2025

  1. ARS-FL: 악의적인 사용자의 감시가 가능한 익명화된 연합학습
    김규림 ,  김연희 , and  김종길
    2025 한국컴퓨터종합학술대회 논문집, 2025
    pp. 2443–2445
  2. Python에서 Go로의 언어 전환을 통한 Accountable Ring Signature 구현 성능 향상
    박지은 ,  문현솔 ,  김연희 , and  김종길
    ASK 2025 학술발표대회 논문집, 2025
    Vol. 32 (No. 1) , pp. 182–183
  3. Anomaly Detection for Multi-tenant Networks Based on AutoEncoder
    Yeonhee Kim , Jeeeun Park , and  Jongkil Kim
    New Frontiers in Artificial Intelligence, 2025
    pp. 368–382
  4. PhiShield: An AI-Based Personalized Anti-Spam Solution with Third-Party Integration
    Hyunsol Mun , Jeeeun Park , Yeonhee Kim , Boeun Kim , and  Jongkil Kim
    Electronics, 2025
    Vol. 14 (No. 8)
  5. Enhancing Gender Prediction Model Performance through Automatic Individual Entity Extraction and Class Balance
    Chaeyun Kim , Eunseo Kim , Yeonhee Kim , Jaehyeong Sim , and  Jongkil Kim
    2025 IEEE International Conference on Big Data and Smart Computing (BigComp), 2025
    pp. 120–121

2024

  1. A Secure Key Management for TLS Subversion
    Boeun Kim , Yeonhee Kim , and  Jongkil Kim
    AICompS, 2024
    pp. 43–47
  2. Gender Bias Mitigation in Gender Prediction Using Zero-shot Classification
    Yeonhee Kim , Byoungju Choi , and  Jongkil Kim
    Annual Conference of KIPS, 2024
    pp. 509–512

2023

  1. TLS Goes Low Cost: When TLS Meets Edge
    Intae Kim , Willy Susilo , Joonsang Baek ,  Jongkil Kim , and Yang-Wai Chow
    Information Security Applications, 2023
    pp. 102–113
  2. Backward Compatible Identity-Based Encryption
    Jongkil Kim
    Sensors, 2023
    Vol. 23 (No. 9)

2022

  1. Verifiable Outsourced Decryption of Encrypted Data From Heterogeneous Trust Networks
    Changhee Hahn , and  Jongkil Kim
    IEEE Internet of Things Journal, 2022
    Vol. 9 (No. 22) , pp. 22559-22570
  2. Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption
    Intae Kim , Willy Susilo , Joonsang Baek , and  Jongkil Kim
    IEEE Transactions on Dependable and Secure Computing, 2022
    Vol. 19 (No. 3) , pp. 1856-1870
  3. Efficient IoT Management With Resilience to Unauthorized Access to Cloud Storage
    Changhee Hahn ,  Jongkil Kim , Hyunsoo Kwon , and Junbeom Hur
    IEEE Transactions on Cloud Computing, 2022
    Vol. 10 (No. 2) , pp. 1008-1020

2021

  1. P2DPI: Practical and Privacy-Preserving Deep Packet Inspection
    Jongkil Kim , Seyit Camtepe , Joonsang Baek , Willy Susilo , Josef Pieprzyk , and Surya Nepal
    Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, 2021
    pp. 135–146
  2. SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments
    Viet Xuan Phuong Tran , Willy Susilo , Guomin Yang ,  Jongkil Kim , Yang-Wai Chow , and Dongxi Liu
    Computer Security – ESORICS 2021, 2021
    pp. 106–126
  3. Exploiting QR Code Error Correction for Digital Image Watermarking
    Yang-Wai Chow , Willy Susilo , Joonsang Baek ,  Jongkil Kim , and Wei Zong
    J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
    Vol. 12 (No. 2) , pp. 114–140
  4. Utilizing QR codes to verify the visual fidelity of image datasets for machine learning
    Yang-Wai Chow , Willy Susilo , Jianfeng Wang , Richard Buckland , Joonsang Baek ,  Jongkil Kim , and Nan Li
    Journal of Network and Computer Applications, 2021
    Vol. 173 , pp. 102834

2020

  1. Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception
    Joonsang Baek ,  Jongkil Kim , and Willy Susilo
    Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, 2020
    pp. 116–126
  2. Efficient Anonymous Multi-group Broadcast Encryption
    Intae Kim , Seong Oun Hwang , Willy Susilo , Joonsang Baek , and  Jongkil Kim
    Applied Cryptography and Network Security, 2020
    pp. 251–270
  3. QR Code Watermarking for Digital Images
    Yang-Wai Chow , Willy Susilo , Joonsang Baek , and  Jongkil Kim
    Information Security Applications, 2020
    pp. 25–37
  4. Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof
    Jongkil Kim , Joonsang Baek , Willy Susilo , and Yang-Wai Chow
    Information Security Applications, 2020
    pp. 206–216
  5. Internet of Things (IoT) and Cloud Computing Enabled Disaster Management
    Raj Gaire , Chigulapalli Sriharsha , Deepak Puthal , Hendra Wijaya ,  Jongkil Kim , Prateeksha Keshari , Rajiv Ranjan , Rajkumar Buyya , Ratan K. Ghosh , R. K. Shyamasundar , and Surya Nepal
    2020
    pp. 273–298

2019

  1. Generic Construction of Fair Exchange Scheme with Semi-Trusted Adjudicator
    Yang Wang , Willy Susilo , Joonsang Baek ,  Jongkil Kim , and Intae Kim
    J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019
    Vol. 10 (No. 4) , pp. 68–87
  2. Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes
    Joonsang Baek ,  Jongkil Kim , and Nan Li
    Machine Learning for Cyber Security: Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings, 2019
    Vol. 11806 , pp. 320
  3. Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing
    Jongkil Kim , Seyit Camtepe , Willy Susilo , Surya Nepal , and Joonsang Baek
    Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, Auckland, New Zealand, 2019
    pp. 55–66
  4. Subversion in Practice: How to Efficiently Undermine Signatures
    Joonsang Baek , Willy Susilo ,  Jongkil Kim , and Yang-Wai Chow
    IEEE Access, 2019
    Vol. 7 , pp. 68799–68811
  5. Chapter 5 - Crowdsensing and Privacy in Smart City Applications
    Raj Gaire , Ratan K. Ghosh ,  Jongkil Kim , Alexander Krumpholz , Rajiv Ranjan , R.K. Shyamasundar , and Surya Nepal
    Smart Cities Cybersecurity and Privacy, 2019
    pp. 57–73
  6. Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes
    Yang-Wai Chow , Willy Susilo , Jianfeng Wang , Richard Buckland , Joonsang Baek ,  Jongkil Kim , and Nan Li
    Machine Learning for Cyber Security, 2019
    pp. 320–335
  7. Puncturable Proxy Re-Encryption Supporting to Group Messaging Service
    Tran Viet Xuan Phuong , Willy Susilo ,  Jongkil Kim , Guomin Yang , and Dongxi Liu
    Computer Security – ESORICS 2019, 2019
    pp. 215–233
  8. Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach
    Jongkil Kim , Willy Susilo , Joonsang Baek , Surya Nepal , and Dongxi Liu
    Information Security and Privacy, 2019
    pp. 3–20
  9. A New Encoding Framework for Predicate Encryption with Non-linear Structures in Prime Order Groups
    Jongkil Kim , Willy Susilo , Fuchun Guo , Joonsang Baek , and Nan Li
    Applied Cryptography and Network Security, 2019
    pp. 406–425

2018

  1. Security and Performance Considerations in ROS 2: A Balancing Act
    Jongkil Kim , Jonathon M. Smereka , Calvin Cheung , Surya Nepal , and Marthie Grobler
    2018
  2. Functional encryption for computational hiding in prime order groups via pair encodings
    Jongkil Kim , Willy Susilo , Fuchun Guo , and Man Ho Au
    Designs, Codes and Cryptography, 2018
    Vol. 86 (No. 1) , pp. 97–120

2017

  1. An Efficient KP-ABE with Short Ciphertexts in Prime Order Groups under Standard Assumption
    Jongkil Kim , Willy Susilo , Fuchun Guo , Man Ho Au , and Surya Nepal
    Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
    pp. 823–834
  2. Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication
    Dongxi Liu , Nan Li ,  Jongkil Kim , and Surya Nepal
    2017