Howon Kim
Orcid: 0000-0001-8475-7294Affiliations:
- Pusan National University, Department of Electronics and Computer Engineering, South Korea
- Electronics and Telecommunications Research Institute (ETRI), Daejeon, South Korea (1998 - 2008)
- Pohang University of Science and Technology (POSTECH), South Korea (PhD 1999)
According to our database1,
Howon Kim
authored at least 181 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Internet Things, 2024
Cityscape-Adverse: Benchmarking Robustness of Semantic Segmentation with Realistic Scene Modifications via Diffusion-Based Image Editing.
CoRR, 2024
CoRR, 2024
Towards unbalanced multiclass intrusion detection with hybrid sampling methods and ensemble classification.
Appl. Soft Comput., 2024
IEEE Access, 2024
IEEE Access, 2024
IEEE Access, 2024
IEEE Access, 2024
Robust Vulnerability Detection in Solidity-Based Ethereum Smart Contracts Using Fine-Tuned Transformer Encoder Models.
IEEE Access, 2024
Robust Credit Card Fraud Detection Based on Efficient Kolmogorov-Arnold Network Models.
IEEE Access, 2024
Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Segmentation Models with Patch Attack.
Proceedings of the Information Security Applications - 25th International Conference, 2024
Proceedings of the Information Security Applications - 25th International Conference, 2024
2023
Time Series Electrical Motor Drives Forecasting Based on Simulation Modeling and Bidirectional Long-Short Term Memory.
Sensors, September, 2023
Design and Implementation of a Blockchain Based Interworking of oneM2M and LWM2M IoT Systems.
J. Inf. Process. Syst., February, 2023
IACR Cryptol. ePrint Arch., 2023
Behind The Wings: The Case of Reverse Engineering and Drone Hijacking in DJI Enhanced Wi-Fi Protocol.
CoRR, 2023
IEEE Access, 2023
IEEE Access, 2023
Toward Enhanced Attack Detection and Explanation in Intrusion Detection System-Based IoT Environment Data.
IEEE Access, 2023
A New Frontier in Digital Security: Verification for NFT Image Using Deep Learning-Based ConvNeXt Model in Quantum Blockchain.
Proceedings of the Information Security Applications - 24th International Conference, 2023
Proceedings of the Information Security Applications - 24th International Conference, 2023
Enhancing Intrusion Detection and Explanations for Imbalanced Vehicle CAN Network Data.
Proceedings of the 12th International Symposium on Information and Communication Technology, 2023
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023
ACTIVE: Towards Highly Transferable 3D Physical Camouflage for Universal and Robust Vehicle Evasion.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2023
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2023
2022
RealPrice: Blockchain-Powered Real-Time Pricing for Software-Defined Enabled Edge Network.
Sensors, 2022
Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method.
Sensors, 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
SIGNORA: A Blockchain-Based Framework for Dataflow Integrity Provisioning in an Untrusted Data Pipeline.
IEEE Access, 2022
A High-Performance ECC Processor Over Curve448 Based on a Novel Variant of the Karatsuba Formula for Asymmetric Digit Multiplier.
IEEE Access, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022
2021
Toward Load Identification Based on the Hilbert Transform and Sequence to Sequence Long Short-Term Memory.
IEEE Trans. Smart Grid, 2021
Extended Spatially Localized Perturbation GAN (eSLP-GAN) for Robust Adversarial Camouflage Patches.
Sensors, 2021
High-Speed and Unified ECC Processor for Generic Weierstrass Curves over GF(p) on FPGA.
Sensors, 2021
Robust Adversarial Attack Against Explainable Deep Classification Models Based on Adversarial Images With Different Patch Sizes and Perturbation Ratios.
IEEE Access, 2021
Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve Discrete Logarithm Problem.
Proceedings of the Information Security Applications - 22nd International Conference, 2021
AnyTRNG: Generic, High-Throughput, Low-Area True Random Number Generator Based on Synchronous Edge Sampling.
Proceedings of the Information Security Applications - 22nd International Conference, 2021
2020
IEEE Trans. Computers, 2020
A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization.
Sensors, 2020
Background Load Denoising across Complex Load Based on Generative Adversarial Network to Enhance Load Identification.
Sensors, 2020
Household Appliance Classification Using Lower Odd-Numbered Harmonics and the Bagging Decision Tree.
IEEE Access, 2020
Spatially Localized Perturbation GAN (SLP-GAN) for Generating Invisible Adversarial Patches.
Proceedings of the Information Security Applications - 21st International Conference, 2020
Proceedings of the IEEE/ACM International Conference On Computer Aided Design, 2020
ABSTRACT: Together We Can Fool Them: A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization.
Proceedings of the CCSW'20, 2020
2019
Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things.
IEEE Trans. Dependable Secur. Comput., 2019
2018
J. Supercomput., 2018
J. Supercomput., 2018
J. Supercomput., 2018
Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor.
Secur. Commun. Networks, 2018
An Implementation of ECC with Twisted Montgomery Curve over 32nd Degree Tower Field on Arduino Uno.
Int. J. Netw. Comput., 2018
Corrigendum to "Nonintrusive Load Monitoring Based on Advanced Deep Learning and Novel Signature".
Comput. Intell. Neurosci., 2018
Proceedings of the Information Security Applications - 19th International Conference, 2018
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018
2017
ACM Trans. Embed. Comput. Syst., 2017
J. Inform. and Commun. Convergence Engineering, 2017
J. Inform. and Commun. Convergence Engineering, 2017
A Comparative Study of Twist Property in KSS Curves of Embedding Degree 16 and 18 from the Implementation Perspective.
J. Inform. and Commun. Convergence Engineering, 2017
Comput. Intell. Neurosci., 2017
Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy, Revisited.
Proceedings of the Information Security Applications - 18th International Conference, 2017
Proceedings of the Information Security Applications - 18th International Conference, 2017
Proceedings of the Information Security Applications - 18th International Conference, 2017
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017
Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
An ECC Implementation with a Twisted Montgomery Curve over Fq32 on an 8-Bit Microcontroller.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017
2016
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes.
IEEE Trans. Inf. Forensics Secur., 2016
Efficient arithmetic on ARM-NEON and its application for high-speed RSA implementation.
Secur. Commun. Networks, 2016
Analyzing Effective of Activation Functions on Recurrent Neural Networks for Intrusion Detection.
J. Multim. Inf. Syst., 2016
J. Inform. and Commun. Convergence Engineering, 2016
J. Inform. and Commun. Convergence Engineering, 2016
A Synthesis of Multi-Precision Multiplication and Squaring Techniques for 8-Bit Sensor Nodes: State-of-the-Art Research and Future Challenges.
J. Comput. Sci. Technol., 2016
Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors, a Step Forward.
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the Radio Frequency Identification and IoT Security, 2016
Classification performance using gated recurrent unit recurrent neural network on energy disaggregation.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2016
2015
Secur. Commun. Networks, 2015
J. Inform. and Commun. Convergence Engineering, 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Comput. Secur., 2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Applying Recurrent Neural Network to Intrusion Detection with Hessian Free Optimization.
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
2014
Sensors, 2014
Binary and prime field multiplication for public key cryptography on embedded microprocessors.
Secur. Commun. Networks, 2014
J. Inform. and Commun. Convergence Engineering, 2014
J. Inform. and Commun. Convergence Engineering, 2014
J. Inform. and Commun. Convergence Engineering, 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Proceedings of the IEEE World Forum on Internet of Things, 2014
Proceedings of the IEEE World Forum on Internet of Things, 2014
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
Proceedings of the Future Data and Security Engineering - First International Conference, 2014
2013
Fixed-Base Comb with Window-Non-Adjacent Form (NAF) Method for Scalar Multiplication.
Sensors, 2013
Secur. Commun. Networks, 2013
Implementation of Multi-Precision Multiplication over Sensor Networks with Efficient Instructions.
J. Inform. and Commun. Convergence Engineering, 2013
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes.
Proceedings of the Information and Communications Security - 15th International Conference, 2013
2012
J. Inform. and Commun. Convergence Engineering, 2012
J. Inform. and Commun. Convergence Engineering, 2012
J. Inform. and Commun. Convergence Engineering, 2012
J. Inform. and Commun. Convergence Engineering, 2012
J. Inform. and Commun. Convergence Engineering, 2012
Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors.
Proceedings of the Information Security Applications - 13th International Workshop, 2012
Proceedings of the Dynamics in Logistics, Third International Conference, 2012
Proceedings of the IEEE International Conference on Consumer Electronics, 2012
2011
J. Inform. and Commun. Convergence Engineering, 2011
Transmission Power Range based Sybil Attack Detection Method over Wireless Sensor Networks.
J. Inform. and Commun. Convergence Engineering, 2011
2010
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010
2009
IEEE Trans. Computers, 2009
2008
J. Commun. Networks, 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Proceedings of the IEEE International Conference on Acoustics, 2008
Proceedings of the Progress in WWW Research and Development, 2008
2007
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007
Privacy Management for Medical Service Application Using Mobile Phone Collaborated with RFID Reader.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Proceedings of the Information Security Practice and Experience, 2007
A Design of Context aware Smart Home Safety Management using by Networked RFID and Sensor.
Proceedings of the Home Networking, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields.
IACR Cryptol. ePrint Arch., 2006
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols.
Proceedings of the Information Security Applications, 7th International Workshop, 2006
A Layered Approach to Design of Light-Weight Middleware Systems for Mobile RFID Security (SMRM : Secure Mobile RFID Middleware System).
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
A Framework for Ensuring Security in Ubiquitous Computing Environment Based on Security Engineering Approach.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Proceedings of the Personal Wireless Communications, 2006
Proceedings of the Information Networking, 2006
XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing.
Proceedings of the Computational Science and Its Applications, 2006
Efficient Exponentiation in <i>GF</i>(<i>p</i><sup><i>m</i></sup>) Using the Frobenius Map.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit.
Proceedings of the Computational Intelligence and Security, International Conference, 2006
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Efficient Hardware Implementation of Elliptic Curve Cryptography over <i>GF</i>(<i>p</i><sup><i>m</i></sup>).
Proceedings of the Information Security Applications, 6th International Workshop, 2005
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the High Performance Computing and Communications, 2005
A Design of Privacy Conscious RFID System Using Customizing Privacy Policy Based Access Control.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the E-Commerce and Web Technologies: 6th International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Design and Implementation of Crypto Co-processor and Its Application to Security Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Advances in Web Intelligence Third International Atlantic Web IntelligenceConference, 2005
2004
Design and implementation of a private and public key crypto processor and its application to a security system.
IEEE Trans. Consumer Electron., 2004
Inf. Process. Lett., 2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
1998
J. Parallel Distributed Comput., 1998
1995
Adaptive Virutal Cut-through as an Alternative to Wormhole Routing.
Proceedings of the 1995 International Conference on Parallel Processing, 1995