2025

  1. PhiShield: An AI-Based Personalized Anti-Spam Solution with Third-Party Integration
    Hyunsol Mun ,  Jeeeun Park ,  Yeonhee Kim ,  Boeun Kim , and  Jongkil Kim
    Electronics, 2025
  2. Enhancing Gender Prediction Model Performance through Automatic Individual Entity Extraction and Class Balance
    Chaeyun Kim ,  Eunseo Kim ,  Yeonhee Kim ,  Jaehyeong Sim , and  Jongkil Kim
    2025 IEEE International Conference on Big Data and Smart Computing (BigComp), 2025

2024

  1. A Secure Key Management for TLS Subversion
    Boeun Kim ,  Yeonhee Kim , and  Jongkil Kim
    AICompS, 2024
  2. Gender Bias Mitigation in Gender Prediction Using Zero-shot Classification
    Yeonhee Kim ,  Byoungju Choi , and  Jongkil Kim
    Annual Conference of KIPS, 2024

2023

  1. TLS Goes Low Cost: When TLS Meets Edge
    Intae Kim ,  Willy Susilo ,  Joonsang Baek ,  Jongkil Kim , and  Yang-Wai Chow
    Information Security Applications, 2023
  2. Backward Compatible Identity-Based Encryption
    Jongkil Kim
    Sensors, 2023

2022

  1. Verifiable Outsourced Decryption of Encrypted Data From Heterogeneous Trust Networks
    Changhee Hahn , and  Jongkil Kim
    IEEE Internet of Things Journal, 2022
  2. Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption
    Intae Kim ,  Willy Susilo ,  Joonsang Baek , and  Jongkil Kim
    IEEE Transactions on Dependable and Secure Computing, 2022
  3. Efficient IoT Management With Resilience to Unauthorized Access to Cloud Storage
    Changhee Hahn ,  Jongkil Kim ,  Hyunsoo Kwon , and  Junbeom Hur
    IEEE Transactions on Cloud Computing, 2022

2021

  1. P2DPI: Practical and Privacy-Preserving Deep Packet Inspection
    Jongkil Kim ,  Seyit Camtepe ,  Joonsang Baek ,  Willy Susilo ,  Josef Pieprzyk , and  Surya Nepal
    Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, 2021
  2. SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments
    Viet Xuan Phuong Tran ,  Willy Susilo ,  Guomin Yang ,  Jongkil Kim ,  Yang-Wai Chow , and  Dongxi Liu
    Computer Security – ESORICS 2021, 2021
  3. Exploiting QR Code Error Correction for Digital Image Watermarking
    Yang-Wai Chow ,  Willy Susilo ,  Joonsang Baek ,  Jongkil Kim , and  Wei Zong
    J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
  4. Utilizing QR codes to verify the visual fidelity of image datasets for machine learning
    Yang-Wai Chow ,  Willy Susilo ,  Jianfeng Wang ,  Richard Buckland ,  Joonsang Baek ,  Jongkil Kim , and  Nan Li
    Journal of Network and Computer Applications, 2021

2020

  1. Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception
    Joonsang Baek ,  Jongkil Kim , and  Willy Susilo
    Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, 2020
  2. Efficient Anonymous Multi-group Broadcast Encryption
    Intae Kim ,  Seong Oun Hwang ,  Willy Susilo ,  Joonsang Baek , and  Jongkil Kim
    Applied Cryptography and Network Security, 2020
  3. QR Code Watermarking for Digital Images
    Yang-Wai Chow ,  Willy Susilo ,  Joonsang Baek , and  Jongkil Kim
    Information Security Applications, 2020
  4. Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof
    Jongkil Kim ,  Joonsang Baek ,  Willy Susilo , and  Yang-Wai Chow
    Information Security Applications, 2020
  5. Internet of Things (IoT) and Cloud Computing Enabled Disaster Management
    Raj Gaire ,  Chigulapalli Sriharsha ,  Deepak Puthal ,  Hendra Wijaya ,  Jongkil Kim ,  Prateeksha Keshari ,  Rajiv Ranjan ,  Rajkumar Buyya ,  Ratan K. Ghosh ,  R. K. Shyamasundar , and  Surya Nepal
    2020

2019

  1. Generic Construction of Fair Exchange Scheme with Semi-Trusted Adjudicator
    Yang Wang ,  Willy Susilo ,  Joonsang Baek ,  Jongkil Kim , and  Intae Kim
    J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019
  2. Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes
    Joonsang Baek ,  Jongkil Kim , and  Nan Li
    Machine Learning for Cyber Security: Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings, 2019
  3. Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing
    Jongkil Kim ,  Seyit Camtepe ,  Willy Susilo ,  Surya Nepal , and  Joonsang Baek
    Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, Auckland, New Zealand, 2019
  4. Subversion in Practice: How to Efficiently Undermine Signatures
    Joonsang Baek ,  Willy Susilo ,  Jongkil Kim , and  Yang-Wai Chow
    IEEE Access, 2019
  5. Chapter 5 - Crowdsensing and Privacy in Smart City Applications
    Raj Gaire ,  Ratan K. Ghosh ,  Jongkil Kim ,  Alexander Krumpholz ,  Rajiv Ranjan ,  R.K. Shyamasundar , and  Surya Nepal
    Smart Cities Cybersecurity and Privacy, 2019
  6. Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes
    Yang-Wai Chow ,  Willy Susilo ,  Jianfeng Wang ,  Richard Buckland ,  Joonsang Baek ,  Jongkil Kim , and  Nan Li
    Machine Learning for Cyber Security, 2019
  7. Puncturable Proxy Re-Encryption Supporting to Group Messaging Service
    Tran Viet Xuan Phuong ,  Willy Susilo ,  Jongkil Kim ,  Guomin Yang , and  Dongxi Liu
    Computer Security – ESORICS 2019, 2019
  8. Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach
    Jongkil Kim ,  Willy Susilo ,  Joonsang Baek ,  Surya Nepal , and  Dongxi Liu
    Information Security and Privacy, 2019
  9. A New Encoding Framework for Predicate Encryption with Non-linear Structures in Prime Order Groups
    Jongkil Kim ,  Willy Susilo ,  Fuchun Guo ,  Joonsang Baek , and  Nan Li
    Applied Cryptography and Network Security, 2019

2018

  1. Security and Performance Considerations in ROS 2: A Balancing Act
    Jongkil Kim ,  Jonathon M. Smereka ,  Calvin Cheung ,  Surya Nepal , and  Marthie Grobler
    2018
  2. Functional encryption for computational hiding in prime order groups via pair encodings
    Jongkil Kim ,  Willy Susilo ,  Fuchun Guo , and  Man Ho Au
    Designs, Codes and Cryptography, 2018

2017

  1. An Efficient KP-ABE with Short Ciphertexts in Prime Order Groups under Standard Assumption
    Jongkil Kim ,  Willy Susilo ,  Fuchun Guo ,  Man Ho Au , and  Surya Nepal
    Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
  2. Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication
    Dongxi Liu ,  Nan Li ,  Jongkil Kim , and  Surya Nepal
    2017