


default search action
Changho Seo
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j48]Hyunju Kim, Woosang Im, Sooyong Jeong, Hyunil Kim, Changho Seo, Chanku Kang:
Recovery for secret key in CTIDH-512 through Fault Injection Attack. Comput. Electr. Eng. 123: 110057 (2025) - 2024
- [j47]Eunmok Yang
, K. Shankar
, Eswaran Perumal, Changho Seo
:
Optimal Fuzzy Logic Enabled EEG Motor Imagery Classification for Brain Computer Interface. IEEE Access 12: 46002-46011 (2024) - [i2]Minyeong Choe, Cheolhee Park, Changho Seo, Hyunil Kim:
SDBA: A Stealthy and Long-Lasting Durable Backdoor Attack in Federated Learning. CoRR abs/2409.14805 (2024) - 2022
- [j46]Neelamegam Anbazhagan
, Srijana Acharya
, V. Vinitha
, S. Amutha
, K. Jeganathan, Changho Seo
, Hyunil Kim
:
The MAP/PH/N/∞ Queueing-Inventory System With Demands From a Random Environment. IEEE Access 10: 47371-47383 (2022) - [j45]Cheolhee Park, Dowon Hong
, Changho Seo:
Evaluating differentially private decision tree model over model inversion attack. Int. J. Inf. Sec. 21(3): 1-14 (2022) - [c4]Changho Seo, Yunchang Chae, Jaeryun Lee, Euiseong Seo, Byungchul Tak:
NoSQL Database Performance Diagnosis through System Call-level Introspection. NOMS 2022: 1-9 - [i1]Lam Tran, Thuc Nguyen, Changho Seo, Hyunil Kim, Deokjai Choi:
A Survey on Password Guessing. CoRR abs/2212.08796 (2022) - 2021
- [j44]Cheolhee Park, Youngsoo Kim, Jong-Geun Park
, Dowon Hong
, Changho Seo
:
Evaluating Differentially Private Generative Adversarial Networks Over Membership Inference Attack. IEEE Access 9: 167412-167425 (2021) - [j43]Sudan Jha
, Changho Seo, Eunmok Yang
, Gyanendra Prasad Joshi
:
Real time object detection and trackingsystem for video surveillance system. Multim. Tools Appl. 80(3): 3981-3996 (2021) - [j42]Sooyong Jeong
, Cheolhee Park
, Dowon Hong
, Changho Seo
, Nam-Su Jho
:
Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems. Secur. Commun. Networks 2021: 6680782:1-6680782:12 (2021) - 2020
- [j41]Sun-Mi Park
, Ku-Young Chang
, Dowon Hong
, Changho Seo
:
Space Efficient $GF(2^m)$ Multiplier for Special Pentanomials Based on $n$ -Term Karatsuba Algorithm. IEEE Access 8: 27342-27360 (2020) - [j40]Irina Valeryevna Pustokhina
, Denis Alexandrovich Pustokhin
, Joel J. P. C. Rodrigues
, Deepak Gupta
, Ashish Khanna
, K. Shankar
, Changho Seo
, Gyanendra Prasad Joshi
:
Automatic Vehicle License Plate Recognition Using Optimal K-Means With Convolutional Neural Network for Intelligent Transportation Systems. IEEE Access 8: 92907-92917 (2020) - [j39]V. Porkodi, A. Robert Singh
, Abdul Rahaman Wahab Sait
, K. Shankar
, Eunmok Yang
, Changho Seo
, Gyanendra Prasad Joshi
:
Resource Provisioning for Cyber-Physical-Social System in Cloud-Fog-Edge Computing Using Optimal Flower Pollination Algorithm. IEEE Access 8: 105311-105319 (2020) - [j38]Sun-Mi Park
, Ku-Young Chang
, Dowon Hong
, Changho Seo
:
Efficient Bit-Parallel Multiplier for All Trinomials Based on n-Term Karatsuba Algorithm. IEEE Access 8: 173491-173507 (2020) - [j37]Gyanendra Prasad Joshi
, Sudan Jha
, Seongsoo Cho, Changho Seo, Le Hoang Son, Pham Huy Thong:
Influence of multimedia and seating location in academic engagement and grade performance of students. Comput. Appl. Eng. Educ. 28(2): 268-281 (2020) - [j36]Jimmy Singla
, Balwinder Kaur, Deepak Prashar, Sudan Jha
, Gyanendra Prasad Joshi
, Kyungyun Park
, Usman Tariq
, Changho Seo
:
A Novel Fuzzy Logic-Based Medical Expert System for Diagnosis of Chronic Kidney Disease. Mob. Inf. Syst. 2020: 8887627:1-8887627:13 (2020) - [j35]Deepak Prashar
, Nishant Jha
, Sudan Jha
, Gyanendra Prasad Joshi
, Changho Seo:
Integrating IoT and Blockchain for Ensuring Road Safety: An Unconventional Approach. Sensors 20(11): 3296 (2020) - [j34]Jin-Woo Kim, Eunmok Yang
, Jonghun Kim, Changho Seo:
A novel multi-channel MAC protocol for cluster tree based wireless USB networks. Wirel. Networks 26(3): 2191-2206 (2020) - [c3]Khadak Singh Bhandari, Changho Seo, Gi Hwan Cho:
Towards Sensor-Cloud Based Efficient Smart Healthcare Monitoring Framework using Machine Learning. SMA 2020: 380-383
2010 – 2019
- 2019
- [j33]Sun-Mi Park, Ku-Young Chang, Dowon Hong
, Changho Seo:
Low Space Complexity $GF(2^m)$ Multiplier for Trinomials Using $n$ -Term Karatsuba Algorithm. IEEE Access 7: 27047-27064 (2019) - [j32]Cheolhee Park
, Dowon Hong
, Changho Seo
:
An Attack-Based Evaluation Method for Differentially Private Learning Against Model Inversion Attack. IEEE Access 7: 124988-124999 (2019) - [j31]Hyunil Kim, Seung-Hyun Kim
, Jung Yeon Hwang, Changho Seo
:
Efficient Privacy-Preserving Machine Learning for Blockchain Network. IEEE Access 7: 136481-136495 (2019) - [j30]Seongsoo Cho, Bhanu Shrestha
, Wook Jang, Changho Seo:
Trajectory tracking optimization of mobile robot using artificial immune system. Multim. Tools Appl. 78(3): 3203-3220 (2019) - 2018
- [j29]Kyungroul Lee
, Sun-Young Lee, Changho Seo, Kangbin Yim:
TRNG (True Random Number Generator) Method Using Visible Spectrum for Secure Communication on 5G Network. IEEE Access 6: 12838-12847 (2018) - [j28]Deukjo Hong
, Bonwook Koo, Changho Seo:
Differential property of Present-like structure. Discret. Appl. Math. 241: 13-24 (2018) - [j27]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Efficient Three-Way Split Formulas for Binary Polynomial Multiplication and Toeplitz Matrix Vector Product. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 239-248 (2018) - [j26]Hyungkyu Lee, Younho Lee
, Changho Seo, Hyunsoo Yoon:
Efficient Approach for Mitigating Mobile Phishing Attacks. IEICE Trans. Commun. 101-B(9): 1982-1996 (2018) - [j25]Ku-Young Chang, Sun-Mi Park, Dowon Hong, Changho Seo:
Efficient multiplier based on hybrid approach for Toeplitz matrix-vector product. Inf. Process. Lett. 131: 33-38 (2018) - [j24]Cheolhee Park
, Hyunil Kim
, Dowon Hong
, Changho Seo
:
A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments. Secur. Commun. Networks 2018: 2193897:1-2193897:16 (2018) - [j23]Sun-Mi Park
, Ku-Young Chang, Dowon Hong
, Changho Seo:
Subquadratic Space Complexity Multiplier Using Even Type GNB Based on Efficient Toeplitz Matrix-Vector Product. IEEE Trans. Computers 67(12): 1794-1805 (2018) - [j22]Amjad Ali Alamr, Firdous Kausar
, Jongsung Kim, Changho Seo:
A secure ECC-based RFID mutual authentication protocol for internet of things. J. Supercomput. 74(9): 4281-4294 (2018) - [j21]Jin-Woo Kim, Jeong Hyun Yi, Changho Seo:
Distributed quality of service routing protocol for multimedia traffic in WiMedia networks. Wirel. Networks 24(8): 2835-2849 (2018) - 2017
- [j20]Seongsoo Cho, Jeong Hyun Yi, Bhanu Shrestha, Changho Seo:
Multipath routing technique for responding to sniffing attacks in wireless multimedia sensor network environment. Int. J. Sens. Networks 24(3): 200-207 (2017) - [j19]Sun-Mi Park, Ku-Young Chang, Dowon Hong
, Changho Seo:
New Block Recombination for Subquadratic Space Complexity Polynomial Multiplication Based on Overlap-Free Approach. IEEE Trans. Computers 66(8): 1396-1406 (2017) - 2016
- [j18]Suwan Park, Changho Seo, Jeong Hyun Yi
:
Cyber threats to mobile messenger apps from identity cloning. Intell. Autom. Soft Comput. 22(3): 379-387 (2016) - [j17]Sun-Mi Park, Ku-Young Chang, Dowon Hong
, Changho Seo:
Efficient Multiplication Based on Dickson Bases over Any Finite Fields. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(11): 2060-2074 (2016) - [j16]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Explicit formulae for Mastrovito matrix and its corresponding Toeplitz matrix for all irreducible pentanomials using shifted polynomial basis. Integr. 53: 27-38 (2016) - [j15]Hyejoo Lee, Suwan Park, Changho Seo, Sang-Uk Shin:
DRM cloud framework to support heterogeneous digital rights management systems. Multim. Tools Appl. 75(22): 14089-14109 (2016) - [j14]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Comments on "Multiway Splitting Method for Toeplitz Matrix Vector Product". IEEE Trans. Computers 65(1): 332-333 (2016) - [j13]Nam-Su Jho, Ku-Young Chang, Dowon Hong, Changho Seo:
Symmetric searchable encryption with efficient range query using multi-layered linked chains. J. Supercomput. 72(11): 4233-4246 (2016) - 2015
- [j12]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Generalization to Any Field of Toeplitz Matrix Vector Product Based on Multi-Way Splitting Method and Its Application. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 378-383 (2015) - [j11]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Low Complexity Multiplier Based on Dickson Basis Using Efficient Toeplitz Matrix-Vector Product. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(11): 2283-2290 (2015) - [c2]Hyejoo Lee, Hyunil Kim, Changho Seo, Sang-Uk Shin:
Framework of Service Accountability and Policy Representation for Trustworthy Cloud Services. CSA/CUTE 2015: 437-443 - 2014
- [j10]Sun-Mi Park, Ku-Young Chang, Dowon Hong
, Changho Seo:
Bit-Parallel Cubing Computation over GF(3m) for Irreducible Trinomials. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 347-353 (2014) - [j9]Taejin Kim, Jeong Hyun Yi
, Changho Seo:
Spyware Resistant Smartphone User Authentication Scheme. Int. J. Distributed Sens. Networks 10 (2014) - [j8]Sun-Mi Park, Ku-Young Chang, Dowon Hong
, Changho Seo:
New efficient bit-parallel polynomial basis multiplier for special pentanomials. Integr. 47(1): 130-139 (2014) - [j7]Sun-Mi Park, Ku-Young Chang, Dowon Hong
, Changho Seo:
Comments on "On the Polynomial Multiplication in Chebyshev Form". IEEE Trans. Computers 63(12): 3162-3163 (2014) - 2013
- [j6]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Fast Bit-Parallel Polynomial Basis Multiplier for GF(2m) Defined by Pentanomials Using Weakly Dual Basis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 322-331 (2013) - [j5]Hyejoo Lee, Changho Seo, Sang-Uk Shin:
DRM Cloud Architecture and Service Scenario for Content Protection. J. Internet Serv. Inf. Secur. 3(3/4): 94-105 (2013) - [j4]Youngho Park, Chul Sur, Sang-Uk Shin, Kyung Hyune Rhee, Changho Seo:
A Privacy Preserving Message Delivery Protocol Using Identity-Hidden Index in VDTNs. J. Univers. Comput. Sci. 19(16): 2385-2403 (2013) - [c1]Chul Sur, Youngho Park, Sang-Uk Shin, Kyung Hyune Rhee, Changho Seo:
Certificate-Based Proxy Re-encryption for Public Cloud Storage. IMIS 2013: 159-166
2000 – 2009
- 2000
- [j3]Changho Seo, Keunhee Han, Yeoulouk Sung, Hichun Eun:
On the relationships between fuzzy equivalence relations and fuzzy difunctional relations, and their properties. Fuzzy Sets Syst. 109(3): 459-462 (2000) - [j2]Changho Seo, Sangjin Lee, Yeoulouk Sung, Keunhee Han, Sangchoon Kim:
A lower bound on the linear span of an FCSR. IEEE Trans. Inf. Theory 46(2): 691-693 (2000)
1990 – 1999
- 1995
- [j1]Changho Seo, Jongin Lim, Hichum Eun:
On Comparison and Analysis of Algorithms for Multiplication in GF(2^m). J. Comput. Syst. Sci. 51(3): 456-459 (1995)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-15 01:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint