Changhoon Lee
Orcid: 0000-0003-4292-5792
According to our database1,
Changhoon Lee
authored at least 115 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., April, 2024
IACR Cryptol. ePrint Arch., 2024
2023
J. Supercomput., June, 2023
TPTNet: A Data-Driven Temperature Prediction Model Based on Turbulent Potential Temperature.
CoRR, 2023
Partial Granger causality-based feature selection algorithm for workload prediction in cloud systems.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023
Optimization of Cloud Computing Workload Prediction Model with Domain-based Feature Selection Method.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2023
2022
CoVAC: A P2P smart contract-based intelligent smart city architecture for vaccine manufacturing.
Comput. Ind. Eng., 2022
2021
KSII Trans. Internet Inf. Syst., 2021
2020
J. Supercomput., 2020
Deep unsupervised learning of turbulence for inflow generation at various Reynolds numbers.
J. Comput. Phys., 2020
HANMRE - An authenticated encryption secure against side-channel attacks for nonce-misuse and lightweight approaches.
Appl. Soft Comput., 2020
2019
Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor.
Int. J. Distributed Sens. Networks, 2019
EURASIP J. Image Video Process., 2019
Early-Bird or Last-Minute? The Impact of Mobile Channel Adoption on Purchasing Behavior.
Proceedings of the 40th International Conference on Information Systems, 2019
2018
IEEE Trans. Ind. Informatics, 2018
Cryptanalysis on SDDO-Based BM123-64 Designs Suitable for Various IoT Application Targets.
Symmetry, 2018
CoWebDraw: a real-time collaborative graphical editing system supporting multi-clients based on HTML5.
Multim. Tools Appl., 2018
Efficient monolithic projection method for time-dependent conjugate heat transfer problems.
J. Comput. Phys., 2018
Color sensors and their applications based on real-time color image segmentation for cyber physical systems.
EURASIP J. Image Video Process., 2018
Information-based management mode based on value network analysis for livestock enterprises.
Enterp. Inf. Syst., 2018
2017
An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things.
Wirel. Pers. Commun., 2017
J. Real Time Image Process., 2017
J. Comput. Phys., 2017
Feature Selection Algorithm for Intrusions Detection System using Sequential Forward Search and Random Forest Classifier.
KSII Trans. Internet Inf. Syst., 2017
Clust. Comput., 2017
2016
Capability-based semantic matching for dynamic resource allocation in tactical edge environment.
J. Supercomput., 2016
J. Supercomput., 2016
Performance analysis for contention adaptation of M2M devices with directional antennas.
J. Supercomput., 2016
J. Supercomput., 2016
A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.
Sensors, 2016
The protocol design and New approach for SCADA security enhancement during sensors broadcasting system.
Multim. Tools Appl., 2016
Guest Editorial: Data Mining and Machine Learning Technologies for Multimedia Information Retrieval and Recommendation.
Multim. Tools Appl., 2016
Guest Editorial: Automated Big Data Analysis for Social Multimedia Network Environments.
Multim. Tools Appl., 2016
Multim. Tools Appl., 2016
A pre-conditioned implicit direct forcing based immersed boundary method for incompressible viscous flows.
J. Comput. Phys., 2016
J. Comput. Phys., 2016
Analysis of velocity-components decoupled projection method for the incompressible Navier-Stokes equations.
Comput. Math. Appl., 2016
2015
Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis.
Peer-to-Peer Netw. Appl., 2015
Multim. Tools Appl., 2015
Int. J. Distributed Sens. Networks, 2015
A reconstruction method of intra-ventricular blood flow using color flow ultrasound: a simulation study.
Proceedings of the Medical Imaging 2015: Biomedical Applications in Molecular, 2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
Segment-wise online learning based on greedy algorithm for real-time multi-target tracking.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015
2014
An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks.
J. Supercomput., 2014
Posted price model based on GRS and its optimization for improving grid resource sharing efficiency.
Telecommun. Syst., 2014
Editorial: special issue on "Recent advanced in ubiquitous infrastructure technology".
Telecommun. Syst., 2014
Multim. Tools Appl., 2014
J. Real Time Image Process., 2014
J. Intell. Manuf., 2014
J. Comput. Sci. Eng., 2014
Int. J. Distributed Sens. Networks, 2014
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014
2013
J. Supercomput., 2013
Telecommun. Syst., 2013
ACM HotMobile 2013 demo: bringing in-situ social awareness to mobile systems: everyday interaction monitoring and its applications.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2013
Multim. Tools Appl., 2013
A numerical method for the calculation of drag and lift of a deformable droplet in shear flow.
J. Comput. Phys., 2013
Security Analysis of Scalable Block Cipher PP-1 Applicable to Distributed Sensor Networks.
Int. J. Distributed Sens. Networks, 2013
Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks.
EURASIP J. Wirel. Commun. Netw., 2013
Electron. Commer. Res., 2013
Comput. Math. Appl., 2013
2012
A learning automata-based fault-tolerant routing algorithm for mobile ad hoc networks.
J. Supercomput., 2012
Secur. Commun. Networks, 2012
Multim. Tools Appl., 2012
Math. Comput. Model., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012
Related-Key Attack on the MD-64 Block Cipher Suitable for Pervasive Computing Environments.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes.
Comput. Commun., 2011
Cryptanalysis of CIKS-128 and CIKS-128H Suitable for Intelligent Multimedia and Ubiquitous Computing Systems.
Comput. Informatics, 2011
The Method of Database Server Detection and Investigation in the Enterprise Environment.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
2010
A power-, delay- and emergency-efficient protocol of ubiquitous sensor network systems for silver town applications.
J. Supercomput., 2010
Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device.
Telecommun. Syst., 2010
Special issue on "Modeling and simulation techniques for future generation communication networks".
Simul. Model. Pract. Theory, 2010
A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data.
Simul. Model. Pract. Theory, 2010
IEEE Intell. Syst., 2010
2009
Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments.
J. Univers. Comput. Sci., 2009
EURASIP J. Wirel. Commun. Netw., 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the Third Asia International Conference on Modelling & Simulation, 2009
2008
Analysis of electronic structures and chemical bonding of metal-rich compounds. I. Density functional study of Pt metal, LiPt<sub>2</sub>, LiPt, and Li<sub>2</sub>Pt.
J. Comput. Chem., 2008
Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the Parallel and Distributed Processing and Applications, 2006
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Proceedings of the WEWoRC 2005, 2005
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Cryptography and Coding, 2005
2004
Proceedings of the Progress in Cryptology, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Proceedings of the Progress in Cryptology, 2003
Proceedings of the Progress in Cryptology, 2003
2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
1993
Short Waves in a Rotating, Shallow Tank with Bathymetry: A Model Equation in the Mild-Slope Approximation.
SIAM J. Appl. Math., 1993