default search action
Jin Kwak
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Lelisa Adeba Jilcha, Deuk-Hun Kim, Jin Kwak:
SaRLog: Semantic-Aware Robust Log Anomaly Detection via BERT-Augmented Contrastive Learning. IEEE Internet Things J. 11(13): 23727-23736 (2024) - [j41]In-Su Jung, Yu-Rae Song, Lelisa Adeba Jilcha, Deuk-Hun Kim, Sun-Young Im, Shin-Woo Shim, Young-Hwan Kim, Jin Kwak:
Enhanced Encrypted Traffic Analysis Leveraging Graph Neural Networks and Optimized Feature Dimensionality Reduction. Symmetry 16(6): 733 (2024) - 2023
- [j40]Aeryn Dunmore, Julian Jang-Jaccard, Fariza Sabrina, Jin Kwak:
A Comprehensive Survey of Generative Adversarial Networks (GANs) in Cybersecurity Intrusion Detection. IEEE Access 11: 76071-76094 (2023) - [j39]Deuk-Hun Kim, Heejin Kim, Jin Kwak:
Secure e-Prescription Management System: Mitigating Blended Threat in IoBE. Comput. Syst. Sci. Eng. 44(3): 2501-2519 (2023) - [j38]Lelisa Adeba Jilcha, Deuk-Hun Kim, Julian Jang-Jaccard, Jin Kwak:
Network Intrusion Detection in Internet of Blended Environment Using Ensemble of Heterogeneous Autoencoders (E-HAE). Comput. Syst. Sci. Eng. 46(3): 3261-3284 (2023) - [j37]Minkyung Lee, Deuk-Hun Kim, Julian Jang-Jaccard, Jin Kwak:
Blended threat prediction based on knowledge graph embedding in the IoBE. ICT Express 9(5): 903-908 (2023) - [j36]Yuhua Yin, Julian Jang-Jaccard, Wen Xu, Amardeep Singh, Jinting Zhu, Fariza Sabrina, Jin Kwak:
IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset. J. Big Data 10(1): 15 (2023) - [c24]Yuhua Yin, Julian Jang-Jaccard, Fariza Sabrina, Jin Kwak:
Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset. CSCWD 2023: 423-431 - [i3]Aeryn Dunmore, Julian Jang-Jaccard, Fariza Sabrina, Jin Kwak:
Generative Adversarial Networks for Malware Detection: a Survey. CoRR abs/2302.08558 (2023) - 2022
- [j35]Wen Xu, Julian Jang-Jaccard, Tong Liu, Fariza Sabrina, Jin Kwak:
Improved Bidirectional GAN-Based Approach for Network Intrusion Detection Using One-Class Classifier. Comput. 11(6): 85 (2022) - [j34]Eui-Jin Kim, Deuk-Hun Kim, Jin Kwak:
Improved Piracy Site Detection Technique using Search Engine. KSII Trans. Internet Inf. Syst. 16(7): 2459-2472 (2022) - [i2]Yuhua Yin, Julian Jang-Jaccard, Wen Xu, Amardeep Singh, Jinting Zhu, Fariza Sabrina, Jin Kwak:
IGRF-RFE: A Hybrid Feature Selection Method for MLP-based Network Intrusion Detection on UNSW-NB15 Dataset. CoRR abs/2203.16365 (2022) - [i1]Yuhua Yin, Julian Jang-Jaccard, Fariza Sabrina, Jin Kwak:
Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset. CoRR abs/2208.09711 (2022) - 2021
- [j33]Eui-Jin Kim, Jin Kwak:
Intelligent Piracy Site Detection Technique with High Accuracy. KSII Trans. Internet Inf. Syst. 15(1): 285-301 (2021) - [j32]Man Yong Choi, Jin Kwak:
Rationalization of Network Segregation for Continuity of Financial Services Following COVID-19. KSII Trans. Internet Inf. Syst. 15(11): 4163-4183 (2021) - 2020
- [j31]Ju-Seong Ko, Jin Kwak:
Private Key Recovery on Bitcoin with Duplicated Signatures. KSII Trans. Internet Inf. Syst. 14(3): 1280-1300 (2020) - [j30]SeulKi Choi, Jin Kwak:
Feature Analysis and Detection Techniques for Piracy Sites. KSII Trans. Internet Inf. Syst. 14(5): 2204-2220 (2020) - [j29]Hae Seon Jeong, Jin Kwak:
Automated Detection Technique for Suspected Copyright Infringement Sites. KSII Trans. Internet Inf. Syst. 14(12): 4889-4908 (2020) - [j28]Won-il Bae, Jin Kwak:
Smart card-based secure authentication protocol in multi-server IoT environment. Multim. Tools Appl. 79(23-24): 15793-15811 (2020) - [j27]Jaehan Jeong, SungMoon Kwon, Man-Pyo Hong, Jin Kwak, Taeshik Shon:
Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance. Multim. Tools Appl. 79(23-24): 16077-16091 (2020) - [j26]Dongsik Son, Seungpyo Huh, Taejin Lee, Jin Kwak:
Internet of things system technologies based on quality of experience. Peer-to-Peer Netw. Appl. 13(2): 475-488 (2020)
2010 – 2019
- 2019
- [j25]SeulKi Choi, TaeJin Lee, Jin Kwak:
A Study on Analysis of Malicious Code Behavior Information for Predicting Security Threats in New Environments. KSII Trans. Internet Inf. Syst. 13(3): 1611-1625 (2019) - [j24]Dongsik Sohn, TaeJin Lee, Jin Kwak:
On-line Shared Platform Evaluation Framework for Advanced Persistent Threats. KSII Trans. Internet Inf. Syst. 13(5): 2610-2628 (2019) - [j23]Jun-Ho Hwang, Jin Kwak, Taejin Lee:
Fast k-NN based Malware Analysis in a Massive Malware Environment. KSII Trans. Internet Inf. Syst. 13(12): 6145-6158 (2019) - [c23]Ju-Seong Ko, Jeong-Seok Jo, Deuk-Hun Kim, SeulKi Choi, Jin Kwak:
Real Time Android Ransomware Detection by Analyzed Android Applications. ICEIC 2019: 1-5 - 2018
- [j22]SeulKi Choi, Chung-Huang Yang, Jin Kwak:
System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats. KSII Trans. Internet Inf. Syst. 12(2): 906-918 (2018) - [j21]TaeJin Lee, Jin Kwak:
EMICS: E-mail based Malware Infected IP Collection System. KSII Trans. Internet Inf. Syst. 12(6): 2881-2894 (2018) - [j20]TaeJin Lee, Bomin Choi, Youngsang Shin, Jin Kwak:
Automatic malware mutant detection and group classification based on the n-gram and clustering coefficient. J. Supercomput. 74(8): 3489-3503 (2018) - 2017
- [c22]Deuk-Hun Kim, Jin Kwak:
A Framework for Preventing Illegitimate e-Prescribing Practices. CSA/CUTE 2017: 648-653 - 2016
- [j19]Seongho Choi, Jin Kwak:
Enhanced SDIoT Security Framework Models. Int. J. Distributed Sens. Networks 12(5) (2016) - [j18]TaeJin Lee, Jin Kwak:
Effective and Reliable Malware Group Classification for a Massive Malware Environment. Int. J. Distributed Sens. Networks 12(5): 4601847:1-4601847:6 (2016) - [j17]Jun-Sub Kim, Jin Kwak:
Design of USIM-based secure user authentication scheme in a mobile office environment. Multim. Tools Appl. 75(22): 14541-14556 (2016) - [j16]Seung-hwan Ju, Hee Suk Seo, Jin Kwak:
Research on android malware permission pattern using permission monitoring system. Multim. Tools Appl. 75(22): 14807-14817 (2016) - 2015
- [j15]Dongwoo Kim, Jin Kwak, Jae-Cheol Ryou:
DWroidDump: Executable Code Extraction from Android Applications for Malware Analysis. Int. J. Distributed Sens. Networks 11: 379682:1-379682:9 (2015) - [j14]TaeJin Lee, Hesun Cho, Haeryong Park, Jin Kwak:
Detection of Malware Propagation in Sensor Node and Botnet Group Clustering Based on E-mail Spam Analysis. Int. J. Distributed Sens. Networks 11: 530250:1-530250:12 (2015) - [j13]Yu-Jong Jang, Jin Kwak:
Digital forensics investigation methodology applicable for social network services. Multim. Tools Appl. 74(14): 5029-5040 (2015) - [c21]Seongho Choi, Jin Kwak:
Secure Framework for Software Defined Based Internet of Things. CSA/CUTE 2015: 477-482 - [c20]Ho-Seok Ryu, Jin Kwak:
Secure Data Access Control Scheme for Smart Home. CSA/CUTE 2015: 483-488 - 2014
- [j12]Yukyeong Wi, Jin Kwak:
Secure data management scheme in the cloud data center. Int. J. Adv. Media Commun. 5(2/3): 225-232 (2014) - [j11]Jun-Sub Kim, Jin Kwak:
Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j10]Woong Go, Jin Kwak:
Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure. J. Appl. Math. 2014: 149649:1-149649:9 (2014) - [j9]Woong Go, Kwang-Woo Lee, Jin Kwak:
Construction of a secure two-factor user authentication system using fingerprint information and password. J. Intell. Manuf. 25(2): 217-230 (2014) - [c19]Yun Sang Byun, Jin Kwak:
Context Aware Based Access Control Model in Cloud Data Center Environment. FCC 2014: 515-524 - [c18]Yu-Jong Jang, Jin Kwak:
Social Network Service Real Time Data Analysis Process Research. FCC 2014: 643-652 - 2013
- [j8]Sung-Min Jung, Tae-Kyung Kim, Hee Suk Seo, Seung-Jae Lee, Jin Kwak:
The prediction of network efficiency in the smart grid. Electron. Commer. Res. 13(3): 347-356 (2013) - [j7]Woong Go, SeulKi Choi, Jin Kwak:
Privacy Protection Based Secure Data Transaction Protocol for Smart Sensor Meter in Smart Grid. Int. J. Distributed Sens. Networks 9 (2013) - [j6]Jun-Sub Kim, Jin Kwak:
Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks. J. Appl. Math. 2013: 302582:1-302582:12 (2013) - [j5]Woon-hae Jeong, Se-jun Kim, Doo-Soon Park, Jin Kwak:
Performance Improvement of a Movie Recommendation System based on Personal Propensity and Secure Collaborative Filtering. J. Inf. Process. Syst. 9(1): 157-172 (2013) - [j4]Hyeong-Ju Kang, Hee Suk Seo, Jin Kwak:
Area-efficient convolutional deinterleaver for mobile TV receiver. ACM Trans. Embed. Comput. Syst. 12(2): 28:1-28:12 (2013) - 2012
- [j3]Soo-Young Kang, Jong Hyuk Park, Muhammad Khurram Khan, Jin Kwak:
Study on the common criteria methodology for secure ubiquitous environment construction. J. Intell. Manuf. 23(4): 933-939 (2012) - 2011
- [j2]Jin Myoung Kim, Hee Suk Seo, Jin Kwak:
Routing Protocol for Heterogeneous Hierarchical Wireless Multimedia Sensor Networks. Wirel. Pers. Commun. 60(3): 559-569 (2011) - 2010
- [e1]Jin Kwak, Robert H. Deng, Yoojae Won, Guilin Wang:
Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings. Lecture Notes in Computer Science 6047, Springer 2010, ISBN 978-3-642-12826-4 [contents]
2000 – 2009
- 2009
- [j1]Tae-Kyung Kim, Jong Hyuk Park, Sang-Soo Yeo, Hee Suk Seo, Jin Kwak:
Job partition and allocation using the prediction model in non-dedicated heterogeneous wireless network environments. IET Commun. 3(5): 764-771 (2009) - [c17]Wan S. Yi, Woong Go, Sookyun Kim, Dongho Won, Jin Kwak:
Fingerprint Based Secure Authentication Protocol using OTP in e-Banking. Security and Management 2009: 541-546 - [c16]Wan S. Yi, Dongbum Lee, Sang-Soo Yeo, Dongho Won, Jin Kwak:
Security and Efficiency Analyses of Security Mechanisms in e-Passport Systems. Security and Management 2009: 547-553 - 2007
- [c15]Sang-Soo Yeo, Kouichi Sakurai, Jin Kwak:
A Practical Proxy Device for Protecting RFID Tag's Identifier. BLISS 2007: 55-58 - [c14]Junghyun Nam, Juryon Paik, Youngsook Lee, Jin Kwak, Ung-Mo Kim, Dongho Won:
Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees. KES (1) 2007: 672-679 - [c13]Youngsook Lee, Junghyun Nam, Jin Kwak, Dongho Won:
Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting. KES-AMSTA 2007: 616-625 - 2006
- [c12]Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim:
WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. APWeb Workshops 2006: 741-748 - [c11]Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won:
An RFID System Based MCLT System with Improved Privacy. EUC Workshops 2006: 579-590 - [c10]He Zheng, Jin Kwak, Kyungho Son, Wansuk Lee, Seungjoo Kim, Dongho Won:
Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments. ICCSA (2) 2006: 954-963 - [c9]Keunwoo Rhee, Jin Kwak, Wan S. Yi, Chanho Park, Sangjoon Park, Hyungkyu Yang, Seungjoo Kim, Dongho Won:
Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation. ICHIT 2006: 607-616 - [c8]Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim:
Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services. KES (1) 2006: 924-934 - 2005
- [c7]Jin Kwak, Keunwoo Rhee, Soohyun Oh, Seungjoo Kim, Dongho Won:
RFID System with Fairness Within the Framework of Security and Privacy. ESAS 2005: 142-152 - [c6]Keunwoo Rhee, Jin Kwak, Seungjoo Kim, Dongho Won:
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. SPC 2005: 70-84 - 2004
- [c5]Jeeyeon Kim, Seungjoo Kim, Jin Kwak, Dongho Won:
Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords. ICCSA (1) 2004: 895-902 - [c4]Jin Kwak, Jongsu Han, Soohyun Oh, Dongho Won:
Security Enhanced WTLS Handshake Protocol. ICCSA (3) 2004: 955-964 - [c3]Jin Kwak, Soohyun Oh, Dongho Won:
Efficient Key Distribution Protocol for Electronic Commerce in Mobile Communications. PARA 2004: 1009-1016 - 2003
- [c2]Soohyun Oh, Jin Kwak, Seungwoo Lee, Dongho Won:
Security Analysis and Applications of Standard Key Agreement Protocols. ICCSA (2) 2003: 191-200 - [c1]Soohyun Oh, Jin Kwak, Dongho Won:
An Efficient Hybrid Cryptosystem Providing Authentication for Sender?S Identity. ICOIN 2003: 737-746
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint