Donghyun Kim
Orcid: 0009-0007-3025-3219Affiliations:
- Georgia State University, Atlanta, GA, USA
- Kennesaw State University, Marietta, Department of Computer Science
- North Carolina Central University, Durham, Department of Mathematics and Physics
- University of Texas at Dallas, Richardson
- Hanyang University, Department of Computer Science and Engineering
According to our database1,
Donghyun Kim
authored at least 112 papers
between 2005 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
IEEE ACM Trans. Comput. Biol. Bioinform., 2023
OCR Meets the Dark Web: Identifying the Content Type Regarding Illegal and Cybercrime.
Proceedings of the Information Security Applications - 24th International Conference, 2023
2021
A Novel User Collusion-Resistant Decentralized Multi-Authority Attribute-Based Encryption Scheme Using the Deposit on a Blockchain.
Wirel. Commun. Mob. Comput., 2021
Group Delegated ID-Based Proxy Reencryption for the Enterprise IoT-Cloud Storage Environment.
Wirel. Commun. Mob. Comput., 2021
Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication.
Secur. Commun. Networks, 2021
On multi-path routing for reliable communications in failure interdependent complex networks.
J. Comb. Optim., 2021
J. Comb. Optim., 2021
An intelligent recommendation algorithm for red team strategy in edge computing powered massive Cyber Defense Exercise.
Comput. Commun., 2021
On Differential Privacy-Based Framework for Enhancing User Data Privacy in Mobile Edge Computing Environment.
IEEE Access, 2021
A Federated Framework for Fine-Grained Cloud Access Control for Intelligent Big Data Analytic by Service Providers.
IEEE Access, 2021
Differential Privacy using Fuzzy Convolution Neural Network (DP-FCNN) with Laplace Mechanism and Authenticated Access in Edge Computing.
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021
2020
IEEE Trans. Sustain. Comput., 2020
Guest Editorial Introduction to the Special Section on Scalability and Privacy in Social Networks.
IEEE Trans. Netw. Sci. Eng., 2020
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020
2019
Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis<sup>*</sup>.
Proceedings of the International Conference on Computing, Networking and Communications, 2019
2018
On Practical Construction of Quality Fault-Tolerant Virtual Backbone in Homogeneous Wireless Networks.
IEEE/ACM Trans. Netw., 2018
Secure and Privacy-Aware Incentives-Based Witness Service in Social Internet of Vehicles Clouds.
IEEE Internet Things J., 2018
Algorithmica, 2018
On latency-aware tree topology construction for emergency responding VANET applications.
Proceedings of the IEEE INFOCOM 2018, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
A Lightweight and Transparent Compensation Mechanism for Fog-Cloud Storage Framework.
Proceedings of the Fourth IEEE International Conference on Big Data Computing Service and Applications, 2018
2017
PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability.
Wirel. Commun. Mob. Comput., 2017
IEEE Trans. Veh. Technol., 2017
A New Constant Factor Approximation to Construct Highly Fault-Tolerant Connected Dominating Set in Unit Disk Graph.
IEEE/ACM Trans. Netw., 2017
On Theoretical Trajectory Planning of Multiple Drones To Minimize Latency in Search-and-Reconnaissance Operations.
IEEE Trans. Mob. Comput., 2017
Maximum Lifetime Combined Barrier-Coverage of Weak Static Sensors and Strong Mobile Sensors.
IEEE Trans. Mob. Comput., 2017
J. Comb. Optim., 2017
Int. J. Data Min. Bioinform., 2017
A new outsourcing conditional proxy re-encryption suitable for mobile cloud environment.
Concurr. Comput. Pract. Exp., 2017
A new maximum fault-tolerance barrier-coverage problem in hybrid sensor network and its polynomial time exact algorithm.
Ad Hoc Networks, 2017
On Interdependent Failure Resilient Multi-path Routing in Smart Grid Communication Network.
Proceedings of the Combinatorial Optimization and Applications, 2017
Graph-Theory Based Simplification Techniques for Efficient Biological Network Analysis.
Proceedings of the Third IEEE International Conference on Big Data Computing Service and Applications, 2017
2016
Wirel. Networks, 2016
The first constant factor approximation for minimum partial connected dominating set problem in growth-bounded graphs.
Wirel. Networks, 2016
IEEE/ACM Trans. Netw., 2016
A joint optimization of data ferry trajectories and communication powers of ground sensors for long-term environmental monitoring.
J. Comb. Optim., 2016
KSII Trans. Internet Inf. Syst., 2016
Int. J. Sens. Networks, 2016
Editorial for special issue on Big Data and knowledge extraction for Cyber-Physical Systems 2016.
Int. J. Distributed Sens. Networks, 2016
Discret. Math. Algorithms Appl., 2016
Efficient respondents selection for biased survey using homophily-high social relation graph.
Discret. Math. Algorithms Appl., 2016
On efficient vaccine distribution strategy to suppress pandemic using social relation.
Discret. Math. Algorithms Appl., 2016
Cognitive radio based connectivity management for resilient end-to-end communications in VANETs.
Comput. Commun., 2016
Ad Hoc Networks, 2016
Enhancing barrier coverage with β quality of monitoring in wireless camera sensor networks.
Ad Hoc Networks, 2016
Cost effective mobile and static road side unit deployment for vehicular adhoc networks.
Proceedings of the 2016 International Conference on Computing, 2016
A New Mobile Online Social Network Based Location Sharing with Enhanced Privacy Protection.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
A Simpler Constant Factor Approximation for the k-Connected m-Domination Set Problem in Unit Disk Graph.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016
Toward VANET Utopia: A New Privacy Preserving Trustworthiness Management Scheme for VANET.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016
2015
Maximum lifetime suspect monitoring on the street with battery-powered camera sensors.
Wirel. Networks, 2015
Discret. Math. Algorithms Appl., 2015
PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability.
CoRR, 2015
Ad Hoc Networks, 2015
On security and privacy issues of fog computing supported Internet of Things environment.
Proceedings of the 6th International Conference on the Network of the Future, 2015
A New Privacy-Aware Mutual Authentication Mechanism for Charging-on-the-Move in Online Electric Vehicles.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015
Privacy aware incentive mechanism to collect mobile data while preventing duplication.
Proceedings of the 34th IEEE Military Communications Conference, 2015
Bandwidth-aware breach-free barrier construction with VANET nodes for realtime fugitive search.
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
A better constant approximation for minimum 3-connected m-dominating set problem in unit disk graph using Tutte decomposition.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
Proceedings of the Computational Social Networks - 4th International Conference, 2015
Proceedings of the Computational Social Networks - 4th International Conference, 2015
2014
IEEE Trans. Mob. Comput., 2014
J. Inform. and Commun. Convergence Engineering, 2014
Computing an effective decision making group of a society using social network analysis.
J. Comb. Optim., 2014
Int. J. Distributed Sens. Networks, 2014
Two new multi-path routing algorithms for fault-tolerant communications in smart grid.
Ad Hoc Networks, 2014
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014
Imperfection Better Than Perfection: Beyond Optimal Lifetime Barrier Coverage in Wireless Sensor Networks.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014
Barrier-Coverage for City Block Monitoring in Bandwidth Sensitive Vehicular Adhoc Networks.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014
On Secure, Privacy-Aware, and Efficient Beacon Broadcasting among One-Hop Neighbors in VANETs.
Proceedings of the 2014 IEEE Military Communications Conference, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Conditional proxy re-encryption for secure big data group sharing in cloud environment.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014
Constructing belt-barrier providing β-quality of monitoring with minimum camera sensors.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the Computing and Combinatorics - 20th International Conference, 2014
2013
IEEE/ACM Trans. Netw., 2013
Int. J. Sens. Networks, 2013
Maximum lifetime effective-sensing partial target-coverage in camera sensor networks.
Proceedings of the 11th International Symposium and Workshops on Modeling and Optimization in Mobile, 2013
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013
Proceedings of the 32th IEEE Military Communications Conference, 2013
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013
A Dominating Set Based Approach to Identify Effective Leader Group of Social Network.
Proceedings of the Computing and Combinatorics, 19th International Conference, 2013
Vehicle Witnesses as a Service: Leveraging Vehicles as Witnesses on the Road in VANET Clouds.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
2012
Constructing weakly connected dominating set for secure clustering in distributed sensor network.
J. Comb. Optim., 2012
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012
Minimizing data collection latency in wireless sensor network with multiple mobile elements.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
2011
IEEE/ACM Trans. Netw., 2011
2010
A Better Approximation Algorithm for Computing Connected Dominating Sets in Unit Ball Graphs.
IEEE Trans. Mob. Comput., 2010
Minimum average routing path clustering problem in multi-hop 2-D underwater sensor networks.
Optim. Lett., 2010
J. Comb. Optim., 2010
Algorithmica, 2010
A New Constant Factor Approximation for Computing 3-Connected m-Dominating Sets in Homogeneous Wireless Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
2009
Constructing Minimum Connected Dominating Sets with Bounded Diameters in Wireless Networks.
IEEE Trans. Parallel Distributed Syst., 2009
A Better Approximation for Minimum Average Routing Path Clustering Problem in 2-d Underwater Sensor Networks.
Discret. Math. Algorithms Appl., 2009
A PTAS for Minimum d-Hop Underwater Sink Placement Problem in 2-d Underwater Sensor Networks.
Discret. Math. Algorithms Appl., 2009
2008
Proceedings of the Wireless Algorithms, 2008
Proceedings of the Wireless Algorithms, 2008
Proceedings of the Computing and Combinatorics, 14th Annual International Conference, 2008
Two Constant Approximation Algorithms for Node-Weighted Steiner Tree in Unit Disk Graphs.
Proceedings of the Combinatorial Optimization and Applications, 2008
2005
Proceedings of the Computational Science and Its Applications, 2005