Kijoon Chae
Orcid: 0000-0002-6045-5192
According to our database1,
Kijoon Chae
authored at least 87 papers
between 1990 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Cell Based Raft Algorithm for Optimized Consensus Process on Blockchain in Smart Data Market.
IEEE Access, 2022
Hierarchical Blockchain-Based Group and Group Key Management Scheme Exploiting Unmanned Aerial Vehicles for Urban Computing.
IEEE Access, 2022
2021
J. Netw. Comput. Appl., 2021
IEEE Access, 2021
Improved Raft Algorithm exploiting Federated Learning for Private Blockchain performance enhancement.
Proceedings of the International Conference on Information Networking, 2021
2020
AFRL: Adaptive federated reinforcement learning for intelligent jamming defense in FANET.
J. Commun. Networks, 2020
Federated Learning-Based Cognitive Detection of Jamming Attack in Flying Ad-Hoc Network.
IEEE Access, 2020
Design of Blockchain System for Protection of Personal Information in Digital Content Trading Environment.
Proceedings of the 2020 International Conference on Information Networking, 2020
Randomly Elected Blockchain System based on Grouping Verifiers for Efficiency and Security.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020
2019
On-Device AI-Based Cognitive Detection of Bio-Modality Spoofing in Medical Cyber Physical System.
IEEE Access, 2019
Binarized Multi-Factor Cognitive Detection of Bio-Modality Spoofing in Fog Based Medical Cyber-Physical System.
Proceedings of the 33rd International Conference on Information Networking, 2019
SEFL: Selective Ensemble Fuzzy Learner for Cognitive Detection of Bio-Modality Spoofing in MCPS.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
2018
Comput. Sci. Inf. Syst., 2018
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
Authorization based on mobile whitelist in devices for device-to-device communications.
Proceedings of the 2018 International Conference on Information Networking, 2018
Proceedings of the 2018 International Conference on Information Networking, 2018
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018
Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018
NRIT: Non-redundant indirect trust search algorithm for a cross-domain based CDNi-P2P architecture.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018
2017
A Secure and Efficient Key Authentication using Bilinear Pairing for NFC Mobile Payment Service.
Wirel. Pers. Commun., 2017
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017
Proceedings of the 2017 International Conference on Information Networking, 2017
2016
Security system architecture for data integrity based on a virtual smart meter overlay in a smart grid system.
Soft Comput., 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Securing information flow in content delivery networks with visual and quantum cryptography.
Proceedings of the 2016 International Conference on Information Networking, 2016
Proceedings of the 2016 International Conference on Information Networking, 2016
2015
Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security.
Intell. Autom. Soft Comput., 2015
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Proceedings of the 2015 International Conference on Information Networking, 2015
Proceedings of the 2015 International Conference on Information Networking, 2015
2014
Comput. Sci. Inf. Syst., 2014
OCPM: Ortho code privacy mechanism in smart grid using ring communication architecture.
Ad Hoc Networks, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Data aggregation using temporal and spatial correlations in Advanced Metering Infrastructure.
Proceedings of the International Conference on Information Networking 2014, 2014
2013
Code updates based on minimal backbone and group key management for secure sensor networks.
Math. Comput. Model., 2013
Secure and Lightweight Key Distribution with ZigBee Pro for Ubiquitous Sensor Networks.
Int. J. Distributed Sens. Networks, 2013
Comput. Sci. Inf. Syst., 2013
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013
Key Establishment and Management for Secure Cellular Machine-to-Machine Communication.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the International Conference on Information Networking 2013, 2013
2012
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012
Proceedings of the 2012 International Conference on Information Networking, 2012
2011
Distributed authentication mechanism for secure channel establishment in ubiquitous medical sensor networks.
Mob. Inf. Syst., 2011
Secure Code Dissemination Using Energy-Efficient Minimal Virtual Backbone in Sensor Networks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
A joint congestion control, routing, and scheduling algorithm in multihop wireless networks with heterogeneous flows.
Proceedings of the 2011 International Conference on Information Networking, 2011
2010
DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System.
Sensors, 2010
Int. J. Inf. Technol. Decis. Mak., 2010
Energy-Efficient Code Dissemination Using Minimal Virtual Backbone in Sensor Networks.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
2009
An efficient data fusion and assurance mechanism using temporal and spatial correlations for home automation networks.
IEEE Trans. Consumer Electron., 2009
Int. J. Comput. Sci. Appl., 2009
Attack Classification Based on Data Mining Technique and Its Application for Reliable Medical Sensor Communication.
Int. J. Comput. Sci. Appl., 2009
2008
An Abnormal Area Scanning for Scalable and Energy-Efficient and Secure SensorNet Management.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008
Proceedings of the 5th International Conference on Mobile Technology, 2008
2007
Integrated Notification Architecture Based on Overlay Against DDoS Attacks on Convergence Network.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2007
An Energy-Efficient Sensor Routing with low latency, scalability in Wireless Sensor Networks.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Proceedings of the Information Security Applications, 7th International Workshop, 2006
Proceedings of the Information Networking, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
Overlapped Detection Via Approximate Entropy Estimation Against Flooding Attack in Mobile Sensor Networks.
Proceedings of the Computational Science, 2006
Pairwise Key Setup and Authentication Utilizing Deployment Information for Secure Sensor Network.
Proceedings of the High Performance Computing and Communications, 2006
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006
2005
IEEE Trans. Consumer Electron., 2005
Proceedings of the Information Networking, 2005
A Scalable Mutual Authentication and Key Distribution Mechanism in a NEMO Environment.
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005
Proceedings of the New Trends in Computer Networks, 2005
2004
Proceedings of the Information Networking, 2004
Detection and Identification Mechanism against Spoofed Traffic Using Distributed Agents.
Proceedings of the Computational Science and Its Applications, 2004
2003
Proceedings of the Information Networking, 2003
Proceedings of the Computational Science and Its Applications, 2003
Proceedings of the Computational Science - ICCS 2003, 2003
Proceedings of the Web Communication Technologies and Internet-Related Social Issues, 2003
2002
Proceedings of the Information Networking, 2002
2001
Differentiated Link Based QoS Routing Algorithms for Multimedia Traffic in MPLS Networks.
Proceedings of the 15th International Conference on Information Networking, 2001
Proceedings of the 15th International Conference on Information Networking, 2001
Proceedings of the Human Society and the Internet, 2001
2000
An Efficient Public-key Based Authentication with Mobile-IP in E-commerce.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000
1999
Predictive and Adaptive Bandwidth Reservation Strategies in Wireless Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999
1990
Proceedings of the 15th Conference on Local Computer Networks, 1990