Hong, Dowon
114  Ergebnisse:
Personensuche X
?
2

An Enhanced AI-Based Network Intrusion Detection System Usi..:

Park, Cheolhee ; Lee, Jonghoon ; Kim, Youngsoo...
IEEE Internet of Things Journal.  10 (2023)  3 - p. 2330-2345 , 2023
 
?
3

Neural Cryptography Based on Generalized Tree Parity Machin..:

Jeong, Sooyong ; Park, Cheolhee ; Hong, Dowon...
Security and Communication Networks.  2021 (2021)  - p. 1-12 , 2021
 
?
5

Evaluating differentially private decision tree model over ..:

Park, Cheolhee ; Hong, Dowon ; Seo, Changho
International Journal of Information Security.  21 (2021)  3 - p. 1-14 , 2021
 
?
9

A Symmetric Key Based Deduplicatable Proof of Storage for E..:

Park, Cheolhee ; Kim, Hyunil ; Hong, Dowon.
Security and Communication Networks.  2018 (2018)  - p. 1-16 , 2018
 
?
10

Efficient Three-Way Split Formulas for Binary Polynomial Mu..:

PARK, Sun-Mi ; CHANG, Ku-Young ; HONG, Dowon.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.  E101.A (2018)  1 - p. 239-248 , 2018
 
?
 
?
12

Subquadratic Space Complexity Multiplier Using Even Type GN..:

Park, Sun-Mi ; Chang, Ku-Young ; Hong, Dowon.
IEEE Transactions on Computers.  67 (2018)  12 - p. 1794-1805 , 2018
 
?
13

New Block Recombination for Subquadratic Space Complexity P..:

Park, Sun-Mi ; Chang, Ku-Young ; Hong, Dowon.
IEEE Transactions on Computers.  66 (2017)  8 - p. 1396-1406 , 2017
 
?
15

Efficient Multiplication Based on Dickson Bases over Any Fi..:

PARK, Sun-Mi ; CHANG, Ku-Young ; HONG, Dowon.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.  E99.A (2016)  11 - p. 2060-2074 , 2016
 
1-15