Seong Oun Hwang

Orcid: 0000-0003-4240-6255

According to our database1, Seong Oun Hwang authored at least 117 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Efficient TMVP-Based Polynomial Convolution on GPU for Post-Quantum Cryptography Targeting IoT Applications.
IEEE Internet Things J., July, 2024

Differential Privacy and k-Anonymity-Based Privacy Preserving Data Publishing Scheme With Minimal Loss of Statistical Information.
IEEE Trans. Comput. Soc. Syst., June, 2024

Healthcare Applications Using Blockchain With a Cloud-Assisted Decentralized Privacy-Preserving Framework.
IEEE Trans. Mob. Comput., May, 2024

High Throughput Lattice-Based Signatures on GPUs: Comparing Falcon and Mitaka.
IEEE Trans. Parallel Distributed Syst., April, 2024

Making Large Language Models More Reliable and Beneficial: Taking ChatGPT as a Case Study.
Computer, March, 2024

Feature Stores: A Key Enabler for Feature Reusability and Availability Across Machine Learning Pipelines.
Computer, January, 2024

Privacy Preserving Based on Seamless Authentication With Provable Key Verification Using mIoMT for B5G-Enabled Healthcare Systems.
IEEE Trans. Serv. Comput., 2024

Towards Optimization of Privacy-Utility Trade-Off Using Similarity and Diversity Based Clustering.
IEEE Trans. Emerg. Top. Comput., 2024

cuFE: High Performance Privacy Preserving Support Vector Machine With Inner-Product Functional Encryption.
IEEE Trans. Emerg. Top. Comput., 2024

cuTraNTT: A Novel Transposed Number Theoretic Transform Targeting Low Latency Homomorphic Encryption for IoT Applications.
IACR Cryptol. ePrint Arch., 2024

Constructing Highly Nonlinear Cryptographic Balanced Boolean Functions on Learning Capabilities of Recurrent Neural Networks.
IEEE Access, 2024

Early Diagnosis of Alzheimer's Disease Using 18F-FDG PET With Soften Latent Representation.
IEEE Access, 2024

A Multifaceted Survey on Federated Learning: Fundamentals, Paradigm Shifts, Practical Issues, Recent Developments, Partnerships, Trade-Offs, Trustworthiness, and Ways Forward.
IEEE Access, 2024

Billiard Quantum Chaos: A Pioneering Image Encryption Scheme in the Post-Quantum Era.
IEEE Access, 2024

2023
A Cloud-Assisted Medical Cyber-Physical System Using a Privacy-Preserving Key Agreement Framework and a Chebyshev Chaotic Map.
IEEE Syst. J., December, 2023

A Human Activity Recognition Method Based on Lightweight Feature Extraction Combined With Pruned and Quantized CNN for Wearable Device.
IEEE Trans. Consumer Electron., August, 2023

Data-Centric Artificial Intelligence, Preprocessing, and the Quest for Transformative Artificial Intelligence Systems Development.
Computer, May, 2023

Intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era.
Comput. Networks, April, 2023

Area-Optimized Constant-Time Hardware Implementation for Polynomial Multiplication.
IEEE Embed. Syst. Lett., March, 2023

Technical Analysis of Data-Centric and Model-Centric Artificial Intelligence.
IT Prof., 2023

The Changing Landscape of Privacy- Countermeasures in the Era of the COVID-19 Pandemic.
IT Prof., 2023

Area-Time Efficient Implementation of NIST Lightweight Hash Functions Targeting IoT Applications.
IEEE Internet Things J., 2023

High Throughput Acceleration of Scabbard Key Exchange and Key Encapsulation Mechanism Using Tensor Core on GPU for IoT Applications.
IEEE Internet Things J., 2023

Rectification of Syntactic and Semantic Privacy Mechanisms.
IEEE Secur. Priv., 2023

TMVP-based Polynomial Convolution for Saber and Sable on GPU using CUDA-cores and Tensor-cores.
IACR Cryptol. ePrint Arch., 2023

CTGAN-MOS: Conditional Generative Adversarial Network Based Minority-Class-Augmented Oversampling Scheme for Imbalanced Problems.
IEEE Access, 2023

When AI Meets Information Privacy: The Adversarial Role of AI in Data Sharing Scenario.
IEEE Access, 2023

Quantifying the Vulnerability of Attributes for Effective Privacy Preservation Using Machine Learning.
IEEE Access, 2023

Non-Zero Grid for Accurate 2-Bit Additive Power-of-Two CNN Quantization.
IEEE Access, 2023

GPU-Accelerated Deep Learning-Based Correlation Attack on Tor Networks.
IEEE Access, 2023

Efficient, Error-Resistant NTT Architectures for CRYSTALS-Kyber FPGA Accelerators.
Proceedings of the 31st IFIP/IEEE International Conference on Very Large Scale Integration, 2023

Efficient Implementation of ACORN and AEGIS-128 Authenticated Encryption on GPU for Internet of Things.
Proceedings of the 23rd IEEE International Conference on Communication Technology, 2023

2022
High Throughput Implementation of Post-Quantum Key Encapsulation and Decapsulation on GPU for Internet of Things Applications.
IEEE Trans. Serv. Comput., 2022

Low Latency Implementations of CNN for Resource-Constrained IoT Devices.
IEEE Trans. Circuits Syst. II Express Briefs, 2022

Efficient Implementation of AES-CTR and AES-ECB on GPUs With Applications for High-Speed FrodoKEM and Exhaustive Key Search.
IEEE Trans. Circuits Syst. II Express Briefs, 2022

DPCrypto: Acceleration of Post-Quantum Cryptography Using Dot-Product Instructions on GPUs.
IEEE Trans. Circuits Syst. I Regul. Pap., 2022

Data-Driven Analytics Leveraging Artificial Intelligence in the Era of COVID-19: An Insightful Review of Recent Developments.
Symmetry, 2022

Network Meddling Detection Using Machine Learning Empowered with Blockchain Technology.
Sensors, 2022

IoMT-Based Osteosarcoma Cancer Detection in Histopathology Images Using Transfer Learning Empowered with Blockchain, Fog Computing, and Edge Computing.
Sensors, 2022

Blockchain-Based Smart Home Networks Security Empowered with Fused Machine Learning.
Sensors, 2022

A Practical Anonymization Approach for Imbalanced Datasets.
IT Prof., 2022

High Performance Integer Multiplier on FPGA with Radix-4 Number Theoretic Transform.
KSII Trans. Internet Inf. Syst., 2022

RISC32-LP: Low-Power FPGA-Based IoT Sensor Nodes With Energy Reduction Program Analyzer.
IEEE Internet Things J., 2022

A Privacy-Assured Data Lifecycle for Epidemic-Handling Systems.
Computer, 2022

cuGimli: optimized implementation of the Gimli authenticated encryption and hash function on GPU for IoT applications.
Clust. Comput., 2022

AEchain: A Lightweight Blockchain for IoT Applications.
IEEE Consumer Electron. Mag., 2022

Applications and Challenges of Federated Learning Paradigm in the Big Data Era with Special Emphasis on COVID-19.
Big Data Cogn. Comput., 2022

Discrete Logarithmic Factorial Problem and Einstein Crystal Model Based Public-Key Cryptosystem for Digital Content Confidentiality.
IEEE Access, 2022

Toward Privacy Preservation Using Clustering Based Anonymization: Recent Advances and Future Research Outlook.
IEEE Access, 2022

TensorCrypto: High Throughput Acceleration of Lattice-Based Cryptography Using Tensor Core on GPU.
IEEE Access, 2022

Efficient Implementation of Lightweight Hash Functions on GPU and Quantum Computers for IoT Applications.
IEEE Access, 2022

A Systematic Survey on the Recent Advancements in the Social Internet of Things.
IEEE Access, 2022

Smartphone Based Human Activity Recognition Using 1D Lightweight Convolutional Neural Network.
Proceedings of the International Conference on Electronics, Information, and Communication, 2022

2021
Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA.
J. Supercomput., 2021

CAPTCHA-Based Secret-Key Sharing Using Quantum Communication.
IT Prof., 2021

Scalable and Efficient Hardware Architectures for Authenticated Encryption in IoT Applications.
IEEE Internet Things J., 2021

Novel Postquantum MQ-Based Signature Scheme for Internet of Things With Parallel Implementation.
IEEE Internet Things J., 2021

TensorCrypto.
IACR Cryptol. ePrint Arch., 2021

DPCrypto: Acceleration of Post-quantum Cryptographic Algorithms using Dot-Product Instruction on GPUs.
IACR Cryptol. ePrint Arch., 2021

DoubleQExt: Hardware and Memory Efficient CNN Through Two Levels of Quantization.
IEEE Access, 2021

TIMPANY - deTectIon of Model Poisoning Attacks usiNg accuracY.
IEEE Access, 2021

A Comprehensive Analysis of Privacy Protection Techniques Developed for COVID-19 Pandemic.
IEEE Access, 2021

A Flexible Gimli Hardware Implementation in FPGA and Its Application to RFID Authentication Protocols.
IEEE Access, 2021

2020
Spectral Efficiency Augmentation in Uplink Massive MIMO Systems by Increasing Transmit Power and Uniform Linear Array Gain.
Sensors, 2020

An efficient public key functional encryption for inner product evaluations.
Neural Comput. Appl., 2020

A neural network approach to remove rain using reconstruction and feature losses.
Neural Comput. Appl., 2020

Special issue on "Green and Human Information Technology 2019".
Neural Comput. Appl., 2020

A PKI without TTP based on conditional trust in blockchain.
Neural Comput. Appl., 2020

Energy Efficient Cross Layer Time Synchronization in Cognitive Radio Networks.
CoRR, 2020

Implementation of Symbol Timing Recovery for Estimation of Clock Skew.
CoRR, 2020

PhishHaven - An Efficient Real-Time AI Phishing URLs Detection System.
IEEE Access, 2020

A Framework for Privacy Preserving, Distributed Search Engine Using Topology of DLT and Onion Routing.
IEEE Access, 2020

Efficient healthcare service based on Stacking Ensemble.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

Efficient Anonymous Multi-group Broadcast Encryption.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things.
IEEE Internet Things J., 2019

Blockchain-Based Resource Syndicate.
Computer, 2019

RAPEL: Robust and Adaptive method for PIT Entry Lifetime in Wireless Content-Centric Networks.
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019

2018
Study of long short-term memory in flow-based network intrusion detection system.
J. Intell. Fuzzy Syst., 2018

An efficient neural network model for time series forecasting of malware.
J. Intell. Fuzzy Syst., 2018

Load balancing in decentralized smart grid trade system using blockchain.
J. Intell. Fuzzy Syst., 2018

Efficient certificate-based encryption and hierarchical certificate-based encryption schemes in the standard model.
J. Intell. Fuzzy Syst., 2018

A study on pervasive systems to prevent forward head posture syndrome.
J. Intell. Fuzzy Syst., 2018

Preface.
J. Intell. Fuzzy Syst., 2018

Detection of malicious URLs based on word vector representation and ngram.
J. Intell. Fuzzy Syst., 2018

An efficient classification of malware behavior using deep neural network.
J. Intell. Fuzzy Syst., 2018

Evaluation of black-marker and bilateral classification with J48 decision tree in anomaly based intrusion detection system.
J. Intell. Fuzzy Syst., 2018

An efficient detection of TCP Syn flood attacks with spoofed IP addresses.
J. Intell. Fuzzy Syst., 2018

Pedestrian Dead Reckoning with correction points for indoor positioning and Wi-Fi fingerprint mapping.
J. Intell. Fuzzy Syst., 2018

Connectivity analysis of underground sensors in wireless underground sensor networks.
Ad Hoc Networks, 2018

2017
A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices.
Neural Comput. Appl., 2017

An Improved Image Encryption Scheme Based on a Non-Linear Chaotic Algorithm and Substitution Boxes.
Informatica, 2017

A new technique for designing 8 × 8 substitution box for image encryption applications.
Proceedings of the 2017 9th Computer Science and Electronic Engineering Conference, 2017

2016
An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs.
IEEE Trans. Computers, 2016

Efficient certificate-based encryption schemes without pairing.
Secur. Commun. Networks, 2016

A secure image encryption scheme based on chaotic maps and affine transformation.
Multim. Tools Appl., 2016

2015
An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes.
Wirel. Pers. Commun., 2015

Privacy preserving revocable predicate encryption revisited.
Secur. Commun. Networks, 2015

2014
Efficient identity-based broadcast signcryption schemes.
Secur. Commun. Networks, 2014

2013
Robot Exploration in a Dynamic Environment Using Hexagonal Grid Coverage.
IEICE Trans. Inf. Syst., 2013

An Optimal Identity-Based Broadcast Encryption Scheme for Wireless Sensor Networks.
IEICE Trans. Commun., 2013

Removing escrow from ciphertext policy attribute-based encryption.
Comput. Math. Appl., 2013

2012
Fine-grained user access control in ciphertext-policy attribute-based encryption.
Secur. Commun. Networks, 2012

Authenticated public key broadcast encryption scheme secure against insiders' attack.
Math. Comput. Model., 2012

Privacy-preserving identity-based broadcast encryption.
Inf. Fusion, 2012

An Efficient Anonymous Identity-Based Broadcast Encryption for Large-Scale Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2012

Finding Vulnerabilities in Binary Codes Using Tainting/Fuzzing Analysis.
Proceedings of the Convergence and Hybrid Information Technology, 2012

2011
Improved Security Proofs of Delerablée's Identity-Based Broadcast Encryption Scheme.
Proceedings of the Convergence and Hybrid Information Technology, 2011

Implementation of Bilinear Pairings over Elliptic Curves with Embedding Degree 24.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

2010
An efficient identity-based proxy signcryption for secure broadcast.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

2009
Correction to "Content and Service Protection for IPTV".
IEEE Trans. Broadcast., 2009

Content and Service Protection for IPTV.
IEEE Trans. Broadcast., 2009

How Viable Is Digital Rights Management?.
Computer, 2009

2005
A Modeling of Multilevel DRM.
IEICE Trans. Commun., 2005

2004
Modeling and implementation of digital rights.
J. Syst. Softw., 2004

Privacy Protection in Ubiquitous Computing Based on Privacy Label and Information Flow.
Proceedings of the Computational Science and Its Applications, 2004

2000
A Design of the Hybrid Messaging System (HMS) Based on PKI.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000

1999
An Electronic Cash for Smart Cards.
Proceedings of the 17th IASTED International Conference on Applied Informatics, 1999


  Loading...