default search action
Jungho Kang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j21]Jimin Ha, Jungho Kang, Jong Hyuk Park:
Machine Learning-Based Reversible Chaotic Masking Method for User Privacy Protection in CCTV Environment. J. Inf. Process. Syst. 19(6): 767-777 (2023) - 2022
- [j20]Aaisha Makkar, Tae Woo Kim, Ashutosh Kumar Singh, Jungho Kang, Jong Hyuk Park:
SecureIIoT Environment: Federated Learning Empowered Approach for Securing IIoT From Data Breach. IEEE Trans. Ind. Informatics 18(9): 6406-6414 (2022) - 2021
- [j19]Dohyun Kim, Jungho Kang, Tae Woo Kim, Yi Pan, Jong Hyuk Park:
The Future of Quantum Information: Challenges and Vision. J. Inf. Process. Syst. 17(1): 151-162 (2021)
2010 – 2019
- 2019
- [j18]Jungho Kang, Sejun Jang, Shuyu Li, Young-Sik Jeong, Yunsick Sung:
Long short-term memory-based Malware classification method for information security. Comput. Electr. Eng. 77: 366-375 (2019) - [j17]Fei Hao, Doo-Soon Park, Jungho Kang, Geyong Min:
2L-MC3: A Two-Layer Multi-Community-Cloud/Cloudlet Social Collaborative Paradigm for Mobile Edge Computing. IEEE Internet Things J. 6(3): 4764-4773 (2019) - [j16]Jungho Kang, Jong Hyuk Park:
Integration of Cloud and Big Data Analytics for Future Smart Cities. J. Inf. Process. Syst. 15(6): 1259-1264 (2019) - [j15]JaeSeung Lee, Jungho Kang, Moon-Seog Jun, Jaekyung Han:
Design of a Symmetry Protocol for the Efficient Operation of IP Cameras in the IoT Environment. Symmetry 11(3): 361 (2019) - [j14]Fei Hao, Huijuan Guo, Doo-Soon Park, Jungho Kang:
An efficient pricing strategy of sensing tasks for crowdphotographing. J. Supercomput. 75(8): 4443-4458 (2019) - [j13]Jungho Kang:
Lightweight mutual authentication RFID protocol for secure multi-tag simultaneous authentication in ubiquitous environments. J. Supercomput. 75(8): 4529-4542 (2019) - [c6]Haitao Guo, Yunsick Sung, Jungho Kang:
Motion Estimation Approach for UAV Controls Using Bidirectional Two-Layer LSTMs. iThings/GreenCom/CPSCom/SmartData 2019: 381-384 - 2018
- [j12]Jungho Kang:
Mobile payment in Fintech environment: trends, security challenges, and services. Hum. centric Comput. Inf. Sci. 8: 32 (2018) - [j11]Yongchul Kim, Young-Hyun Oh, Jungho Kang:
Asynchronous Channel-Hopping Scheme under Jamming Attacks. Mob. Inf. Syst. 2018: 5032934:1-5032934:9 (2018) - [j10]Seokhong Min, Young-Sik Jeong, Jungho Kang:
Cross-layer design and performance analysis for maximizing the network utilization of wireless mesh networks in cloud computing. J. Supercomput. 74(3): 1227-1254 (2018) - [c5]Byung Wook Kwon, Jungho Kang, Jong Hyuk Park:
A Fog Computing-Based Automotive Data Overload Protection System with Real-Time Analysis. MUE/FutureTech 2018: 693-696 - 2017
- [j9]Jungho Kang, Jong Hyuk Park:
A secure-coding and vulnerability check system based on smart-fuzzing and exploit. Neurocomputing 256: 23-34 (2017) - [j8]Hyungjoo Kim, Jungho Kang, Jong Hyuk Park:
A light-weight secure information transmission and device control scheme in integration of CPS and cloud computing. Microprocess. Microsystems 52: 416-426 (2017) - 2016
- [j7]Jungho Kang, Mansik Kim, Jong Hyuk Park:
A Reliable TTP-Based Infrastructure with Low Sensor Resource Consumption for the Smart Home Multi-Platform. Sensors 16(7): 1036 (2016) - [j6]Jong Hyuk Park, Hyungjoo Kim, Jungho Kang:
Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World. Symmetry 8(10): 106 (2016) - [j5]Jungho Kang, Hague Chung, Jeong Kyu Lee, Jong Hyuk Park:
The Design and Analysis of a Secure Personal Healthcare System Based on Certificates. Symmetry 8(11): 129 (2016) - [j4]Jungho Kang, Geun Il Park, Jong Hyuk Park:
Design of secure authentication scheme between devices based on zero-knowledge proofs in home automation service environments. J. Supercomput. 72(11): 4319-4336 (2016) - [c4]Mansik Kim, Hyungjoo Kim, Jungho Kang, Jaesoo Kim:
Drone Classification by Available Control Distances. CSA/CUTE 2016: 221-223 - 2015
- [j3]Jungho Kang, Jong Hyuk Park, Sangkee Suk:
Design of a Distributed Personal Information Access Control Scheme for Secure Integrated Payment in NFC. Symmetry 7(2): 935-948 (2015) - [j2]Jungho Kang, Jaekyung Han, Jong Hyuk Park:
Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key. Symmetry 7(3): 1567-1586 (2015) - [c3]Jungho Kang, Jong Hyuk Park:
Design of Secure Protocol for Session Key Exchange in Vehicular Cloud Computing. CSA/CUTE 2015: 249-254 - [c2]Hyungjoo Kim, Hyunsoo Chung, Jungho Kang:
Zero-Knowledge Authentication for Secure Multi-cloud Computing Environments. CSA/CUTE 2015: 255-261 - 2014
- [j1]Jungho Kang, Sungsoo Kim, Moonseog Jun:
Study on watermarking scheme using threshold value and S-Box. Int. J. Intell. Inf. Database Syst. 8(2): 174-187 (2014)
2000 – 2009
- 2004
- [c1]Sulyun Sung, Jungho Kang, Yongtae Shin:
VPN Traversal Scheme in Hierarchical Mobile Environment. International Conference on Wireless Networks 2004: 270-278
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint