Int. Journal Articles

Accepted Papers

  1. Jong-Hyouk Lee and Kamal Singh, “SwitchTree: In-Network Computing and Traffic Analyses with Random Forests”, Neural Computing and Applications, DOI: 10.1007/s00521-020-05440-2, November 2020.
  2. Mohammad Wazid, Ashok Kumar Das, and Jong-Hyouk Lee, “Authentication Protocols for the Internet of Drones: Taxonomy, Analysis and Future Directions”, Journal of Ambient Intelligence and Humanized Computing, DOI: 10.1007/s12652-018-1006-x, August 2018.

2024

  1. Soonhong Kwon, Jaehyoung Park, Taeyang Lee, SungHeun Oh, and Jong-Hyouk Lee, “Decentralized identifier based illegal digital content distribution tracking system using the format-preserving encryption algorithm”, Software: Practice and Experience, vol. 54, no. 7, pp. 1275-1293, July 2024.
  2. Dongjie Liu and Jong-Hyouk Lee, “A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites”, Journal of Network and Systems Management, vol. 32, no. 1, pp. 8, January 2024.
  3. Wooyoung Son, Soonhong Kwon, Sungheun Oh and Jong-Hyouk Lee, “Automated Over-the-Top Service Copyright Distribution Management System Using the Open Digital Rights Language”, Electronics, vol. 13, no. 2, pp. 336, January 2024.

2023

  1. Anusha Vangala, Ashok Kumar Das, and Jong-Hyouk Lee, “Provably secure signature-based anonymous user authentication protocol in an Internet of Things-enabled intelligent precision agricultural environment”, Concurrency and Computation: Practice and Experience, vol. 35, no. 16, e6187, July 2023.
  2. Haneul Lee, Soonhong Kwon and Jong-Hyouk Lee, “Experimental Analysis of Security Attacks for Docker Container Communications”, Electronics, vol. 12, no. 4, pp. 940, February 2023.
  3. Jaehyoung Park, Jihye Kim, Jiyou Seo, Sangpil Kim and Jong-Hyouk Lee, “DNN-Based Forensic Watermark Tracking System for Realistic Content Copyright Protection”, Electronics, vol. 12, no. 3, pp. 553, January 2023.

2022

  1. Dongjie Liu and Jong-Hyouk Lee, “CFLedger: Preventing Chargeback Fraud with Blockchain”, ICT Express, vol. 8, no. 3, pp. 352-356, September 2022.
  2. Yeonjoo Lim, Jong-Hyouk Lee, “Container-based Service Relocation for Beyond 5G Networks”, Journal of Internet Technology, vol. 23, no. 4 , pp. 911-918, July 2022.

2021

  1. Soonhong Kwon, Sang-Jin Son, Yangseo Choi, and Jong-Hyouk Lee, “Protocol Fuzzing to find security vulnerabilities of RabbitMQ”, Concurrency and Computation: Practice and Experience, vol. 33, no. 23(e6012), December 2021.
  2. Zhiwei Yan and Jong-Hyouk Lee, “BGPChain: Constructing a secure, smart, and agile routing infrastructure based on blockchain”, ICT Express, vol. 7, no. 3, pp. 376-379, September 2021.
  3. Jong-Hyouk Lee, Zhiwei Yan, and Xinchang Zhang, “Optimized video content delivery for mobile networks using the transformative computing model”, Applied Soft Computing, vol. 107(107477), August 2021.
  4. Inam Ullah, Siyu Qian, Zhixiang Deng, Jong-Hyouk Lee, “Extended Kalman Filter-based localization algorithm by edge computing in Wireless Sensor Networks”, Digital Communications and Networks, vol. 7, pp. 187-195, May 2021.

2020

  1. Zhiwei Yan and Jong-Hyouk Lee, “The road to DNS privacy”, Future Generation Computer Systems, vol. 112, pp. 604-611, November 2020.
  2. K. Vivekananda Bhat, Ashok Kumar Das, and Jong-Hyouk Lee, “Design of a blind quantization based audio watermarking scheme using singular value decomposition”, Concurrency and Computation: Practice and Experience, vol. 32, no. 18(e5253), September 2020.
  3. Sein Myung, Jong-Hyouk Lee, “Ethereum smart contract-based automated power trading algorithm in a microgrid environment”, Journal of Supercomputing, vol. 76, no. 7, pp. 4904-4914, July 2020.
  4. Shijie Zhang and Jong-Hyouk Lee, “Analysis of the main consensus protocols of blockchain”, ICT Express, vol. 6, no. 2, pp. 93-97, June 2020.
  5. Dongjie Liu and Jong-Hyouk Lee, “CNN Based Malicious Website Detection by Invalidating Multiple Web Spams”, IEEE Access, vol. 8, pp. 97258-97266, May 2020.
  6. Shijie Zhang and Jong-Hyouk Lee, “Mitigations on Sybil-Based Double-Spend Attacks in Bitcoin”, IEEE Consumer Electronics Magazine, vol. 10, no. 5, pp. 23-28, May 2020.
  7. Shijie Zhang and Jong-Hyouk Lee, “A Group Signature and Authentication Scheme for Blockchain-Based Mobile-Edge Computing”, IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4557-4565, May 2020.
  8. Soonhong Kwon and Jong-Hyouk Lee, “DIVDS: Docker Image Vulnerability Diagnostic System”, IEEE Access, vol. 8, pp. 42666-42673, March 2020.
  9. Seoyun Choi and Jong-Hyouk Lee, “Blockchain-based Distributed Firmware Update Architecture for IoT Devices”, IEEE Access, vol. 8, pp. 37518-37525, February 2020.

2019

  1. K. Vivekananda Bhat, Ashok Kumar Das, and Jong-Hyouk Lee, “A Mean Quantization Watermarking Scheme for Audio Signals Using Singular-Value Decomposition”, IEEE Access, vol. 7, pp. 157480-157488, October 2019.
  2. Shijie Zhang and Jong-Hyouk Lee, “Double-spending with a Sybil Attack in the Bitcoin Decentralized Network”, IEEE Transactions on Industrial Informatics, vol. 15, no. 10, pp. 5715-5722, October 2019. (IF: 7.377(2018), SCIE)
  3. Jong-Hyouk Lee, “Rise of Anonymous Cryptocurrencies: Brief Introduction”, IEEE Consumer Electronics Magazine, vol. 8, no. 5, pp. 20-25, September 2019. (IF: 3.273(2018), SCIE)
  4. Shijie Zhang and Jong-Hyouk Lee, “Smart Contract-based Secure Model for Miner Registration and Block Validation”, IEEE Access, vol. 7, pp. 132087-132094, September 2019.
  5. Wanting Li, Jian Jin, and Jong-Hyouk Lee, “Analysis of Botnet Domain Names for IoT Cybersecurity”, IEEE Access, vol. 7, pp. 94658-94665, July 2019.
  6. Zhiwei Yan and Jong-Hyouk Lee, “Mobility Capability Negotiation for IPv6 based Ubiquitous Mobile Internet”, Computer Networks, vol. 157, pp. 24-28, July 2019.
  7. Mohammad Wazid, Ashok Kumar Das, and Jong-Hyouk Lee, “User Authentication in a Tactile Internet Based Remote Surgery Environment: Security Issues, Challenges, and Future Research Directions”, Pervasive and Mobile Computing, vol. 54, pp. 71-85, March 2019.

2018

  1. Sungbum Lee and Jong-Hyouk Lee, “TEE based Session Key Establishment Protocol for Secure Infotainment Systems”, Design Automation for Embedded Systems, vol. 22, no. 3, pp 215–224, September 2018. (IF: 0.516(2017), SCIE)
  2. Sarang Wi and Jong-Hyouk Lee, “Group Key Based Session Key Establishment Protocol for a Secure Remote Vehicle Diagnosis”, Journal of Internet Technology, vol. 19, no. 3, pp. 633-640, May 2018. (IF: 1.930(2016), SCIE)
  3. Kashif Munir, Ehtesham Zahoor, Rafia Rahim, Xavier Lagrange, and Jong-Hyouk Lee, “Secure and Fault-tolerant Distributed Location Management for Intelligent 5G Wireless Networks”, IEEE Access, vol. 6, pp. 18117-18127, April 2018. (IF: 3.244(2016), SCIE)
  4. Junling Zhang, Zhiwei Yan, Guanggang Geng, Xiaodong Lee, and Jong-Hyouk Lee, “Trademark protection for Chinese Domain Names”, Journal of Internet Technology, vol. 19, no. 2, pp. 315-324, March 2018. (IF: 1.930(2016), SCIE)
  5. Jong-Hyouk Lee, “BIDaaS: Blockchain based ID as a Service”, IEEE Access, vol. 6, pp. 2274-2278, February 2018. (IF: 3.244(2016), SCIE)
  6. Jian Jin, Zhiwei Yan, Jong-Hyouk Lee, and Guanggang Geng, “Health Evaluation of a Domain Name System Based on the Analytic Hierarchy Process”, Journal of Internet Technology, vol. 19, no. 1, pp. 25-32, January 2018. (IF: 1.930(2016), SCIE)

2017

  1. Ilsun You and Jong-Hyouk Lee, “SPFP: Ticket-based Secure Handover for Fast Proxy Mobile IPv6 in 5G Networks”, Computer Networks, vol. 129, pp. 363-372, December 2017. (IF: 1.446(2014), SCIE)
  2. Debiao He, Sherali Zeadally, Neeraj Kumar, and Jong-Hyouk Lee, “Anonymous Authentication for Wireless Body Area Networks with Provable Security”, IEEE Systems Journal, vol. 11, no. 4, pp. 2590-2601, December 2017. (IF: 1.980(2014), SCIE)
  3. Sehrish Malik and Jong-Hyouk Lee, “Adaptive Load Control Scheme for Emergency Biometric Data”, Journal of Internet Technology, vol. 18, no. 6, pp. 1369-1378, November 2017. (IF: 1.930(2016), SCIE)
  4. Han Shen, Jian Shen, Muhammad Khurram Khan, and Jong-Hyouk Lee, “Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things”, Wireless Personal Communications, vol. 96, no. 4, pp. 5253-5266, October 2017. (IF: 0.653(2014), SCIE)
  5. Jong-Hyouk Lee and Hyoungshick Kim, “Security and Privacy Challenges in the Internet of Things”, IEEE Consumer Electronics Magazine, vol. 6, no. 3, pp. 134-136, July 2017. (IF: 1.153(2016), SCIE)
  6. Jong-Hyouk Lee and Marc Pilkington, “How the Blockchain Revolution Will Reshape the Consumer Electronics Industry”, IEEE Consumer Electronics Magazine, vol. 6, no. 3, pp. 19-23, July 2017. (IF: 1.153(2016), SCIE)
  7. Boohyung Lee and Jong-Hyouk Lee, “Blockchain based secure firmware update for embedded devices in an Internet of Things environment”, Journal of Supercomputing, vol. 73, no. 3, pp. 1152-1167, March 2017. (IF: 1.088(2015): SCI)

2016

  1. Jong-Hyouk Lee, “Secure Authentication with Dynamic Tunneling in Distributed IP Mobility Management”, IEEE Wireless Communications, vol. 23, no. 5, pp. 38-43, October 2016. (IF: 4.148(2015), SCI)
  2. Zhiwei Yan and Jong-Hyouk Lee, “Localized Paging in Proxy Mobile IPv6 Networks”, Annals of Telecommunications, vol. 71, no. 9, pp. 539-547, October 2016. (IF: 0.699(2014): SCI)
  3. Neeraj Kumar, Jong-Hyouk Lee, Naveen Chilamkurti, and Alexey Vinel, “Energy-Efficient Multimedia Data Dissemination in Vehicular Clouds: Stochastic-Reward-Nets-Based Coalition Game Approach”, IEEE Systems Journal, vol. 10, no. 2, pp. 847-858, June 2016. (IF: 1.980(2014), SCIE)
  4. Debiao He, Neeraj Kumar, Han Shen, and Jong-Hyouk Lee, “One-to-Many Authentication for Access Control in Mobile Pay-TV Systems”, Science China Information Sciences, vol. 59, no. 5, May 2016. (IF: 0.850(2014): SCI)
  5. Byung-Chul Choi, Seoung-Hyeon Lee, Jung-Chan Na, and Jong-Hyouk Lee, “Secure Firmware Validation and Update for Consumer Devices in Home Networking”, IEEE Transactions on Consumer Electronics, vol. 62, no. 1, pp. 39-44, February 2016. (IF: 1.045(2014), SCI)
  6. Debiao He, Neeraj Kumar, and Jong-Hyouk Lee, “Privacy-preserving Data Aggregation Scheme against Internal Attackers in Smart Grids”, Wireless Networks, vol. 22, no. 2, pp. 491-502, February 2016. (IF: 0.961(2014), SCI)
  7. Neeraj Kumar, Sudip Misra, Naveen Chilamkurti, Jong-Hyouk Lee, and Joel José Puga Coelho Rodrigues, “Bayesian Coalition Negotiation Game as a Utility for Secure Energy Management in a Vehicles-to-Grid Environment”, IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 1, pp. 133-145, January 2016. (IF: 1.351(2014), SCIE)
  8. Zhiwei Yan, Jong-Hyouk Lee, and Yong-Jin Park, “Distributed Proxies with Fast Handover Support for a PURSUIT based Networking Architecture”, Wireless Networks, vol. 22, no. 1, pp. 307-318, January 2016. (IF: 0.961(2014), SCI)

2015

  1. Neeraj Kumar, Sudip Misra, Joel J.P.C. Rodrigues, Jong-Hyouk Lee, Mohammad S. Obaidat, and Naveen Chilamkurti, “Playing the Smart Grid Game: Performance Analysis of Intelligent Energy Harvesting and Traffic Flow Forecasting for Plug-In Electric Vehicles”, IEEE Vehicular Technology Magazine, vol. 10, no. 4, pp. 81-92, December 2015. (IF: 1.75(2014), SCIE)
  2. Ou Ruan, Neeraj Kumar, Debiao He, and Jong-Hyouk Lee, “Efficient Provably Secure Password-based Explicit Authenticated Key Agreement”, Pervasive and Mobile Computing, vol. 24, pp. 50-60, December 2015. (IF: 2.079(2014): SCIE)
  3. Zhiwei Yan, Jong-Hyouk Lee, Xiaodong Lee, and Yong-Jin Park, “Utilizing the Domain Name System for Scalable and Secure Named Data Networking”, Wireless Personal Communications, vol. 84, no. 3, pp. 2135-2149, October 2015. (IF: 0.653(2014), SCIE)
  4. Neeraj Kumar and Jong-Hyouk Lee, “Collaborative-Learning-Automata-Based Channel Assignment With Topology Preservation for Wireless Mesh Networks Under QoS Constraints”, IEEE Systems Journal, vol. 9, no. 3, pp. 675-685, September 2015. (IF: 1.980(2014), SCIE)
  5. Neeraj Kumar, Jong-Hyouk Lee, and Joel José Puga Coelho Rodrigues, “Intelligent Mobile Video Surveillance System as a Bayesian Coalition Game in Vehicular Sensor Networks: Learning Automata Approach”, IEEE Transactions on Intelligent Transportation Systems, vol. 16, no. 3, pp. 1148-1161, June 2015. (IF: 2.377(2014), SCI)
  6. Jong-Hyouk Lee, Giwon Lee, and Sangheon Pack, “Pseudonyms in IPv6 ITS Communications: Use of Pseudonyms, Performance Degradation, and Optimal Pseudonym Change”, International Journal of Distributed Sensor Networks, vol. 2015, May 2015. (IF: 0.923(2013), SCIE)
  7. Debiao He, Neeraj Kumar, and Jong-Hyouk Lee, “Secure Pseudonym-based Near Field Communication Protocol for the Consumer Internet of Things”, IEEE Transactions on Consumer Electronics, vol. 61, no. 1, pp. 56-62, February 2015. (IF: 1.157(2013), SCI)

2014

  1. Jong-Hyouk Lee, Thierry Ernst, and Xiaomin Ma, “Performance Analysis of Secure Beaconing Messages for GeoNetworking”, Security and Communication Networks, vol. 7, no. 12, pp. 2555-2563, December 2014. (IF: 0.311(2012), SCIE)
  2. Neeraj Kumar and Jong-Hyouk Lee, “Peer-to-Peer Cooperative Caching for Data Dissemination in Urban Vehicular Communications”, IEEE Systems Journal, vol. 8, no. 4, pp. 1136-1144, December 2014. (IF: 1.746(2013), SCIE)
  3. Debiao He, Neeraj Kumar, Naveen Chilamkurti, and Jong-Hyouk Lee, “Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol”, Journal of Medical Systems, vol. 38, no. 10, October 2014. (IF: 1.372(2013), SCIE)
  4. Younghyun Kim, Haneul Ko, Sangheon Pack, Jong-Hyouk Lee, Seok-Joo Koh, and Heeyoung Jung, “Performance Analysis of Distributed Mapping System in ID/Locator Separation Architectures”, Journal of Network and Computer Applications, vol. 39, pp. 223–232, March 2014. (IF: 1.251(2012), SCIE)
  5. Debiao He, Neeraj Kumar, Jong-Hyouk Lee, and R. Simon Sherratt, “Enhanced Three-factor Security Protocol for Consumer USB Mass Storage Devices”, IEEE Transactions on Consumer Electronics, vol. 60, no. 1, pp. 30-37, February 2014. (IF: 1.087(2012), SCI)
  6. Jong-Hyouk Lee, Kamal Deep Singh, Jean-Marie Bonnin, and Sangheon Pack, “Mobile Data Offloading: A Host-based Distributed Mobility Management Approach”, IEEE Internet Computing, vol. 18, no. 1, pp. 20-29, January/February 2014. (IF: 2.039(2012), SCIE)

2013

  1. Debiao He, Neeraj Kumar, Muhammad K. Khan, and Jong-Hyouk Lee, “Anonymous Two-factor Authentication for Consumer Roaming Service in Global Mobility Networks”, IEEE Transactions on Consumer Electronics, vol. 59, no. 4, pp. 811-817, November 2013. (IF: 1.087(2012), SCI)
  2. Jong-Hyouk Lee, Jean-Marie Bonnin, Pierrick Seite, and H. Anthony Chan, “Distributed IP Mobility Management from the Perspective of the IETF: Motivations, Requirements, Approaches, Comparison, and Challenges”, IEEE Wireless Communications Magazine, vol. 20, no. 5, pp. 159-168, October 2013. (IF: 3.74(2012), SCI)
  3. Jong-Hyouk Lee and Thierry Ernst, “IPv6 Security Issues in Cooperative Intelligent Transportation Systems”, The Computer Journal, vol. 56, no. 10, pp. 1189-1197, October 2013. (IF: 0.755(2012), SCIE)
  4. Zhiwei Yan, Jong-Hyouk Lee, Sean Shen, and Chunming Qiao, “Novel Branching-Router based Multicast Routing Protocol with Mobility Support”, IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 10, pp. 2060-2068, October 2013. (IF: 1.796(2012), SCI)
  5. Neeraj Kumar, Naveen Chilamkurti, and Jong-Hyouk Lee, “UBMR-CA: Utility based Multicast Routing and Channel Assignment with Varying Traffic Demands in Multi-radio Multi-channel Wireless Mesh Networks”, Mathematical and Computer Modelling, vol. 57, no. 11–12, pp. 2750-2763, June 2013 (IF: 1.346(2011), SCIE)
  6. Der-Chen Huang and Jong-Hyouk Lee, “A dynamic N threshold prolong lifetime method for wireless sensor nodes”, Mathematical and Computer Modelling, vol. 57, no. 11–12, pp. 2731-2741, June 2013. (IF: 1.346(2011), SCIE)
  7. Jong-Hyouk Lee and Jean-Marie Bonnin, “HOTA: Handover Optimized Ticket-based Authentication in Network-based Mobility Management”, Information Sciences, vol. 230, pp. 64-77, May 2013. (IF: 2.833(2011), SCI)
  8. Jong-Hyouk Lee, Jean-Marie Bonnin, Ilsun You, and Tai-Myoung Chung, “Comparative Handover Performance Analysis of IPv6 Mobility Management Protocols”, IEEE Transactions on Industrial Electronics, vol. 60, no. 3, pp. 1077-1088, March 2013. (IF: 5.160(2011), SCI)
  9. Zhiwei Yan and Jong-Hyouk Lee, “State-aware Pointer Forwarding Scheme with Fast Handover Support in a PMIPv6 Domain”, IEEE Systems Journal, vol. 7, no. 1, pp. 92-101, March 2013. (IF: 1.746(2013), SCIE)