Follow
Changhoon Lee
Title
Cited by
Cited by
Year
Hight: A new block cipher suitable for low-resource device
D Hong, J Sung, S Hong, J Lim, S Lee, BS Koo, C Lee, D Chang, J Lee, ...
Cryptographic Hardware and Embedded Systems-CHES 2006, 46-59, 2006
10242006
Chaos-based secure satellite imagery cryptosystem
M Usama, MK Khan, K Alghathbar, C Lee
Computers & Mathematics with Applications 60 (2), 326-337, 2010
1632010
Abnormal event detection in crowded scenes based on deep learning
Z Fang, F Fei, Y Fang, C Lee, N Xiong, L Shu, S Chen
Multimedia Tools and Applications 75, 14617-14639, 2016
1172016
A learning automata-based fault-tolerant routing algorithm for mobile ad hoc networks
S Misra, PV Krishna, A Bhiwal, AS Chawla, BE Wolfinger, C Lee
The Journal of Supercomputing, 1-20, 2012
842012
Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED
K Jeong, HC Kang, C Lee, J Sung, S Hong
66*
Packet Preprocessing in CNN-Based Network Intrusion Detection System
W Jo, S Kim, C Lee, T Shon
Electronics 9 (7), 1151, 2020
652020
Homomorphic Encryption Based Privacy-Preservation for IoMT
MM Salim, I Kim, U Doniyor, C Lee, JH Park
Applied Sciences 11 (18), 8757, 2021
502021
BLOCIS: Blockchain-Based Cyber Threat Intelligence Sharing Framework for Sybil-Resistance
S Gong, C Lee
Electronics 9 (3), 521, 2020
452020
Color sensors and their applications based on real-time color image segmentation for cyber physical systems
NN Xiong, Y Shen, K Yang, C Lee, C Wu
EURASIP Journal on Image and Video Processing 2018, 1-16, 2018
432018
A reliability comparison method for OSINT validity analysis
S Gong, J Cho, C Lee
IEEE Transactions on Industrial Informatics 14 (12), 5428-5435, 2018
402018
Differential Fault Analysis on Block Cipher LED-64
K Jeong, C Lee
Future Information Technology, Application, and Service, 747-755, 2012
402012
Impossible differential attack on 30-round SHACAL-2
S Hong, J Kim, G Kim, J Sung, C Lee, S Lee
Progress in Cryptology-INDOCRYPT 2003, 317-341, 2003
402003
Cyber Threat Intelligence Framework for Incident Response in an Energy Cloud Platform
S Gong, C Lee
Electronics 10 (3), 239, 2021
392021
A chosen plaintext linear attack on block cipher CIKS-1
C Lee, D Hong, S Lee, S Lee, H Yang, J Lim
Information and Communications Security: 4th International Conference, ICICS …, 2002
392002
A chosen plaintext linear attack on block cipher CIKS-1
C Lee, D Hong, S Lee, S Lee, H Yang, J Lim
Information and Communications Security, 456-468, 2002
382002
Context-aware middleware and intelligent agents for smart environments
HR Arabnia, WC Fang, C Lee, Y Zhang
IEEE Intelligent Systems 25 (2), 10-11, 2010
372010
Context-aware middleware and intelligent agents for smart environments
HR Arabnia, WC Fang, C Lee, Y Zhang
IEEE Intelligent Systems 25 (2), 10-11, 2010
372010
Detection of adversarial attacks in AI-based intrusion detection systems using explainable AI
E Tcydenova, TW Kim, C Lee, JH Park
Human-Centric Comput Inform Sci 11, 2021
322021
Related-key attacks on DDP based ciphers: CIKS-128 and CIKS-128H
Y Ko, C Lee, S Hong, J Sung, S Lee
Progress in Cryptology-INDOCRYPT 2004, 179-200, 2005
322005
Digital forensic investigation framework for the metaverse
S Seo, B Seok, C Lee
The Journal of Supercomputing, 1-19, 2023
292023
The system can't perform the operation now. Try again later.
Articles 1–20