Jongkil Kim
Orcid: 0000-0001-5755-108X
According to our database1,
Jongkil Kim
authored at least 40 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Sensors, 2024
IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
IEEE Trans. Inf. Forensics Secur., 2023
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2023
2022
Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns.
J. Imaging, December, 2022
Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Cloud Comput., 2022
Verifiable Outsourced Decryption of Encrypted Data From Heterogeneous Trust Networks.
IEEE Internet Things J., 2022
Proceedings of the Information Security Applications - 23rd International Conference, 2022
2021
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
Utilizing QR codes to verify the visual fidelity of image datasets for machine learning.
J. Netw. Comput. Appl., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Information Security Applications - 22nd International Conference, 2021
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021
SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments.
Proceedings of the Computer Security - ESORICS 2021, 2021
2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019
Guest Editorial: Security and Privacy for Contemporary Network Computing Environment.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019
IACR Cryptol. ePrint Arch., 2019
A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
Functional encryption for computational hiding in prime order groups via pair encodings.
Des. Codes Cryptogr., 2018
2017
Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication.
IACR Cryptol. ePrint Arch., 2017
An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
A Tag Based Encoding: An Efficient Encoding for Predicate Encoding in Prime Order Groups.
IACR Cryptol. ePrint Arch., 2016
A Cryptographically Enforced Access Control with a Flexible User Revocation on Untrusted Cloud Storage.
Data Sci. Eng., 2016
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
2015
Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext.
IEEE Trans. Inf. Forensics Secur., 2015
2013
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013