2025
- ARS-FL: 악의적인 사용자의 감시가 가능한 익명화된 연합학습2025 한국컴퓨터종합학술대회 논문집, 2025pp. 2443–2445
- Python에서 Go로의 언어 전환을 통한 Accountable Ring Signature 구현 성능 향상ASK 2025 학술발표대회 논문집, 2025Vol. 32 (No. 1) , pp. 182–183
- Anomaly Detection for Multi-tenant Networks Based on AutoEncoderNew Frontiers in Artificial Intelligence, 2025pp. 368–382
- PhiShield: An AI-Based Personalized Anti-Spam Solution with Third-Party IntegrationElectronics, 2025Vol. 14 (No. 8)
- Enhancing Gender Prediction Model Performance through Automatic Individual Entity Extraction and Class Balance2025 IEEE International Conference on Big Data and Smart Computing (BigComp), 2025pp. 120–121
2024
- A Secure Key Management for TLS SubversionAICompS, 2024pp. 43–47
- Gender Bias Mitigation in Gender Prediction Using Zero-shot ClassificationAnnual Conference of KIPS, 2024pp. 509–512
2023
2022
- Verifiable Outsourced Decryption of Encrypted Data From Heterogeneous Trust NetworksIEEE Internet of Things Journal, 2022Vol. 9 (No. 22) , pp. 22559-22570
- Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based EncryptionIEEE Transactions on Dependable and Secure Computing, 2022Vol. 19 (No. 3) , pp. 1856-1870
- Efficient IoT Management With Resilience to Unauthorized Access to Cloud StorageIEEE Transactions on Cloud Computing, 2022Vol. 10 (No. 2) , pp. 1008-1020
2021
- P2DPI: Practical and Privacy-Preserving Deep Packet InspectionProceedings of the 2021 ACM Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, 2021pp. 135–146
- SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT EnvironmentsComputer Security – ESORICS 2021, 2021pp. 106–126
- Utilizing QR codes to verify the visual fidelity of image datasets for machine learningJournal of Network and Computer Applications, 2021Vol. 173 , pp. 102834
2020
- Inspecting TLS Anytime Anywhere: A New Approach to TLS InterceptionProceedings of the 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, 2020pp. 116–126
- Efficient Anonymous Multi-group Broadcast EncryptionApplied Cryptography and Network Security, 2020pp. 251–270
-
- Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle ProofInformation Security Applications, 2020pp. 206–216
-
2019
- Generic Construction of Fair Exchange Scheme with Semi-Trusted AdjudicatorJ. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019Vol. 10 (No. 4) , pp. 68–87
- Protecting the Visual Fidelity of Machine Learning Datasets Using QR CodesMachine Learning for Cyber Security: Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings, 2019Vol. 11806 , pp. 320
- Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge ComputingProceedings of the 2019 ACM Asia Conference on Computer and Communications Security, Auckland, New Zealand, 2019pp. 55–66
- Subversion in Practice: How to Efficiently Undermine SignaturesIEEE Access, 2019Vol. 7 , pp. 68799–68811
- Chapter 5 - Crowdsensing and Privacy in Smart City ApplicationsSmart Cities Cybersecurity and Privacy, 2019pp. 57–73
- Protecting the Visual Fidelity of Machine Learning Datasets Using QR CodesMachine Learning for Cyber Security, 2019pp. 320–335
- Puncturable Proxy Re-Encryption Supporting to Group Messaging ServiceComputer Security – ESORICS 2019, 2019pp. 215–233
- Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular ApproachInformation Security and Privacy, 2019pp. 3–20
- A New Encoding Framework for Predicate Encryption with Non-linear Structures in Prime Order GroupsApplied Cryptography and Network Security, 2019pp. 406–425
2018
-
- Functional encryption for computational hiding in prime order groups via pair encodingsDesigns, Codes and Cryptography, 2018Vol. 86 (No. 1) , pp. 97–120
2017
- An Efficient KP-ABE with Short Ciphertexts in Prime Order Groups under Standard AssumptionProceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017pp. 823–834
- Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication2017