Dae-Hee Seo

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
A study on the traceable attribute-based signature scheme provided with anonymous credentials.
Connect. Sci., December, 2024

CLSM-FL: Clustering-Based Semantic Federated Learning in Non-IID IoT Environment.
IEEE Internet Things J., September, 2024

KDGAN: Knowledge distillation-based model copyright protection for secure and communication-efficient model publishing.
IET Commun., August, 2024

A Comprehensive Approach to User Delegation and Anonymity within Decentralized Identifiers for IoT.
Sensors, April, 2024

Data Access Control for Secure Authentication Using Dual VC Scheme Based on CP-ABE in DID.
J. Circuits Syst. Comput., March, 2024

FedCPD: Addressing label distribution skew in federated learning with class proxy decoupling and proxy regularization.
Inf. Fusion, 2024

Vaccinating Federated Learning for Robust Modulation Classification in Distributed Wireless Networks.
CoRR, 2024

2023
Epidemic Vulnerability Index for Effective Vaccine Distribution Against Pandemic.
IEEE ACM Trans. Comput. Biol. Bioinform., 2023

TMETA: Trust Management for the Cold Start of IoT Services With Digital-Twin-Aided Blockchain.
IEEE Internet Things J., 2023

FedLC: Optimizing Federated Learning in Non-IID Data via Label-Wise Clustering.
IEEE Access, 2023

2022
A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks.
KSII Trans. Internet Inf. Syst., 2022

A Study on Data Sharing Scheme using ECP-ABSC that Provides Data User Traceability in the Cloud.
KSII Trans. Internet Inf. Syst., 2022

2021
Group Delegated ID-Based Proxy Reencryption for the Enterprise IoT-Cloud Storage Environment.
Wirel. Commun. Mob. Comput., 2021

Secure Encapsulation Schemes Using Key Recovery System in IoMT Environments.
Sensors, 2021

Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication.
Secur. Commun. Networks, 2021

Differentially private approximate aggregation based on feature selection.
J. Comb. Optim., 2021

An intelligent recommendation algorithm for red team strategy in edge computing powered massive Cyber Defense Exercise.
Comput. Commun., 2021

On Differential Privacy-Based Framework for Enhancing User Data Privacy in Mobile Edge Computing Environment.
IEEE Access, 2021

A Federated Framework for Fine-Grained Cloud Access Control for Intelligent Big Data Analytic by Service Providers.
IEEE Access, 2021

Decentralized Aggregation Design and Study of Federated Learning.
Proceedings of the 2021 IEEE SmartWorld, 2021

Differential Privacy using Fuzzy Convolution Neural Network (DP-FCNN) with Laplace Mechanism and Authenticated Access in Edge Computing.
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021

2020
A Secure Encapsulation Schemes Based on Key Recovery System.
Proceedings of the Silicon Valley Cybersecurity Conference - First Conference, 2020

2019
An Anonymous Protocol for Member Privacy in a Consortium Blockchain.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

2011
Reducing Communication Overhead for Nested NEMO Networks: Roaming Authentication and Access Control Structure.
IEEE Trans. Veh. Technol., 2011

2009
Secure RFID authentication scheme for EPC class Gen2.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

2008
Secure authentication and management scheme for RFID.
Proceedings of the Q2SWinet'08, 2008

2007
A Study on Improved RFID Authentication Scheme.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

2006
Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification.
Proceedings of the Computational Science and Its Applications, 2006

2005
A Study on RFID System with Secure Service Availability for Ubiquitous Computing.
J. Inf. Process. Syst., 2005

A Study on Secure SDP of RFID Using Bluetooth Communication.
Proceedings of the Computational Science and Its Applications, 2005

A Study on Scalable Bluetooth Piconet for Secure Ubiquitous.
Proceedings of the Web and Communication Technologies and Internet-Related Social Issues, 2005

2004
A Study on Key Recovery Agent Protection Profile Having Composition Function.
Proceedings of the Computational Science and Its Applications, 2004

A Study on Secure and Effcient Sensor Network Management Scheme Using PTD.
Proceedings of the Computational Science and Its Applications, 2004

2002
Secure Bluetooth Piconet Using Non-anonymous Group Key.
Proceedings of the EurAsia-ICT 2002: Information and Communication Technology, 2002


  Loading...