International Journal
33 |
Gabin Heo, Inshil Doh, "Blockchain and differential privacy-based data processing system for data security and privacy in urban computing," Computer Communications, Vol. 222, pp.161-176, Jun. 2024. (SCIE). |
32 |
Dana Yang, Inshil Doh, Kijoon Chae, "Cell Based Raft Algorithm for Optimized Consensus Process on Blockchain in Smart Data Market," IEEE Access, Vol. 10, No. 1, pp.85199-85212, Aug. 2022. (SCIE). |
31 |
Gabin Heo, Kijoon Chae, Inshil Doh, "Hierarchical Blockchain-Based Group and Group Key Management Scheme Exploiting Unmanned Aerial Vehicles for Urban Computing," IEEE Access, Vol. 10, No. 1, pp.27990-28003, Mar. 2022. (SCIE). |
30 |
Gabin Heo, Dana Yang, Inshil Doh, Kijoon Chae, "Efficient and Secure Blockchain System for Digital Content Trading," IEEE Access, Vol. 9, No. 1, pp.77438-77450, May 2021. (SCIE). |
29 |
Dana Yang, Seohee Yoo, Inshil Doh, Kijoon Chae, "Selective blockchain system for secure and efficient D2D communication," Journal of Network and Computer Applications, Vol. 173, 102817, Jan. 2021. (SCIE). |
28 |
Nishat I Mowla, Nguyen H. Tran, Inshil Doh, Kijoon Chae, "AFRL: Adaptive federated reinforcement learning for intelligent jamming defense in FANET," Journal of Communications and Networks, Vol. 22, No. 3, pp. 244-258, Jun. 2020. (SCIE). |
27 |
Nishat I Mowla, Nguyen H. Tran, Inshil Doh, Kijoon Chae, "Federated Learning-Based Cognitive Detection of Jamming Attack in Flying Ad-Hoc Network," IEEE Access, Vol. 8, No. 1, pp.4338-4350, Jan. 2020. (SCIE). |
26 |
Nishat I Mowla, Inshil Doh, Kijoon Chae, "On-Device AI-based Cognitive Detection of Bio-Modality Spoofing in Medical Cyber Physical System," IEEE Access, Vol. 7, No. 1, pp.2126-2137, Jan. 2019. (SCIE). |
25 |
Nishat I Mowla, Inshil Doh, Kijoon Chae, "SEFL: Selective Ensemble Fuzzy Learner for Cognitive Detection of Bio-Modality Spoofing in Medical Cyber Physical System," ICACT Transactions on Advanced Communications Technology, Vol. 7, No. 5, pp.1153-1158, Sep. 2018. (SCOPUS). |
24 |
Nishat I Mowla, Inshil Doh, Kijoon Chae, "CSDSM: Cognitive Switch-based DDoS Sensing and Mitigation in SDN-driven CDNi Word," Computer Science and Information Systems, Vol. 15, No. 1, pp.163-185, Jan. 2018. (SCIE). |
23 |
Jiyoung Lim, Inshil Doh, Kijoon Chae, "Lightweight Authentication for Distributed Mobile P2P Communications," Advances in Intelligent Systems and Computing, Volume 612, pp. 580 - 589, Jul. 2017. (SCOPUS). |
22 |
Nishat Mowla, Inshil Doh, Kijoon Chae, "Evolving Neural Network Intrusion Detection System for MCPS," ICACT Transactions on Advanced Communications Technology, Vol. 6, No. 4, pp. 1040-1045, Jul. 2017. (SCOPUS). |
21 |
Shi Li, Inshil Doh, Kijoon Chae, "NRIT: Non-Redundant Indirect Trust Search Algorithm for a Cross-Domain based CDNi-P2P Architecture," ICACT Transactions on Advanced Communications Technology, Vol. 6, No.2, pp. 992-998, Mar. 2017. (SCOPUS) |
20 |
Jiyoung Lim, Inshil Doh, Kijoon Chae, "Secure and structured IoT smart grid system management," International Journal of Web and Grid Services, Vol.13, No.2, pp. 170-185 Apr. 2017. (SCIE) |
19 |
Jiyoung Lim, Inshil Doh, Kijoon Chae, "Security system architecture for data integrity based on a virtual smart meter overlay in a smart grid system," Soft Computing, Vol.20, No.5 pp.1829–1840, May 2016. (SCIE) |
18 |
Bum-Gon Choi, Inshil Doh, and Min Young Chung,"Radio Resource Management Scheme for Relieving Interference to MUEs in Relay-Based Cellular Networks," IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, Volume 64 No.7, pp. 3018-3029, Jul. 2015. (SCI) |
17 |
Inshil Doh, Kijoon Chae, Jiyoung Lim, Min Young Chung, "Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security," Intelligent Automation &Soft Computing, Vol.21, Issue 4, pp. 543-558, Jun. 2015. (SCIE) |
16 |
Inshil Doh, Jiyoung Lim, Shi Li, Kijoon Chae, "Pairwise and Group Key Setup Mechanism for Secure Machine-to-Machine Communication," Computer Science and Information Systems, Vol.11, No.3, pp.1071-1090, Aug. 2014. (SCIE) |
15 |
Yunjeong Choi and Inshil Doh,"Hierarchical Aggregation of Uncertain Sensor Data for M2M Wireless Sensor Network Using Reinforcement Learning," International Journal of Distributed Sensor Networks, Volume 2014, Article ID 535707, May 2014. (SCIE) |
14 |
Jung-Min Park, Inshil Doh, Kijoon Chae, "Secure U-Healthcare Service based on Wireless Sensor Network," iNFORMATION: An International Interdisciplinary Journal, Vol.17, No.1, pp. 181-195, Jan. 2014. (SCOPUS) |
13 |
Xinyi Chen, Inshil Doh, Kijoon Chae, "User Authentication Mechanism based on Secure Positioning System in RFID Communication," Ubiquitous Information Technologies and Applications, LNEE 280, pp. 683-690, Jan. 2014. (SCOPUS) |
12 |
Inshil Doh, Jiyoung Lim, Kijoon Chae, "Code updates based on minimal backbone and group key management for secure sensor networks," Mathematical and Computer Modelling, Vol.57, Issue 11-12, pp. 2801-2813, Jun. 2013. (SCIE) |
11 |
Jun Suk Kim, Bum-Gon Choi, Sueng Jae Bae, Inshil Doh, Min Young Chung, "Adaptive time division duplexing configuration mode selection mechanism for accommodating asymmetric traffic in time division long term evolution-advanced systems," TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, VOL 10-2, 843-864, May 2013. (SCIE) |
10 |
Inshil Doh, Jiyoung Lim, Kijoon Chae, "Key management approach for secure mobile open IPTV service," Computer Science & Information Systems, Vol.10, Issue 2, pp. 843-864, Apr. 2013. (SCIE) |
9 |
Yunjeong Chio, Inshil Doh, Seung-Soo Park, Kijoon Chae, "Security Based Semantic Context Awareness System for M2M Ubiquitous Healthcare Service," Ubiquitous Information Technologies and Applications, Lecture Notes in Electrical Engineering, Vol.214, pp. 187-196, Jan. 2013. (SCI) |
8 |
Inshil Doh, Jiyoung Lim, Kijoon Chae, "Distributed authentication mechanism for secure channel establishment in ubiquitous medical sensor networks," Mobile Information Systems 7, pp. 189-200, Aug. 2011. (SCIE) |
7 |
Hayoung Oh, Inshil Doh, Kijoon Chae, "A Fault Management And Moniroting Mechanism For Secure Medical Sensor Network," International Journal of Computer Science and Applications, Vol. 6, No. 3, Jun. 2009. |
6 |
Hayoung Oh, Inshil Doh, Kijoon Chae, "Attack Classification Based On Data Mining Technique And Its Application For Reliable Medical Sensor Communication," International Journal of Computer Science and Applications, Vol. 6, No. 3, Jun. 2009. |
5 |
Inshil Doh, Kijoon Chae, "A secure and efficient routing and aggregation mechanism for sensor networks," International Journal of Computer Science and Network Security(IJCSNS), Vol. 6, No. 12, Dec. 2006. |
4 |
Inshil Doh, Jung-Min Park, Kijoon Chae, "Pairwise key setup and authentication utilizing deployment information for secure sensor network," HPCC 2006, LNCS 4208, Sep. 2006. (SCIE) |
3 |
Mihui Kim, Inshil Doh, Kijoon Chae, "A Key Management based on Multiple Regression in Hierarchical Sensor Network," WISA 2006, LNCS 4298, pp. 267-281, Aug. 2006. |
2 |
Inshil Doh, Kijoon Chae, Howon Kim, and Kyoil Chung, "Security Enhancement Mechanism for Ad-hoc OLSR protocol," ICOIN 2006, LNCS 3961, Jan. 2006. (SCIE) |
1 |
Inshil Doh, Kijoon Chae, "Key Establishment and Authentication Mechanism for Secure Sensor Networks," APWEB 2006, LNCS 3842, pp. 335-344, Jan. 2006. (SCIE) |
Copyright © 2018 - All Rights Reserved - Ewha Womans. University Data Communication Security Laboratory
Template by OS Templates