Kangbin Yim
Orcid: 0000-0002-1361-1455
According to our database1,
Kangbin Yim
authored at least 165 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Security of 6G-Enabled Vehicle-to-Everything Communication in Emerging Federated Learning and Blockchain Technologies.
IEEE Access, 2024
CF-AIDS: Comprehensive Frequency-Agnostic Intrusion Detection System on In-Vehicle Network.
IEEE Access, 2024
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2024
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2024
Comparative Analysis of Machine Learning and Deep Learning Models for Email Spam Classification Using TF-IDF and Word Embedding Techniques.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2024
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2024
Lightweight and Accurate FER for Driver Emotion Analysis: Optimizing ResNet with Patch Extraction and Self-attention Techniques.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2024
Cybersecurity in UAVs: An Intrusion Detection System Using UAVCAN and Deep Reinforcement Learning.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2024
2023
Vulnerability Analysis and Security Assessment of Secure Keyboard Software to Prevent PS/2 Interface Keyboard Sniffing.
Sensors, April, 2023
Sensors, March, 2023
Neutralization Method of Ransomware Detection Technology Using Format Preserving Encryption.
Sensors, 2023
Performance Evaluation of Phishing Classification Techniques on Various Data Sources and Schemes.
IEEE Access, 2023
A Novel Attack Scenario Dataset Collection for Intrusion Detection System in CAN Network.
Proceedings of the Advances in Networked-based Information Systems, 2023
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2023
A Lightweight Intrusion Detection System on In-Vehicle Network Using Polynomial Features.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2023
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2023
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2023
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2023
Enhancing In-Vehicle Network Security Through Bitstream Feature Extraction-Based Intrusion Detection.
Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, 2023
Time Series Mean Normalization for Enhanced Feature Extraction in In-Vehicle Network Intrusion Detection System.
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023
2022
Study on the transaction linkage technique combined with the designated terminal for 5G-enabled IoT.
Digit. Commun. Networks, 2022
Efficient CAN Dataset Collection Method for Accurate Security Threat Analysis on Vehicle Internal Network.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 16th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2022), June 29, 2022
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 16th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2022), June 29, 2022
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022
2021
Offensive Security of Keyboard Data Using Machine Learning for Password Authentication in IoT.
IEEE Access, 2021
Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021
Vulnerability Analysis of Intellectual Property Rights Using Reverse Engineering: Based on Software D.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021
2020
Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems.
IEEE Trans. Netw. Serv. Manag., 2020
Sensors, 2020
Classification and Analysis of Security Techniques for the User Terminal Area in the Internet Banking Service.
Secur. Commun. Networks, 2020
Vulnerability analysis on the image-based authentication: Through the WM_INPUT message.
Concurr. Comput. Pract. Exp., 2020
Proceedings of the Information Security Applications - 21st International Conference, 2020
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020
Analysis on Account Hijacking and Remote Dos Vulnerability in the CODESYS-Based PLC Runtime.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020
A Study on Access Control Scheme Based on ABE Using Searchable Encryption in Cloud Environment.
Proceedings of the Advances in Internet, 2020
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2020
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2020
2019
A Novel Message-Preserving Scheme with Format-Preserving Encryption for Connected Cars in Multi-Access Edge Computing.
Sensors, 2019
BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems.
IEEE Access, 2019
Machine Learning Based File Entropy Analysis for Ransomware Detection in Backup Systems.
IEEE Access, 2019
Proceedings of the Pervasive Systems, Algorithms and Networks, 2019
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019
Novel Encryption Method of GPS Information in Image File Using Format-Preserving Encryption.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019
2018
A Study on a Secure USB Mechanism That Prevents the Exposure of Authentication Information for Smart Human Care Services.
J. Sensors, 2018
TRNG (True Random Number Generator) Method Using Visible Spectrum for Secure Communication on 5G Network.
IEEE Access, 2018
Vulnerability analysis of secure USB: based on the fingerprint authentication of product B.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
Detecting and Extracting Hidden Information from Stego-Images Based on JPG File on StegoMagic.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018
Proceedings of the Advances on Broadband and Wireless Computing, 2018
2017
Secur. Commun. Networks, 2017
Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment.
Int. J. Web Grid Serv., 2017
A Protection Technique for Screen Image-Based Authentication Protocols Utilizing the SetCursorPos Function.
Proceedings of the Information Security Applications - 18th International Conference, 2017
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017
Proceedings of the Advances on Broad-Band Wireless Computing, 2017
Proceedings of the Big Data Technologies and Applications - 8th International Conference, 2017
2016
Int. J. Comput. Math., 2016
Int. J. Ad Hoc Ubiquitous Comput., 2016
An Access Authentication Scheme Based on Hierarchical IBS for Proxy Mobile IPV6 Network.
Intell. Autom. Soft Comput., 2016
An efficient key management solution for privacy masking, restoring and user authentication for video surveillance servers.
Comput. Stand. Interfaces, 2016
Secure Mobile Instant Messaging key exchanging protocol with One-Time-Pad substitution transposition cryptosystem.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Proceedings of the Big Data Technologies and Applications - 7th International Conference, 2016
2015
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
An Indoor Positioning System Using Bluetooth RSSI with an Accelerometer and a Barometer on a Smartphone.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
2014
New quasi-Newton iterative learning control scheme based on rank-one update for nonlinear systems.
J. Supercomput., 2014
J. Netw. Comput. Appl., 2014
J. Internet Serv. Inf. Secur., 2014
J. Ambient Intell. Humaniz. Comput., 2014
J. Ambient Intell. Humaniz. Comput., 2014
Comput. Sci. Inf. Syst., 2014
PPS: A privacy-preserving security scheme for multi-operator wireless mesh networks with enhanced user experience.
Comput. Sci. Inf. Syst., 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Anonymous Credential-Based Privacy-Preserving Identity Verification for Business Processes.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
A Real-Time Intrusion Detection and Protection System at System Call Level under the Assistance of a Grid.
Proceedings of the Information and Communication Technology, 2014
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
2013
LEAS: Localized efficient authentication scheme for multi-operator wireless mesh network with identity-based proxy signature.
Math. Comput. Model., 2013
J. Internet Serv. Inf. Secur., 2013
Intelligent Reconfigurable Method of Cloud Computing Resources for Multimedia Data Delivery.
Informatica, 2013
An investigation on the unwillingness of nodes to participate in mobile delay tolerant network routing.
Int. J. Inf. Manag., 2013
Comput. Sci. Inf. Syst., 2013
Database Security System for Applying Sophisticated Access Control via Database Firewall Server.
Comput. Informatics, 2013
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013
Aggregate Signature-Based Efficient Attributes Proof with Pairing-Based Anonymous Credential.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Security Assessment on User Authentication by an HttpSendRequest Hooking in an HTTP Client.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
2012
Secur. Commun. Networks, 2012
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
J. Internet Serv. Inf. Secur., 2012
J. Internet Serv. Inf. Secur., 2012
A secure solution with a password recovery feature for USB flash drives.
Comput. Syst. Sci. Eng., 2012
A new iterative learning control scheme using the geometric rotation for discrete time systems.
Comput. Syst. Sci. Eng., 2012
A secure framework of the surveillance video network integrating heterogeneous video formats and protocols.
Comput. Math. Appl., 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
An Analysis of Strategies for Preventing Selfish Behavior in Mobile Delay Tolerant Networks.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
A New Iterative Learning Control Scheme Based on Damped Newton Method for Nonlinear Systems.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Delegation-Based Mutual Authentication Scheme for Multi-operator Wireless Mesh Network.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
2011
A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802.16e wireless networks.
Mob. Inf. Syst., 2011
J. Univers. Comput. Sci., 2011
Insider Threats are Getting Worse within Industries: Isolated Secondary Backup Required.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011
2010
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010
Proceedings of the CISIS 2010, 2010
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
2003
IEEE Trans. Consumer Electron., 2003
2002
Analysis of Packet Size on VOIP Performance.
Proceedings of the International Conference on Internet Computing, 2002
2000
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000
1999
IEEE Trans. Consumer Electron., 1999
1996
An Imprecise DCT Computation Model for Real-Time Applications.
Proceedings of the Multimedia Technology and Applications, 1996