Jung-San Lee
Orcid: 0000-0001-7030-2985
According to our database1,
Jung-San Lee
authored at least 73 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Log Preservation in Custody Dual Blockchain With Energy Regime and Obfuscation Shuffle.
IEEE Trans. Netw. Sci. Eng., 2024
Lawful Remote Forensics Mechanism With Admissibility of Evidence in Stochastic and Unpredictable Transnational Crime.
IEEE Trans. Inf. Forensics Secur., 2024
Preserving manipulated and synthetic Deepfake detection through face texture naturalness.
J. Inf. Secur. Appl., 2024
Proceedings of the 2024 6th International Conference on Image, Video and Signal Processing, 2024
2023
J. Inf. Secur. Appl., March, 2023
Preserving friendly stacking and weighted shadows in selective scalable secret image sharing.
Multim. Tools Appl., 2023
2022
Blockchain-Based WDP Solution for Real-Time Heterogeneous Computing Resource Allocation.
IEEE Trans. Netw. Serv. Manag., December, 2022
Medical blockchain: Data sharing and privacy preserving of EHR based on smart contract.
J. Inf. Secur. Appl., 2022
CoNN-IDS: Intrusion detection system based on collaborative neural networks and agile training.
Comput. Secur., 2022
Preserving Collusion-Free and Traceability in Car-Sharing System Based on Blockchain.
Proceedings of the New Trends in Computer Technologies and Applications, 2022
2021
Preserving Liberty and Fairness in Combinatorial Double Auction Games Based on Blockchain.
IEEE Syst. J., 2021
Robust 3D mesh zero-watermarking based on spherical coordinate and Skewness measurement.
Multim. Tools Appl., 2021
Secure session between an IoT device and a cloud server based on elliptic curve cryptosystem.
Int. J. Inf. Comput. Secur., 2021
Comput. Secur., 2021
2020
Multim. Tools Appl., 2020
Biometric-based key management for satisfying patient's control over health information in the HIPAA regulations.
KSII Trans. Internet Inf. Syst., 2020
Towards Accurate and Efficient Classification of Power System Contingencies and Cyber-Attacks Using Recurrent Neural Networks.
IEEE Access, 2020
Proceedings of the ICFET 2020, 2020
2019
Multim. Tools Appl., 2019
Int. J. Netw. Secur., 2019
2018
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
2017
Image structure rebuilding technique using fractal dimension on the best match patch searching.
Multim. Tools Appl., 2017
Int. J. Netw. Secur., 2017
2016
Renovating Contaminative Image Archives Based on Patch Propagation and Adaptive Confidence Collation.
IEEE Trans. Circuits Syst. Video Technol., 2016
Multim. Tools Appl., 2016
KSII Trans. Internet Inf. Syst., 2016
2015
Multim. Tools Appl., 2015
KSII Trans. Internet Inf. Syst., 2015
Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique.
Digit. Signal Process., 2015
2014
Secur. Commun. Networks, 2014
IEEE Multim., 2014
2013
Wirel. Networks, 2013
Secur. Commun. Networks, 2013
Notes on "Authentication protocol using an identifier in an ad hoc network environment".
Math. Comput. Model., 2013
J. Vis. Commun. Image Represent., 2013
Image Vis. Comput., 2013
Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy.
Int. J. Netw. Secur., 2013
Preserving user-participation for insecure network communications with CAPTCHA and visual secret sharing technique.
IET Networks, 2013
Aryabhata remainder theorem-based non-iterative electronic lottery mechanism with robustness.
IET Inf. Secur., 2013
Electron. Commer. Res. Appl., 2013
2012
Electron. Commer. Res. Appl., 2012
2011
ACM Trans. Multim. Comput. Commun. Appl., 2011
Comput. Secur., 2011
2010
Wirel. Pers. Commun., 2010
Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector.
Digit. Signal Process., 2010
2009
IEEE Trans. Circuits Syst. Video Technol., 2009
A Novel Illumination-Balance Technique for Improving the Quality of Degraded Text-Photo Images.
IEEE Trans. Circuits Syst. Video Technol., 2009
Pattern Recognit., 2009
J. Netw. Comput. Appl., 2009
IEICE Trans. Commun., 2009
Comput. Stand. Interfaces, 2009
Comput. Electr. Eng., 2009
Proceedings of the 2009 IEEE International Conference on Computing and Communication Technologies, 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009
2008
Preserving data integrity in mobile <i>ad hoc</i> networks with variant Diffie-Hellman protocol.
Secur. Commun. Networks, 2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
Preserving PHI in Compliance with HIPAA Privacy/Security Regulations Using Cryptographic Techniques.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008
2007
J. Netw. Comput. Appl., 2007
Int. J. Mob. Commun., 2007
Comput. Networks, 2007
2006
Int. J. Mob. Commun., 2006
Comput. Secur., 2006
2005
Proceedings of the 15th International Workshop on Research Issues in Data Engineering (RIDE-SDMA 2005), 2005
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005
2004
An Efficient and Secure Multi-Server Password Authentication Scheme using Smart Cards.
Proceedings of the 3rd International Conference on Cyberworlds (CW 2004), 2004