


default search action
Soohyung Kim
Person information
Other persons with a similar name
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j17]Joohee Lee, Sangrae Cho, Soohyung Kim, Saerom Park:
Verifiable computation over encrypted data via MPC-in-the-head zero-knowledge proofs. Int. J. Inf. Sec. 24(1): 30 (2025) - 2024
- [j16]Chanhyeok Park
, Sangrae Cho, Young-Seob Cho
, Soohyung Kim
, Hyung Tae Lee
:
Insecurity of Chait et al.'s RSA-Based Aggregate Signature Scheme. IEEE Access 12: 16462-16473 (2024) - 2023
- [j15]Youngsam Kim
, Jong-Hyuk Roh
, Soohyung Kim
:
Facial Landmark, Head Pose, and Occlusion Analysis Using Multitask Stacked Hourglass. IEEE Access 11: 30970-30981 (2023) - [j14]Kijung Jung
, Incheol Baek, Soohyung Kim, Yon Dohn Chung
:
LAFD: Local-Differentially Private and Asynchronous Federated Learning With Direct Feedback Alignment. IEEE Access 11: 86754-86769 (2023) - 2022
- [j13]Myungsun Kim
, Sangrae Cho, Seongbong Choi, Young-Seob Cho
, Soohyung Kim
, Hyung Tae Lee
:
A Key Recovery Protocol for Multiparty Threshold ECDSA Schemes. IEEE Access 10: 133206-133218 (2022) - [j12]Xingbo Dong
, Sangrae Cho, Youngsam Kim, Soohyung Kim, Andrew Beng Jin Teoh
:
Deep rank hashing network for cancellable face identification. Pattern Recognit. 131: 108886 (2022) - [c10]Kwantae Cho, Sangrae Cho, Soohyung Kim:
Lightweight Signature-based Range Proof. ICTC 2022: 1862-1865 - [c9]Lucas Gallindo, Bruno Filizola Leal, Luiz Miguel Cerqueira, Anderson Morais, Soohyung Kim:
Performance Benchmarking of Local Differential Privacy for Mobile Devices. PerCom Workshops 2022: 162-168 - 2021
- [j11]Ji Young Chun
, Soohyung Kim
, Jung Yeon Hwang
:
Comments on "Identity-Based Revocation From Subset Difference Methods Under Simple Assumptions". IEEE Access 9: 62038-62042 (2021) - [c8]Youngsam Kim, Jong-Hyuk Roh, Soohyung Kim:
LSFD: Lightweight Single Stage Masked Face Detector with a CPU Real-time Speed. ICTC 2021: 1818-1822 - 2020
- [j10]Sung-Hoon Lee
, Seung-Hyun Kim, Jung Yeon Hwang, Soohyung Kim, Seung-Hun Jin:
Is Your Android App Insecure? Patching Security Functions With Dynamic Policy Based on a Java Reflection Technique. IEEE Access 8: 83248-83264 (2020) - [j9]Xingbo Dong
, Soohyung Kim, Zhe Jin
, Jung Yeon Hwang, Sangrae Cho, Andrew Beng Jin Teoh
:
Open-set face identification with index-of-max hashing by learning. Pattern Recognit. 103: 107277 (2020) - [j8]Sungwook Kim
, Hyejin Shin
, Chung Hun Baek, Soohyung Kim, Junbum Shin
:
Learning New Words from Keystroke Data with Local Differential Privacy. IEEE Trans. Knowl. Data Eng. 32(3): 479-491 (2020)
2010 – 2019
- 2019
- [j7]Minhye Seo
, Jung Yeon Hwang, Dong Hoon Lee
, Soohyung Kim, Seung-Hyun Kim, Jong Hwan Park:
Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication. IEEE Access 7: 69892-69906 (2019) - [j6]Soohyung Kim, Yon Dohn Chung:
An anonymization protocol for continuous and dynamic privacy-preserving data collection. Future Gener. Comput. Syst. 93: 1065-1073 (2019) - 2018
- [j5]Sung-Hoon Lee
, Jong-Hyuk Roh, Soohyung Kim, Seung-Hun Jin:
Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment. J. Inf. Process. Syst. 14(2): 523-538 (2018) - [j4]Zhe Jin
, Jung Yeon Hwang, Yen-Lung Lai, Soohyung Kim, Andrew Beng Jin Teoh
:
Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing. IEEE Trans. Inf. Forensics Secur. 13(2): 393-407 (2018) - [c7]Youngsam Kim, Soohyung Kim:
Design of aging-resistant Wi-Fi fingerprint-based localization system with continuous active learning. ICACT 2018: 1054-1059 - [c6]Sung-Hoon Lee
, Seung-Hyun Kim, Soohyung Kim, Seung-Hun Jin:
AppWrapper: Patching Security Functions with Dynamic Policy on Your Insecure Android Apps. ISSRE Workshops 2018: 36-41 - 2017
- [j3]Soohyung Kim, Hyukki Lee, Yon Dohn Chung:
Privacy-preserving data cube for electronic medical records: An experimental evaluation. Int. J. Medical Informatics 97: 33-42 (2017) - [j2]Hyukki Lee, Soohyung Kim, Jong Wook Kim, Yon Dohn Chung
:
Utility-preserving anonymization for health data publishing. BMC Medical Informatics Decis. Mak. 17(1): 104:1-104:12 (2017) - [c5]Zhe Jin
, Jung Yeon Hwang, Soohyung Kim, Sangrae Cho, Yen-Lung Lai, Andrew Beng Jin Teoh
:
A Cancellable Ranking Based Hashing Method for Fingerprint Template Protection. MONAMI 2017: 378-389 - [i1]Zhe Jin, Yen-Lung Lai, Jung Yeon Hwang, Soohyung Kim, Andrew Beng Jin Teoh:
A New and Practical Design of Cancellable Biometrics: Index-of-Max Hashing. CoRR abs/1703.05455 (2017) - 2016
- [c4]Jong-Hyuk Roh, Sung-Hun Lee, Soohyung Kim:
Keystroke dynamics for authentication in smartphone. ICTC 2016: 1155-1159 - 2015
- [c3]Jong-Hyuk Roh, Sung-Hun Lee, Soohyung Kim:
Anomaly detection of access patterns in database. ICTC 2015: 1112-1115 - 2014
- [j1]Soohyung Kim, Min Kyoung Sung, Yon Dohn Chung:
A framework to preserve the privacy of electronic health data streams. J. Biomed. Informatics 50: 95-106 (2014) - 2013
- [c2]Hyunsik Choi, Jihoon Son, Haemi Yang, Hyoseok Ryu, Byungnam Lim, Soohyung Kim, Yon Dohn Chung:
Tajo: A distributed data warehouse system on large clusters. ICDE 2013: 1320-1323
2000 – 2009
- 2006
- [c1]Myunggwon Hwang, Sunkyoung Baek, Hyunjang Kong, Juhyun Shin, Wonpil Kim, Soohyung Kim, Pankoo Kim:
Adaptive-Tangent Space Representation for Image Retrieval Based on Kansei. MICAI 2006: 828-837
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 02:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint