from identity cloning.
Intell. Autom. Soft Comput., 2016

2015
Low Complexity Multiplier Based on Dickson Basis Using Efficient Toeplitz Matrix-Vector Product.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Generalization to Any Field of Toeplitz Matrix Vector Product Based on Multi-Way Splitting Method and Its Application.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Framework of Service Accountability and Policy Representation for Trustworthy Cloud Services.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

2014
Comments on "On the Polynomial Multiplication in Chebyshev Form".
IEEE Trans. Computers, 2014

New efficient bit-parallel polynomial basis multiplier for special pentanomials.
Integr., 2014

Spyware Resistant Smartphone User Authentication Scheme.
Int. J. Distributed Sens. Networks, 2014

Bit-Parallel Cubing Computation over <i>GF</i>(3<i><sup>m</sup></i>) for Irreducible Trinomials.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

2013
A Privacy Preserving Message Delivery Protocol Using Identity-Hidden Index in VDTNs.
J. Univers. Comput. Sci., 2013

DRM Cloud Architecture and Service Scenario for Content Protection.
J. Internet Serv. Inf. Secur., 2013

Fast Bit-Parallel Polynomial Basis Multiplier for <i>GF</i>(2<sup><i>m</i></sup>) Defined by Pentanomials Using Weakly Dual Basis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Certificate-Based Proxy Re-encryption for Public Cloud Storage.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

2000
A lower bound on the linear span of an FCSR.
IEEE Trans. Inf. Theory, 2000

On the relationships between fuzzy equivalence relations and fuzzy difunctional relations, and their properties.
Fuzzy Sets Syst., 2000

1995
On Comparison and Analysis of Algorithms for Multiplication in GF(2^m).
J. Comput. Syst. Sci., 1995


  Loading...