Kyung Hyune Rhee
Orcid: 0000-0003-0466-8254
According to our database1,
Kyung Hyune Rhee
authored at least 120 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Privacy-Preserving Decentralized Biometric Identity Verification in Car-Sharing System.
J. Multim. Inf. Syst., 2024
2023
A Blockchain-Based Auditable Semi-Asynchronous Federated Learning for Heterogeneous Clients.
IEEE Access, 2023
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023
2022
Proceedings of the Information Security Applications - 23rd International Conference, 2022
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022
2021
A Novel User Collusion-Resistant Decentralized Multi-Authority Attribute-Based Encryption Scheme Using the Deposit on a Blockchain.
Wirel. Commun. Mob. Comput., 2021
Decentralized Trusted Data Sharing Management on Internet of Vehicle Edge Computing (IoVEC) Networks Using Consortium Blockchain.
Sensors, 2021
Blockchain-Enabled 5G Edge Networks and Beyond: An Intelligent Cross-Silo Federated Learning Approach.
Secur. Commun. Networks, 2021
J. Multim. Inf. Syst., 2021
J. Internet Serv. Inf. Secur., 2021
Enhancing data privacy through a decentralised predictive model with blockchain-based revenue.
Int. J. Ad Hoc Ubiquitous Comput., 2021
PDPM: A Patient-Defined Data Privacy Management with Nudge Theory in Decentralized E-Health Environments.
IEICE Trans. Inf. Syst., 2021
Unlinkable Collaborative Learning Transactions: Privacy-Awareness in Decentralized Approaches.
IEEE Access, 2021
2020
Secur. Commun. Networks, 2020
J. Inf. Process. Syst., 2020
Proceedings of the IEEE International Conference on Blockchain, 2020
Implicit Authentication in Neural Key Exchange Based on the Randomization of the Public Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2020
2019
Wirel. Commun. Mob. Comput., 2019
Wirel. Commun. Mob. Comput., 2019
Neural Comput. Appl., 2019
Tree-based classifier ensembles for early detection method of diabetes: an exploratory study.
Artif. Intell. Rev., 2019
TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System.
IEEE Access, 2019
2018
Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing.
J. Supercomput., 2018
Self-Controllable Secure Location Sharing for Trajectory-Based Message Delivery on Cloud-Assisted VANETs.
Sensors, 2018
A Secure Incentive Scheme for Vehicular Delay Tolerant Networks Using Cryptocurrency.
Secur. Commun. Networks, 2018
A Comparative Study of Phishing Websites Classification Based on Classifier Ensembles.
J. Multim. Inf. Syst., 2018
In-depth analysis of neural network ensembles for early detection method of diabetes disease.
Int. J. Medical Eng. Informatics, 2018
A comparative study of classifier ensembles for detecting inactive learner in university.
Int. J. Data Anal. Tech. Strateg., 2018
Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage.
IEEE Access, 2018
Preliminary of Selfish Mining Strategy on the Decentralized Model of Personal Health Information.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018
2017
A Detailed Analysis of Classifier Ensembles for Intrusion Detection in Wireless Network.
J. Inf. Process. Syst., 2017
Int. J. Internet Protoc. Technol., 2017
HFSTE: Hybrid Feature Selections and Tree-Based Classifiers Ensemble for Intrusion Detection System.
IEICE Trans. Inf. Syst., 2017
An extensive empirical evaluation of classifier ensembles for intrusion detection task.
Comput. Syst. Sci. Eng., 2017
A Novel Anomaly Detection Method in Wireless Network Using Multi-level Classifier Ensembles.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017
Proceedings of the 26th IEEE International Symposium on Industrial Electronics, 2017
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
Proceedings of the 12th Asia Joint Conference on Information Security, 2017
2016
R-to-R Extraction and Preprocessing Procedure for an Automated Diagnosis of Various Diseases from ECG Data.
J. Multim. Inf. Syst., 2016
Enhancing Accuracy Performance of Fuzzy Vault Non-Random Chaff Point Generator for Mobile Payment Authentication.
J. Multim. Inf. Syst., 2016
Pseudonymous authentication for secure V2I services in cloud-based vehicular networks.
J. Ambient Intell. Humaniz. Comput., 2016
Int. J. Comput. Math., 2016
A secure billing protocol over attribute-based encryption in vehicular cloud computing.
EURASIP J. Wirel. Commun. Netw., 2016
Data preparation step for automated diagnosis based on HRV analysis and machine learning.
Proceedings of the 6th International Conference on System Engineering and Technology, 2016
Security analysis testing for secure instant messaging in Android with study case: Telegram.
Proceedings of the 6th International Conference on System Engineering and Technology, 2016
Proceedings of the 6th International Conference on System Engineering and Technology, 2016
Classifier Ensemble Design with Rotation Forest to Enhance Attack Detection of IDS in Wireless Network.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
2015
A Fine-Grained Privacy Preserving Protocol over Attribute Based Access Control for VANETs.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
A Combination of PSO-Based Feature Selection and Tree-Based Classifiers Ensemble for Intrusion Detection Systems.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015
2014
J. Internet Serv. Inf. Secur., 2014
EURASIP J. Inf. Secur., 2014
The efficient implementation of distributed indexing with Hadoop for digital investigations on Big Data.
Comput. Sci. Inf. Syst., 2014
2013
J. Univers. Comput. Sci., 2013
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
Comput. Sci. Inf. Syst., 2013
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013
2012
A Study on Design and Implementation of E-Discovery Service based on Cloud Computing.
J. Internet Serv. Inf. Secur., 2012
Proceedings of the Advances in Multimedia Information Processing - PCM 2012, 2012
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
2011
A Privacy-Preserving Location Assurance Protocol for Location-Aware Services in VANETs.
Wirel. Pers. Commun., 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011
2010
J. Inf. Sci. Eng., 2010
Proceedings of the Advances in Multimedia Modeling, 2010
Proceedings of the Communications and Multimedia Security, 2010
2009
J. Commun. Networks, 2009
IEICE Trans. Inf. Syst., 2009
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009
Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET.
Proceedings of the Mobile Lightweight Wireless Systems, 2009
Proceedings of the Advances in Multimedia Modeling, 2009
2008
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008
2007
Proceedings of the Frontiers in Algorithmics, First Annual International Workshop, 2007
Multi-receiver Certificate-Based Encryption and Application to Public Key Broadcast Encryption.
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007
A New DRM System Based on Graded Contents Sharing and Time-Block Distribution for Home Networks.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
2006
A New Efficient Protocol for Authentication and Certificate Status Management in Personal Area Networks.
Proceedings of the Computer and Information Sciences, 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
Proceedings of the Distributed Computing and Internet Technology, 2006
Proceedings of the High Performance Computing and Communications, 2006
Proceedings of the Public Key Infrastructure, 2006
An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks.
Proceedings of the Management of Convergence Networks and Services, 2006
Proceedings of the Agents and Peer-to-Peer Computing - 5th International Workshop, 2006
2005
J. Inf. Sci. Eng., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
A Fair and Reliable P2P E-Commerce Model Based on Collaboration with Distributed Peers.
Proceedings of the Distributed Computing, 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the Networking, 2005
Proceedings of the Digital Rights Management: Technologies, 2005
2004
J. Commun. Networks, 2004
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004
2003
Proceedings of the Distributed Computing, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
2002
Proceedings of the Progress in Cryptology, 2002
2001
J. Inf. Sci. Eng., 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
Proceedings of the Public Key Cryptography, 2000
1999
Proceedings of the Public Key Cryptography, 1999
Proceedings of the Information Security, Second International Workshop, 1999
1998
Proceedings of the Public Key Cryptography, 1998
A secure hash function based on cellular automata.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998