Changhoon Lee

ORCID: 0000-0003-4292-5792
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptographic Implementations and Security
  • Chaos-based Image/Signal Encryption
  • Advanced Malware Detection Techniques
  • Educational Research and Pedagogy
  • Coding theory and cryptography
  • Education and Learning Interventions
  • Digital and Cyber Forensics
  • Educational Systems and Policies
  • Agriculture, Soil, Plant Science
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Network Security and Intrusion Detection
  • Internet of Things and Social Network Interactions
  • Technology and Data Analysis
  • Education, Safety, and Science Studies
  • Innovation in Digital Healthcare Systems
  • Soil Carbon and Nitrogen Dynamics
  • Speech and Audio Processing
  • Consumer Perception and Purchasing Behavior
  • Ecology and Conservation Studies
  • Advanced Authentication Protocols Security
  • Video Surveillance and Tracking Methods
  • Aquaculture Nutrition and Growth
  • Cloud Data Security Solutions
  • Digital Media Forensic Detection
  • Insect and Pesticide Research

Seoul National University of Science and Technology
2015-2024

Chungnam National University
2020-2024

National Institute of Agricultural Science and Technology
2016-2024

Chonnam National University
2018-2024

Eastern Regional Research Center
2022

Agricultural Research Service
2022

Pohang University of Science and Technology
2016-2022

Sungkyunkwan University
2013-2020

American Society For Engineering Education
2020

Korea Astronomy and Space Science Institute
2003-2019

10.1016/j.camwa.2009.12.033 article EN publisher-specific-oa Computers & Mathematics with Applications 2010-01-19

Intertwining smart manufacturing and the Internet of Things (IoT) is known as Industrial (IIoT). IIoT improves product quality reliability requires intelligent connection, real-time data processing, collaborative monitoring, automatic information processing. Recently, it has been increasingly deployed; however, multi-party processing often required in heterogeneous IIoT. The security efficiency requirements each party interacting with other partners have become a significant challenge...

10.3390/app13031440 article EN cc-by Applied Sciences 2023-01-21

The proliferation of various connected platforms, including Internet things, industrial control systems (ICSs), cars, and in-vehicle networks, has resulted in the simultaneous use multiple protocols devices. Chaotic situations caused by usage different types devices, such as heterogeneous implemented differently vendors renders adoption a flexible security solution difficult, recent deep learning-based intrusion detection system (IDS) studies. These studies optimized learning model for their...

10.3390/electronics9071151 article EN Electronics 2020-07-16

Healthcare applications store private user data on cloud servers and perform computation operations that support several patient diagnoses. Growing cyber-attacks hospital systems result in being held at ransom. Furthermore, mathematical stored the Cloud are exposed to untrusted external entities sell for financial gain. In this paper, we propose a privacy-preserving scheme using homomorphic encryption secure medical plaintext from accessed by attackers. Secret sharing distributes...

10.3390/app11188757 article EN cc-by Applied Sciences 2021-09-20

The convergence of fifth-generation (5G) communication and the Internet-of-Things (IoT) has dramatically increased diversity complexity network. This change diversifies attacker’s attack vectors, increasing impact damage cyber threats. Cyber threat intelligence (CTI) technology is a proof-based security system which responds to these advanced threats proactively by analyzing sharing security-related data. However, performance CTI systems can be significantly compromised creating...

10.3390/electronics9030521 article EN Electronics 2020-03-21

Color information plays an important role in the color image segmentation and real-time sensor, which affects result of video correct temperature value. In this paper, a novel method is proposed, based on similarity RGB space. According to luminance space, dominant determined at first, then can be calculated with proposed calculation component, creates color-class map. Next, corresponding map utilized classify pixels. Due characteristic that thermal inks feature values change real time as...

10.1186/s13640-018-0258-x article EN cc-by EURASIP Journal on Image and Video Processing 2018-04-04

Advanced information technologies have transformed into high-level services for more efficient use of energy resources through the fusion with infrastructure. As a part these technologies, cloud is technology that maximizes efficiency organic connection between entities produce and consume energy. However, disruption or destruction systems cyberattacks can lead to incidents such as massive blackouts, which national disasters. Furthermore, since technique severity modern continue improve,...

10.3390/electronics10030239 article EN Electronics 2021-01-21

우리나라 논토양의 토양화학성을 4년 1주기로 정점조사하여 1999부터 2011년까지의 변화를 평가하였다. 2011년 화학성 중 측정 평균값은 토양 pH가 5.7, 유기물함량은 <TEX>$26.0g\;kg^{-1}$</TEX>, 유효인산 함량은 <TEX>$131mg\;kg^{-1}$</TEX>을 나타냈다. 치환성 칼륨, 칼슘, 마그네슘 각각 0.3, 5.1, <TEX>$1.25cmol_c\;kg^{-1}$</TEX>이었고, 유효규산 <TEX>$146mg\;kg^{-1}$</TEX>이었다. 적정범위 상한기준을 1.1배 초과하였고, 마그네슘과 하한기준의 80%와 92% 수준이었다. 평균값이 증가한 항목 과다와 적정범위의 비율도 증가하는 경향을 보였고, 적정범위보다 낮음의 비율은 감소하였다. 유효인산과 치환성칼륨 및 함량의 과다 다소 감소하고 부족비율은 보였다. 따라서 양분과다 경지에 대하여는 토양검정에 의한 적정시비량을 준수하고, 규산질비료나 퇴비 등을 경지보다는 부족한 경지로...

10.7745/kjssf.2012.45.6.968 article EN Korean Journal of Soil Science and Fertilizer 2012-12-31

Cyber attacks are evolving commensurate with recent developments in information security technology.Intrusion detection systems collect various types of data from computers and networks to detect threats analyze the attack information.The large amount examined make number computations low rates problematic.Feature selection is expected improve classification performance provide faster more cost-effective results.Despite feature studies conducted for intrusion systems, it difficult automate...

10.3837/tiis.2017.10.024 article EN KSII Transactions on Internet and Information Systems 2017-10-31

Cyber-threat intelligence (CTI) is a knowledge-based threat management system that addresses increasing cyber threats. The CTI creates reputation information for network resources such as IP, URL, and file hash-based on security data collected from event (SIEM) systems. This can be applied extensively in industrial infrastructures to provide an effective response process attacks. also the systems of internal IT OT Internet objects (IoT) Surveillance Control Data Acquisition (SCADA) networks....

10.1109/tii.2018.2857213 article EN IEEE Transactions on Industrial Informatics 2018-07-18

Recently, differential-neural cryptanalysis, which combines deep learning with differential has gained attention as a powerful and practical cryptanalysis method. In this approach, neural distinguisher is trained to distinguish the target cipher specific properties from other ciphers, its statistical analysis used guess key. This approach offers advantage of enabling analyze cryptographic properties, traditionally demanding substantial time expertise. Nevertheless, black-box nature models...

10.1109/tdsc.2024.3387662 article EN IEEE Transactions on Dependable and Secure Computing 2024-01-01

A novel analysis and design method for affine fuzzy systems is proposed. Both continuous-time discrete-time cases are considered. The quadratic stability stabilizability conditions of the derived they represented in formulation bilinear matrix inequalities (BMIs). Two diffeomorphic state transformations (one linear other nonlinear) introduced to convert plant into more tractable form. conversion makes problems convex solvable directly by inequality (LMI) technique. bias terms controller...

10.1109/tfuzz.2004.836074 article EN IEEE Transactions on Fuzzy Systems 2005-02-01
Coming Soon ...