Kihun Hong

Orcid: 0000-0002-5538-3630

According to our database1, Kihun Hong authored at least 15 papers between 2004 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

2005
2010
2015
2020
2025
0
1
2
3
4
5
6
1
1
1
1
3
4
1
1
2

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Dual-Channel Deepfake Audio Detection: Leveraging Direct and Reverberant Waveforms.
IEEE Access, 2025

2024
A Kernel Perspective on Distillation-based Collaborative Learning.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

The Influence of Haptic Feedback and Visual Information on Multi-Limb Coordination.
Proceedings of the 16th International Conference on Human System Interaction, 2024

Trident of Poseidon: A Generalized Approach for Detecting Deepfake Voices.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
On the Defense of Spoofing Countermeasures Against Adversarial Attacks.
IEEE Access, 2023

GAN Discriminator based Audio Deepfake Detection.
Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes, 2023

Characterizing the Sense of Embodiment: the Development of a Sensorimotor Robotic Platform.
Proceedings of the 32nd IEEE International Conference on Robot and Human Interactive Communication, 2023

Towards Understanding Ensemble Distillation in Federated Learning.
Proceedings of the International Conference on Machine Learning, 2023

BTS-E: Audio Deepfake Detection Using Breathing-Talking-Silence Encoder.
Proceedings of the IEEE International Conference on Acoustics, 2023

2007
Integrated Authentication Model for Network Access in Next Generation Networks.
IEICE Trans. Commun., 2007

2006
A Hierarchical Key Management Scheme for Authentication of Roaming Mobile Nodes between Domains in Mobile Networks.
IEICE Trans. Commun., 2006

Heterogeneous Routing Protocol Coordinator for Mobile Ad Hoc Networks.
Proceedings of the Ubiquitous Computing Systems, Third International Symposium, 2006

2005
A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

2004
Impacts of Security Protocols on Real-Time Multimedia Communications.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

An Efficient Authentication Scheme Using Recovery Information in Signature.
Proceedings of the Information and Communications Security, 6th International Conference, 2004


  Loading...