default search action
Inshil Doh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Gabin Heo, Inshil Doh:
Blockchain and differential privacy-based data processing system for data security and privacy in urban computing. Comput. Commun. 222: 161-176 (2024) - 2023
- [c37]Hyowon Kim, Inshil Doh:
Privacy Enhanced Federated Learning Utilizing Differential Privacy and Interplanetary File System. ICOIN 2023: 312-317 - 2022
- [j20]Gabin Heo, Kijoon Chae, Inshil Doh:
Hierarchical Blockchain-Based Group and Group Key Management Scheme Exploiting Unmanned Aerial Vehicles for Urban Computing. IEEE Access 10: 27990-28003 (2022) - [j19]Dana Yang, Inshil Doh, Kijoon Chae:
Cell Based Raft Algorithm for Optimized Consensus Process on Blockchain in Smart Data Market. IEEE Access 10: 85199-85212 (2022) - [c36]Oumayma Mejri, Dana Yang, Inshil Doh:
Cloud Security Issues and Log-based Proactive Strategy. ICACT 2022: 392-397 - 2021
- [j18]Gabin Heo, Dana Yang, Inshil Doh, Kijoon Chae:
Efficient and Secure Blockchain System for Digital Content Trading. IEEE Access 9: 77438-77450 (2021) - [j17]Dana Yang, Seohee Yoo, Inshil Doh, Kijoon Chae:
Selective blockchain system for secure and efficient D2D communication. J. Netw. Comput. Appl. 173: 102817 (2021) - [c35]Oumayma Mejri, Dana Yang, Inshil Doh:
Cloud Security Issues and Log-based Proactive Strategy. ICACT 2021: 392-397 - [c34]Donghee Kim, Inshil Doh, Kijoon Chae:
Improved Raft Algorithm exploiting Federated Learning for Private Blockchain performance enhancement. ICOIN 2021: 828-832 - 2020
- [j16]Nishat I. Mowla, Nguyen Hoang Tran, Inshil Doh, Kijoon Chae:
Federated Learning-Based Cognitive Detection of Jamming Attack in Flying Ad-Hoc Network. IEEE Access 8: 4338-4350 (2020) - [j15]Nishat I. Mowla, Nguyen Hoang Tran, Inshil Doh, Kijoon Chae:
AFRL: Adaptive federated reinforcement learning for intelligent jamming defense in FANET. J. Commun. Networks 22(3): 244-258 (2020) - [c33]Dana Yang, Sol Jeon, Inshil Doh, Kijoon Chae:
Randomly Elected Blockchain System based on Grouping Verifiers for Efficiency and Security. ICACT 2020: 159-165 - [c32]Gabin Heo, Dana Yang, Inshil Doh, Kijoon Chae:
Design of Blockchain System for Protection of Personal Information in Digital Content Trading Environment. ICOIN 2020: 152-157
2010 – 2019
- 2019
- [j14]Nishat I. Mowla, Inshil Doh, Kijoon Chae:
On-Device AI-Based Cognitive Detection of Bio-Modality Spoofing in Medical Cyber Physical System. IEEE Access 7: 2126-2137 (2019) - [c31]Nishat I. Mowla, Inshil Doh, Kijoon Chae:
SEFL: Selective Ensemble Fuzzy Learner for Cognitive Detection of Bio-Modality Spoofing in MCPS. ICACT 2019: 1153-1158 - [c30]Nishat I. Mowla, Inshil Doh, Kijoon Chae:
Binarized Multi-Factor Cognitive Detection of Bio-Modality Spoofing in Fog Based Medical Cyber-Physical System. ICOIN 2019: 43-48 - 2018
- [j13]Nishat I. Mowla, Inshil Doh, Kijoon Chae:
CSDSM: Cognitive switch-based DDoS sensing and mitigation in SDN-driven CDNi word. Comput. Sci. Inf. Syst. 15(1): 163-185 (2018) - [c29]Nishat I. Mowla, Inshil Doh, Kijoon Chae:
Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS. ICACT 2018: 63-67 - [c28]Chae-Eun Lee, Inn-chae Yeo, Inshil Doh:
Customized embedded system design for lower limb rehabilitation patients. ICACT 2018: 229-233 - [c27]Dana Yang, Inshil Doh, Kijoon Chae:
Secure medical image-sharing mechanism based on visual cryptography in EHR system. ICACT 2018: 463-467 - [c26]Shi Li, Inshil Doh, Kijoon Chae:
NRIT: Non-redundant indirect trust search algorithm for a cross-domain based CDNi-P2P architecture. ICACT 2018: 992-998 - [c25]Nishat I. Mowla, Inshil Doh, Kijoon Chae:
Evolving neural network intrusion detection system for MCPS. ICACT 2018: 1040-1045 - [c24]Seohee You, Dana Yang, Inshil Doh, Kijoon Chae:
Authorization based on mobile whitelist in devices for device-to-device communications. ICOIN 2018: 706-711 - [c23]Sol Jeon, Inshil Doh, Kijoon Chae:
RMBC: Randomized mesh blockchain using DBFT consensus algorithm. ICOIN 2018: 712-717 - [c22]Jiyoung Lim, Inshil Doh, Kijoon Chae:
Dynamic Group Key Management for Efficient Fog Computing. IMIS 2018: 685-694 - 2017
- [j12]Jiyoung Lim, Inshil Doh, Kijoon Chae:
Secure and structured IoT smart grid system management. Int. J. Web Grid Serv. 13(2): 170-185 (2017) - [c21]Dana Yang, Inshil Doh, Kijoon Chae:
Enhanced password processing scheme based on visual cryptography and OCR. ICOIN 2017: 254-258 - [c20]Jiyoung Lim, Inshil Doh, Kijoon Chae:
Lightweight Authentication for Distributed Mobile P2P Communications. IMIS 2017: 580-589 - [c19]YeJi Kang, Doyeon Jung, Inshil Doh:
Automated parking lot management system using embedded robot type smart car based on wireless sensors. ITNAC 2017: 1-6 - 2016
- [j11]Jiyoung Lim, Inshil Doh, Kijoon Chae:
Security system architecture for data integrity based on a virtual smart meter overlay in a smart grid system. Soft Comput. 20(5): 1829-1840 (2016) - [c18]Shi Li, Inshil Doh, Kijoon Chae:
An anonymous IP-based privacy protection routing mechanism for CDNi. ICOIN 2016: 75-80 - [c17]Nishat I. Mowla, Inshil Doh, Kijoon Chae:
Securing information flow in content delivery networks with visual and quantum cryptography. ICOIN 2016: 463-468 - [c16]Jiyoung Lim, Inshil Doh, Kijoon Chae:
Authentication for Mobile Open IPTV Service Security. IMIS 2016: 381-385 - [c15]Shi Li, Inshil Doh, Kijoon Chae:
A Group Authentication Scheme Based on Lagrange Interpolation Polynomial. IMIS 2016: 386-391 - 2015
- [j10]Inshil Doh, Kijoon Chae, Jiyoung Lim, Min Young Chung:
Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security. Intell. Autom. Soft Comput. 21(4): 543-558 (2015) - [j9]Bum-Gon Choi, Inshil Doh, Min Young Chung:
Radio Resource Management Scheme for Relieving Interference to MUEs in Relay-Based Cellular Networks. IEEE Trans. Veh. Technol. 64(7): 3018-3029 (2015) - [c14]Nishat I. Mowla, Inshil Doh, Kijoon Chae:
An efficient defense mechanism for spoofed IP attack in SDN based CDNi. ICOIN 2015: 92-97 - [c13]Shi Li, Inshil Doh, Kijoon Chae:
Key management mechanism in ALTO/SDN based CDNi architecture. ICOIN 2015: 110-115 - [c12]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Secure Authentication for Structured Smart Grid System. IMIS 2015: 200-204 - 2014
- [j8]Inshil Doh, Jiyoung Lim, Shi Li, Kijoon Chae:
Pairwise and group key setup mechanism for secure machine-to-machine communication. Comput. Sci. Inf. Syst. 11(3): 1071-1090 (2014) - [j7]Yunjeong Choi, Inshil Doh:
Hierarchical Aggregation of Uncertain Sensor Data for M2M Wireless Sensor Network Using Reinforcement Learning. Int. J. Distributed Sens. Networks 10 (2014) - [c11]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Service Security for Smart Grid System. IMIS 2014: 427-432 - [c10]Nishat I. Mowla, Inshil Doh, Kijoon Chae:
Multi-defense Mechanism against DDoS in SDN Based CDNi. IMIS 2014: 447-451 - 2013
- [j6]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Key management approach for secure mobile open IPTV service. Comput. Sci. Inf. Syst. 10(2): 843-864 (2013) - [j5]Jun Suk Kim, Bum-Gon Choi, Sueng Jae Bae, Inshil Doh, Min Young Chung:
Adaptive time division duplexing configuration mode selection mechanism for accommodating asymmetric traffic in time division long term evolution-advanced systems. Trans. Emerg. Telecommun. Technol. 24(3): 342-351 (2013) - [j4]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Code updates based on minimal backbone and group key management for secure sensor networks. Math. Comput. Model. 57(11-12): 2801-2813 (2013) - [c9]Inshil Doh, Jiyoung Lim, Shi Li, Kijoon Chae:
Key Establishment and Management for Secure Cellular Machine-to-Machine Communication. IMIS 2013: 579-584 - [c8]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Secure Aggregation and Attack Detection for Smart Grid System. NBiS 2013: 270-275 - 2012
- [c7]Jun Suk Kim, Inshil Doh, Bum-Gon Choi, Min Young Chung:
Downlink scheduling scheme based on estimation of channel quality at the crossed timeslot for effective resource allocation in LTE-advanced system. ICUIMC 2012: 32:1-32:6 - [c6]Inshil Doh, Jiyoung Lim, Min Young Chung:
Group Key Management for Secure Mobile IPTV Service. IMIS 2012: 352-357 - [c5]Inshil Doh, Kijoon Chae, Jiyoung Lim, Min Young Chung:
An Improved Security Approach Based on Kerberos for M2M Open IPTV System. NBiS 2012: 754-759 - 2011
- [j3]Inshil Doh, Jiyoung Lim, Kijoon Chae:
Distributed authentication mechanism for secure channel establishment in ubiquitous medical sensor networks. Mob. Inf. Syst. 7(3): 189-200 (2011)
2000 – 2009
- 2009
- [j2]Hayoung Oh, Inshil Doh, Kijoon Chae:
Attack Classification Based on Data Mining Technique and Its Application for Reliable Medical Sensor Communication. Int. J. Comput. Sci. Appl. 6(3): 20-32 (2009) - [j1]Hayoung Oh, Inshil Doh, Kijoon Chae:
A Fault Management and Monitoring Mechanism for Secure Medical Sensor Network. Int. J. Comput. Sci. Appl. 6(3): 43-56 (2009) - 2006
- [c4]Inshil Doh, Kijoon Chae:
Key Establishment and Authentication Mechanism for Secure Sensor Networks. APWeb Workshops 2006: 335-344 - [c3]Inshil Doh, Jung Min Park, Kijoon Chae:
Pairwise Key Setup and Authentication Utilizing Deployment Information for Secure Sensor Network. HPCC 2006: 280-289 - [c2]Inshil Doh, Kijoon Chae, Howon Kim, Kyoil Chung:
Security Enhancement Mechanism for Ad-Hoc OLSR Protocol. ICOIN 2006: 317-326 - [c1]Mihui Kim, Inshil Doh, Kijoon Chae:
A Key Management Based on Multiple Regression in Hierarchical Sensor Network. WISA 2006: 267-281 - 2005
- [p1]Inshil Doh, Hayoung Oh, Kijoon Chae:
Cluster-based Security Mechanism for Sensor Network Communication. New Trends in Computer Networks 2005
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint