Hight: A new block cipher suitable for low-resource device D Hong, J Sung, S Hong, J Lim, S Lee, BS Koo, C Lee, D Chang, J Lee, ... Cryptographic Hardware and Embedded Systems-CHES 2006, 46-59, 2006 | 1003 | 2006 |
Chaos-based secure satellite imagery cryptosystem M Usama, MK Khan, K Alghathbar, C Lee Computers & Mathematics with Applications 60 (2), 326-337, 2010 | 159 | 2010 |
Abnormal event detection in crowded scenes based on deep learning Z Fang, F Fei, Y Fang, C Lee, N Xiong, L Shu, S Chen Multimedia Tools and Applications 75, 14617-14639, 2016 | 116 | 2016 |
A learning automata-based fault-tolerant routing algorithm for mobile ad hoc networks S Misra, PV Krishna, A Bhiwal, AS Chawla, BE Wolfinger, C Lee The Journal of Supercomputing, 1-20, 2012 | 82 | 2012 |
Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED K Jeong, HC Kang, C Lee, J Sung, S Hong | 65* | |
Packet Preprocessing in CNN-Based Network Intrusion Detection System W Jo, S Kim, C Lee, T Shon Electronics 9 (7), 1151, 2020 | 59 | 2020 |
Homomorphic Encryption Based Privacy-Preservation for IoMT MM Salim, I Kim, U Doniyor, C Lee, JH Park Applied Sciences 11 (18), 8757, 2021 | 43 | 2021 |
Color sensors and their applications based on real-time color image segmentation for cyber physical systems NN Xiong, Y Shen, K Yang, C Lee, C Wu EURASIP Journal on Image and Video Processing 2018 (1), 1-16, 2018 | 42 | 2018 |
Impossible differential attack on 30-round SHACAL-2 S Hong, J Kim, G Kim, J Sung, C Lee, S Lee Progress in Cryptology-INDOCRYPT 2003, 317-341, 2003 | 40 | 2003 |
Differential Fault Analysis on Block Cipher LED-64 K Jeong, C Lee Future Information Technology, Application, and Service, 747-755, 2012 | 39 | 2012 |
A chosen plaintext linear attack on block cipher CIKS-1 C Lee, D Hong, S Lee, S Lee, H Yang, J Lim International Conference on Information and Communications Security, 456-468, 2002 | 39 | 2002 |
BLOCIS: Blockchain-Based Cyber Threat Intelligence Sharing Framework for Sybil-Resistance S Gong, C Lee Electronics 9 (3), 521, 2020 | 38 | 2020 |
A reliability comparison method for OSINT validity analysis S Gong, J Cho, C Lee IEEE Transactions on Industrial Informatics 14 (12), 5428-5435, 2018 | 38 | 2018 |
A chosen plaintext linear attack on block cipher CIKS-1 C Lee, D Hong, S Lee, S Lee, H Yang, J Lim Information and Communications Security, 456-468, 2002 | 38 | 2002 |
Context-aware middleware and intelligent agents for smart environments HR Arabnia, WC Fang, C Lee, Y Zhang IEEE Intelligent Systems 25 (2), 10-11, 2010 | 36 | 2010 |
Context-aware middleware and intelligent agents for smart environments HR Arabnia, WC Fang, C Lee, Y Zhang IEEE Intelligent Systems 25 (2), 10-11, 2010 | 36 | 2010 |
Cyber Threat Intelligence Framework for Incident Response in an Energy Cloud Platform S Gong, C Lee Electronics 10 (3), 239, 2021 | 32 | 2021 |
Related-key attacks on DDP based ciphers: CIKS-128 and CIKS-128H Y Ko, C Lee, S Hong, J Sung, S Lee Progress in Cryptology-INDOCRYPT 2004, 179-200, 2005 | 31 | 2005 |
Links organization for channel assignment in multi-radio wireless mesh networks H Cheng, N Xiong, LT Yang, G Chen, X Zhuang, C Lee Multimedia Tools and Applications, 1-20, 2011 | 28 | 2011 |
Detection of adversarial attacks in AI-based intrusion detection systems using explainable AI E Tcydenova, TW Kim, C Lee, JH Park Human-Centric Comput Inform Sci 11, 2021 | 27 | 2021 |