Seong Oun Hwang
Orcid: 0000-0003-4240-6255
According to our database1,
Seong Oun Hwang
authored at least 117 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Efficient TMVP-Based Polynomial Convolution on GPU for Post-Quantum Cryptography Targeting IoT Applications.
IEEE Internet Things J., July, 2024
Differential Privacy and k-Anonymity-Based Privacy Preserving Data Publishing Scheme With Minimal Loss of Statistical Information.
IEEE Trans. Comput. Soc. Syst., June, 2024
Healthcare Applications Using Blockchain With a Cloud-Assisted Decentralized Privacy-Preserving Framework.
IEEE Trans. Mob. Comput., May, 2024
IEEE Trans. Parallel Distributed Syst., April, 2024
Making Large Language Models More Reliable and Beneficial: Taking ChatGPT as a Case Study.
Computer, March, 2024
Feature Stores: A Key Enabler for Feature Reusability and Availability Across Machine Learning Pipelines.
Computer, January, 2024
Privacy Preserving Based on Seamless Authentication With Provable Key Verification Using mIoMT for B5G-Enabled Healthcare Systems.
IEEE Trans. Serv. Comput., 2024
Towards Optimization of Privacy-Utility Trade-Off Using Similarity and Diversity Based Clustering.
IEEE Trans. Emerg. Top. Comput., 2024
cuFE: High Performance Privacy Preserving Support Vector Machine With Inner-Product Functional Encryption.
IEEE Trans. Emerg. Top. Comput., 2024
cuTraNTT: A Novel Transposed Number Theoretic Transform Targeting Low Latency Homomorphic Encryption for IoT Applications.
IACR Cryptol. ePrint Arch., 2024
Constructing Highly Nonlinear Cryptographic Balanced Boolean Functions on Learning Capabilities of Recurrent Neural Networks.
IEEE Access, 2024
Early Diagnosis of Alzheimer's Disease Using 18F-FDG PET With Soften Latent Representation.
IEEE Access, 2024
A Multifaceted Survey on Federated Learning: Fundamentals, Paradigm Shifts, Practical Issues, Recent Developments, Partnerships, Trade-Offs, Trustworthiness, and Ways Forward.
IEEE Access, 2024
Billiard Quantum Chaos: A Pioneering Image Encryption Scheme in the Post-Quantum Era.
IEEE Access, 2024
2023
A Cloud-Assisted Medical Cyber-Physical System Using a Privacy-Preserving Key Agreement Framework and a Chebyshev Chaotic Map.
IEEE Syst. J., December, 2023
A Human Activity Recognition Method Based on Lightweight Feature Extraction Combined With Pruned and Quantized CNN for Wearable Device.
IEEE Trans. Consumer Electron., August, 2023
Data-Centric Artificial Intelligence, Preprocessing, and the Quest for Transformative Artificial Intelligence Systems Development.
Computer, May, 2023
Intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era.
Comput. Networks, April, 2023
IEEE Embed. Syst. Lett., March, 2023
IT Prof., 2023
The Changing Landscape of Privacy- Countermeasures in the Era of the COVID-19 Pandemic.
IT Prof., 2023
Area-Time Efficient Implementation of NIST Lightweight Hash Functions Targeting IoT Applications.
IEEE Internet Things J., 2023
High Throughput Acceleration of Scabbard Key Exchange and Key Encapsulation Mechanism Using Tensor Core on GPU for IoT Applications.
IEEE Internet Things J., 2023
TMVP-based Polynomial Convolution for Saber and Sable on GPU using CUDA-cores and Tensor-cores.
IACR Cryptol. ePrint Arch., 2023
CTGAN-MOS: Conditional Generative Adversarial Network Based Minority-Class-Augmented Oversampling Scheme for Imbalanced Problems.
IEEE Access, 2023
When AI Meets Information Privacy: The Adversarial Role of AI in Data Sharing Scenario.
IEEE Access, 2023
Quantifying the Vulnerability of Attributes for Effective Privacy Preservation Using Machine Learning.
IEEE Access, 2023
IEEE Access, 2023
IEEE Access, 2023
Proceedings of the 31st IFIP/IEEE International Conference on Very Large Scale Integration, 2023
Efficient Implementation of ACORN and AEGIS-128 Authenticated Encryption on GPU for Internet of Things.
Proceedings of the 23rd IEEE International Conference on Communication Technology, 2023
2022
High Throughput Implementation of Post-Quantum Key Encapsulation and Decapsulation on GPU for Internet of Things Applications.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Circuits Syst. II Express Briefs, 2022
Efficient Implementation of AES-CTR and AES-ECB on GPUs With Applications for High-Speed FrodoKEM and Exhaustive Key Search.
IEEE Trans. Circuits Syst. II Express Briefs, 2022
DPCrypto: Acceleration of Post-Quantum Cryptography Using Dot-Product Instructions on GPUs.
IEEE Trans. Circuits Syst. I Regul. Pap., 2022
Data-Driven Analytics Leveraging Artificial Intelligence in the Era of COVID-19: An Insightful Review of Recent Developments.
Symmetry, 2022
Network Meddling Detection Using Machine Learning Empowered with Blockchain Technology.
Sensors, 2022
IoMT-Based Osteosarcoma Cancer Detection in Histopathology Images Using Transfer Learning Empowered with Blockchain, Fog Computing, and Edge Computing.
Sensors, 2022
Sensors, 2022
KSII Trans. Internet Inf. Syst., 2022
RISC32-LP: Low-Power FPGA-Based IoT Sensor Nodes With Energy Reduction Program Analyzer.
IEEE Internet Things J., 2022
cuGimli: optimized implementation of the Gimli authenticated encryption and hash function on GPU for IoT applications.
Clust. Comput., 2022
IEEE Consumer Electron. Mag., 2022
Applications and Challenges of Federated Learning Paradigm in the Big Data Era with Special Emphasis on COVID-19.
Big Data Cogn. Comput., 2022
Discrete Logarithmic Factorial Problem and Einstein Crystal Model Based Public-Key Cryptosystem for Digital Content Confidentiality.
IEEE Access, 2022
Toward Privacy Preservation Using Clustering Based Anonymization: Recent Advances and Future Research Outlook.
IEEE Access, 2022
TensorCrypto: High Throughput Acceleration of Lattice-Based Cryptography Using Tensor Core on GPU.
IEEE Access, 2022
Efficient Implementation of Lightweight Hash Functions on GPU and Quantum Computers for IoT Applications.
IEEE Access, 2022
IEEE Access, 2022
Smartphone Based Human Activity Recognition Using 1D Lightweight Convolutional Neural Network.
Proceedings of the International Conference on Electronics, Information, and Communication, 2022
2021
Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA.
J. Supercomput., 2021
Scalable and Efficient Hardware Architectures for Authenticated Encryption in IoT Applications.
IEEE Internet Things J., 2021
Novel Postquantum MQ-Based Signature Scheme for Internet of Things With Parallel Implementation.
IEEE Internet Things J., 2021
DPCrypto: Acceleration of Post-quantum Cryptographic Algorithms using Dot-Product Instruction on GPUs.
IACR Cryptol. ePrint Arch., 2021
IEEE Access, 2021
A Comprehensive Analysis of Privacy Protection Techniques Developed for COVID-19 Pandemic.
IEEE Access, 2021
A Flexible Gimli Hardware Implementation in FPGA and Its Application to RFID Authentication Protocols.
IEEE Access, 2021
2020
Spectral Efficiency Augmentation in Uplink Massive MIMO Systems by Increasing Transmit Power and Uniform Linear Array Gain.
Sensors, 2020
Neural Comput. Appl., 2020
Neural Comput. Appl., 2020
Neural Comput. Appl., 2020
Neural Comput. Appl., 2020
CoRR, 2020
IEEE Access, 2020
A Framework for Privacy Preserving, Distributed Search Engine Using Topology of DLT and Onion Routing.
IEEE Access, 2020
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things.
IEEE Internet Things J., 2019
RAPEL: Robust and Adaptive method for PIT Entry Lifetime in Wireless Content-Centric Networks.
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019
2018
J. Intell. Fuzzy Syst., 2018
J. Intell. Fuzzy Syst., 2018
J. Intell. Fuzzy Syst., 2018
Efficient certificate-based encryption and hierarchical certificate-based encryption schemes in the standard model.
J. Intell. Fuzzy Syst., 2018
J. Intell. Fuzzy Syst., 2018
J. Intell. Fuzzy Syst., 2018
J. Intell. Fuzzy Syst., 2018
Evaluation of black-marker and bilateral classification with J48 decision tree in anomaly based intrusion detection system.
J. Intell. Fuzzy Syst., 2018
J. Intell. Fuzzy Syst., 2018
Pedestrian Dead Reckoning with correction points for indoor positioning and Wi-Fi fingerprint mapping.
J. Intell. Fuzzy Syst., 2018
Connectivity analysis of underground sensors in wireless underground sensor networks.
Ad Hoc Networks, 2018
2017
A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices.
Neural Comput. Appl., 2017
An Improved Image Encryption Scheme Based on a Non-Linear Chaotic Algorithm and Substitution Boxes.
Informatica, 2017
A new technique for designing 8 × 8 substitution box for image encryption applications.
Proceedings of the 2017 9th Computer Science and Electronic Engineering Conference, 2017
2016
An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs.
IEEE Trans. Computers, 2016
Secur. Commun. Networks, 2016
Multim. Tools Appl., 2016
2015
Wirel. Pers. Commun., 2015
Secur. Commun. Networks, 2015
2014
Secur. Commun. Networks, 2014
2013
IEICE Trans. Inf. Syst., 2013
IEICE Trans. Commun., 2013
Comput. Math. Appl., 2013
2012
Secur. Commun. Networks, 2012
Authenticated public key broadcast encryption scheme secure against insiders' attack.
Math. Comput. Model., 2012
An Efficient Anonymous Identity-Based Broadcast Encryption for Large-Scale Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2012
Proceedings of the Convergence and Hybrid Information Technology, 2012
2011
Proceedings of the Convergence and Hybrid Information Technology, 2011
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011
2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
2009
IEEE Trans. Broadcast., 2009
2005
2004
Privacy Protection in Ubiquitous Computing Based on Privacy Label and Information Flow.
Proceedings of the Computational Science and Its Applications, 2004
2000
A Design of the Hybrid Messaging System (HMS) Based on PKI.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000
1999
An Electronic Cash for Smart Cards.
Proceedings of the 17th IASTED International Conference on Applied Informatics, 1999