default search action
Chan Yeob Yeun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j48]Song-Kyoo Kim, Xiaomei Feng, Hussam M. N. Al Hamadi, Ernesto Damiani, Chan Yeob Yeun, Sivaprasad Nandyala:
Advanced Machine Learning Based Malware Detection Systems. IEEE Access 12: 115296-115305 (2024) - [j47]Khouloud Eledlebi, Ahmed Adel Alzubaidi, Ernesto Damiani, Víctor Mateu, Yousof Al-Hammadi, Deepak Puthal, Chan Yeob Yeun:
Comparative study of novel packet loss analysis and recovery capability between hybrid TLI-µTESLA and other variant TESLA protocols. Ad Hoc Networks 163: 103579 (2024) - [j46]Deepak Puthal, Chan Yeob Yeun, Ernesto Damiani, Amit Kumar Mishra, Kumar Yelamarthi, Biswajeet Pradhan:
Blockchain Data Structures and Integrated Adaptive Learning: Features and Futures. IEEE Consumer Electron. Mag. 13(2): 72-80 (2024) - [j45]Hyeran Mun, Kyusuk Han, Ernesto Damiani, Tae-Yeon Kim, Hyun Ku Yeun, Deepak Puthal, Chan Yeob Yeun:
Privacy enhanced data aggregation based on federated learning in Internet of Vehicles (IoV). Comput. Commun. 223: 15-25 (2024) - [j44]Kamal Taha, Paul D. Yoo, Yousof Al-Hammadi, Sami Muhaidat, Chan Yeob Yeun:
Learning a deep-feature clustering model for gait-based individual identification. Comput. Secur. 136: 103559 (2024) - [j43]Kamal Taha, Paul D. Yoo, Chan Yeob Yeun, Dirar Homouz, Aya Taha:
A comprehensive survey of text classification techniques and their research applications: Observational and experimental insights. Comput. Sci. Rev. 54: 100664 (2024) - [j42]Khouloud Eledlebi, Ahmed Adel Alzubaidi, Ernesto Damiani, Deepak Puthal, Víctor Mateu, Mohamed Jamal Zemerly, Yousof Al-Hammadi, Chan Yeob Yeun:
Bio-Integrated Hybrid TESLA: A Fully Symmetric Lightweight Authentication Protocol. IEEE Internet Things J. 11(23): 37421-37436 (2024) - [c58]Zhibo Zhang, Pengfei Li, Ahmed Y. Al Hammadi, Fusen Guo, Ernesto Damiani, Chan Yeob Yeun:
Reputation-Based Federated Learning Defense to Mitigate Threats in EEG Signal Classification. ICCAE 2024: 173-180 - [c57]Maryam Alsereidi, Abeer Awadallah, Alreem Alkaabi, Sangyoung Yoon, Chan Yeob Yeun:
Data Poisoning Against Federated Learning: Comparative Analysis Under Label-Flipping Attacks and GAN-Generated EEG Data. ICCR 2024: 1-5 - [c56]Shamma Alshebli, Muna Alshehhi, Chan Yeob Yeun:
Investigating How Data Poising Attacks Can Impact An EEG-Based Federated Learning Model. ICCR 2024: 1-6 - [c55]Shamma Alshebli, Chan Yeob Yeun:
Examining the Security Landscape of Mobile Payment Systems. ICCR 2024: 1-5 - [c54]Elyazia Baha, Abdulla Fadhel, Patricia Buenaventura, Chan Yeob Yeun, Jamal Zemerly, Khouloud Eldelbi:
Multimodal Biometric Authentication Systems: Exploring Iris and EEG Data. ICCR 2024: 1-4 - [i16]Pengfei Li, Zhibo Zhang, Ameena Saad Al Sumaiti, Naoufel Werghi, Chan Yeob Yeun:
A Robust Adversary Detection-Deactivation Method for Metaverse-oriented Collaborative Deep Learning. CoRR abs/2401.01895 (2024) - [i15]Zhibo Zhang, Pengfei Li, Ahmed Y. Al Hammadi, Fusen Guo, Ernesto Damiani, Chan Yeob Yeun:
Reputation-Based Federated Learning Defense to Mitigate Threats in EEG Signal Classification. CoRR abs/2401.01896 (2024) - [i14]Kamal Taha, Paul D. Yoo, Chan Yeob Yeun, Aya Taha:
Text Classification: A Review, Empirical, and Experimental Evaluation. CoRR abs/2401.12982 (2024) - 2023
- [j41]Zhibo Zhang, Sani Umar, Ahmed Y. Al Hammadi, Sangyoung Yoon, Ernesto Damiani, Claudio Agostino Ardagna, Nicola Bena, Chan Yeob Yeun:
Explainable Data Poison Attacks on Human Emotion Evaluation Systems Based on EEG Signals. IEEE Access 11: 18134-18147 (2023) - [j40]Kyusuk Han, Hyeran Mun, Malavika Balakrishnan, Chan Yeob Yeun:
Enhancing security and robustness of Cyphal on Controller Area Network in unmanned aerial vehicle environments. Comput. Secur. 135: 103481 (2023) - [j39]Sagheer Abbas, Ghassan F. Issa, Areej Fatima, Tahir Abbas Khan, Taher M. Ghazal, Munir Ahmad, Chan Yeob Yeun, Muhammad Adnan Khan:
Fused Weighted Federated Deep Extreme Machine Learning Based on Intelligent Lung Cancer Disease Prediction Model for Healthcare 5.0. Int. J. Intell. Syst. 2023: 1-14 (2023) - [j38]Marco Anisetti, Claudio A. Ardagna, Alessandro Balestrucci, Nicola Bena, Ernesto Damiani, Chan Yeob Yeun:
On the Robustness of Random Forest Against Untargeted Data Poisoning: An Ensemble-Based Approach. IEEE Trans. Sustain. Comput. 8(4): 540-554 (2023) - [c53]Joy Dutta, Deepak Puthal, Chan Yeob Yeun:
Next Generation Healthcare with Explainable AI: IoMT-Edge-Cloud Based Advanced eHealth. GLOBECOM 2023: 7327-7332 - [c52]Deepak Puthal, Saraju P. Mohanty, Chan Yeob Yeun, Ernesto Damiani, Biswajeet Pradhan:
Pervasive AI for Secure and Scalable IoT- Edge-Cloud Continuum: A Big Picture. HPCC/DSS/SmartCity/DependSys 2023: 566-573 - [c51]Deepak Puthal, Saraju P. Mohanty, Amit Kumar Mishra, Chan Yeob Yeun, Ernesto Damiani:
Revolutionizing Cyber Security: Exploring the Synergy of Machine Learning and Logical Reasoning for Cyber Threats and Mitigation. ISVLSI 2023: 1-6 - [i13]Zhibo Zhang, Sani Umar, Ahmed Y. Al Hammadi, Sangyoung Yoon, Ernesto Damiani, Claudio Agostino Ardagna, Nicola Bena, Chan Yeob Yeun:
Explainable Data Poison Attacks on Human Emotion Evaluation Systems based on EEG Signals. CoRR abs/2301.06923 (2023) - [i12]Zhibo Zhang, Ahmed Y. Al Hammadi, Ernesto Damiani, Chan Yeob Yeun:
Explainable Label-flipping Attacks on Human Emotion Assessment System. CoRR abs/2302.04109 (2023) - 2022
- [j37]Ruba Alkadi, Noura Alnuaimi, Chan Yeob Yeun, Abdulhadi Shoufan:
Blockchain Interoperability in Unmanned Aerial Vehicles Networks: State-of-the-Art and Open Issues. IEEE Access 10: 14463-14479 (2022) - [j36]Khouloud Eledlebi, Chan Yeob Yeun, Ernesto Damiani, Yousof Al-Hammadi:
Empirical Studies of TESLA Protocol: Properties, Implementations, and Replacement of Public Cryptography Using Biometric Authentication. IEEE Access 10: 21941-21954 (2022) - [j35]Khouloud Eledlebi, Ahmed Adel Alzubaidi, Chan Yeob Yeun, Ernesto Damiani, Víctor Mateu, Yousof Al-Hammadi:
Enhanced Inf-TESLA Protocol: A Continuous Connectivity and Low Overhead Authentication Protocol via IoT Devices. IEEE Access 10: 54912-54921 (2022) - [j34]Zhibo Zhang, Hussam M. N. Al Hamadi, Ernesto Damiani, Chan Yeob Yeun, Fatma Taher:
Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research. IEEE Access 10: 93104-93139 (2022) - [j33]Dina Shehada, Amjad Gawanmeh, Chan Yeob Yeun, M. Jamal Zemerly:
Fog-based distributed trust and reputation management system for internet of things. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8637-8646 (2022) - [j32]Muhammad Hanif, Nadeem Iqbal, Fida Ur Rahman, Muhammad Adnan Khan, Taher M. Ghazal, Sagheer Abbas, Munir Ahmad, Hussam M. N. Al Hamadi, Chan Yeob Yeun:
A Novel Grayscale Image Encryption Scheme Based on the Block-Level Swapping of Pixels and the Chaotic System. Sensors 22(16): 6243 (2022) - [j31]Khouloud Eledlebi, Ahmed Adel Alzubaidi, Chan Yeob Yeun, Ernesto Damiani, Víctor Mateu, Yousof Al-Hammadi:
Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions. Sensors 22(23): 9063 (2022) - [c50]Ala Abdelrazaq Alhammadi, Hussam M. N. Al Hamadi, Chan Yeob Yeun, Ernesto Damiani:
A Cyber-Security Framework For Boiler of Steam Power Plant Using Simulation Data to Train Machine Learning Model. ICCR 2022: 1-9 - [c49]Zhibo Zhang, Ernesto Damiani, Hussam M. N. Al Hamadi, Chan Yeob Yeun, Fatma Taher:
Explainable Artificial Intelligence to Detect Image Spam Using Convolutional Neural Network. ICCR 2022: 1-5 - [c48]Kyusuk Han, Eiman Al Nuaimi, Shamma Al Blooshi, Rafail Psiakis, Chan Yeob Yeun:
A New Scalable Mutual Authentication in Fog-Edge Drone Swarm Environment. ISPEC 2022: 179-196 - [i11]Miguel A. Ramirez, Song-Kyoo Kim, Hussam M. N. Al Hamadi, Ernesto Damiani, Young-Ji Byon, Tae-Yeon Kim, Chung-Suk Cho, Chan Yeob Yeun:
Poisoning Attacks and Defenses on Artificial Intelligence: A Survey. CoRR abs/2202.10276 (2022) - [i10]Zhibo Zhang, Hussam M. N. Al Hamadi, Ernesto Damiani, Chan Yeob Yeun, Fatma Taher:
Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research. CoRR abs/2208.14937 (2022) - [i9]Zhibo Zhang, Ernesto Damiani, Hussam M. N. Al Hamadi, Chan Yeob Yeun, Fatma Taher:
Explainable Artificial Intelligence to Detect Image Spam Using Convolutional Neural Network. CoRR abs/2209.03166 (2022) - [i8]Marco Anisetti, Claudio A. Ardagna, Alessandro Balestrucci, Nicola Bena, Ernesto Damiani, Chan Yeob Yeun:
On the Robustness of Ensemble-Based Machine Learning Against Data Poisoning. CoRR abs/2209.14013 (2022) - [i7]Miguel A. Ramirez, Sangyoung Yoon, Ernesto Damiani, Hussam M. N. Al Hamadi, Claudio Agostino Ardagna, Nicola Bena, Young-Ji Byon, Tae-Yeon Kim, Chung-Suk Cho, Chan Yeob Yeun:
New data poison attacks on machine learning classifiers for mobile exfiltration. CoRR abs/2210.11592 (2022) - 2021
- [j30]Mohammad Z. Shanti, Chung-Suk Cho, Young-Ji Byon, Chan Yeob Yeun, Tae-Yeon Kim, Song-Kyoo Kim, Ahmed Altunaiji:
A Novel Implementation of an AI-Based Smart Construction Safety Inspection Protocol in the UAE. IEEE Access 9: 166603-166616 (2021) - [j29]Ebrahim Al Alkeem, Chan Yeob Yeun, Jaewoong Yun, Paul D. Yoo, Myungsu Chae, Arafatur Rahman, A. Taufiq Asyhari:
Robust Deep Identification using ECG and Multimodal Biometrics for Industrial Internet of Things. Ad Hoc Networks 121: 102581 (2021) - [j28]Ahmed Y. Al Hammadi, Chan Yeob Yeun, Ernesto Damiani, Paul D. Yoo, Jiankun Hu, Hyun Ku Yeun, Man-Sung Yim:
Explainable artificial intelligence to evaluate industrial internal security using EEG signals in IoT framework. Ad Hoc Networks 123: 102641 (2021) - [j27]Abdulla Al Zaabi, Chan Yeob Yeun, Ernesto Damiani:
Trusting Testcases Using Blockchain-Based Repository Approach. Symmetry 13(11): 2024 (2021) - [j26]Khawla Alghafli, Chan Yeob Yeun, Ernesto Damiani:
Techniques for Measuring the Probability of Adjacency between Carved Video Fragments: The VidCarve Approach. IEEE Trans. Sustain. Comput. 6(1): 131-143 (2021) - [c47]Hussam M. N. Al Hamadi, Nida Nasir, Chan Yeob Yeun, Ernesto Damiani:
A Verified Protocol for Secure Autonomous and Cooperative Public Transportation in Smart Cities. ICC Workshops 2021: 1-6 - [d1]Ahmed Alhammadi, Chan Yeob Yeun, Ernesto Damiani, Paul D. Yoo, Jiankun Hu, Hyun Ku Yeun, Man-Sung Yim:
EEG Brainwave Dataset. IEEE DataPort, 2021 - [i6]Ruba Alkadi, Noura Alnuaimi, Abdulhadi Shoufan, Chan Yeob Yeun:
Blockchain Interoperability in UAV Networks: State-of-the-art and Open Issues. CoRR abs/2111.09529 (2021) - 2020
- [j25]Seo Jin Lee, Paul D. Yoo, A. Taufiq Asyhari, Yoonchan Jhi, Lounis Chermak, Chan Yeob Yeun, Kamal Taha:
IMPACT: Impersonation Attack Detection via Edge Computing Using Deep Autoencoder and Feature Abstraction. IEEE Access 8: 65520-65529 (2020) - [j24]Moon Kyoung Choi, Chan Yeob Yeun, Poong Hyun Seong:
A Novel Monitoring System for the Data Integrity of Reactor Protection System Using Blockchain Technology. IEEE Access 8: 118732-118740 (2020) - [j23]Ahmed Y. Al Hammadi, Dongkun Lee, Chan Yeob Yeun, Ernesto Damiani, Song-Kyoo Kim, Paul D. Yoo, Ho-Jin Choi:
Novel EEG Sensor-Based Risk Framework for the Detection of Insider Threats in Safety Critical Industrial Infrastructure. IEEE Access 8: 206222-206234 (2020) - [j22]Hyoung-Kyu Song, Ebrahim Al Alkeem, Jaewoong Yun, Tae-Ho Kim, Hyerin Yoo, Dasom Heo, Myungsu Chae, Chan Yeob Yeun:
Deep user identification model with multiple biometric data. BMC Bioinform. 21(1): 315 (2020) - [j21]Hyoung-Kyu Song, Ebrahim Al Alkeem, Jaewoong Yun, Tae-Ho Kim, Hyerin Yoo, Dasom Heo, Myungsu Chae, Chan Yeob Yeun:
Correction to: Deep user identification model with multiple biometric data. BMC Bioinform. 21-S(5): 421 (2020) - [c46]Ahmed Y. Al Hammadi, Chan Yeob Yeun, Ernesto Damiani:
Novel EEG Risk Framework to Identify Insider Threats in National Critical Infrastructure Using Deep Learning Techniques. SCC 2020: 469-471 - [c45]Fatema Rashed Almehrezi, Chan Yeob Yeun, Paul D. Yoo, Ernesto Damiani, Yousef Y. Al Hammadi, Hyun Ku Yeun:
An Emerging Security Framework for Connected Autonomous Vehicles. BESC 2020: 1-4 - [c44]Mohammed Al Neaimi, Hussam M. N. Al Hamadi, Chan Yeob Yeun, M. Jamal Zemerly:
Digital Forensic Analysis of Files Using Deep Learning. ICSPIS 2020: 1-4 - [i5]Song-Kyoo Kim, Chan Yeob Yeun, Paul D. Yoo, Nai-Wei Lo, Ernesto Damiani:
Deep Learning-Based Arrhythmia Detection Using RR-Interval Framed Electrocardiograms. CoRR abs/2012.00348 (2020)
2010 – 2019
- 2019
- [j20]Song-Kyoo Kim, Chan Yeob Yeun, Ernesto Damiani, Nai-Wei Lo:
A Machine Learning Framework for Biometric Authentication Using Electrocardiogram. IEEE Access 7: 94858-94868 (2019) - [j19]Ebrahim Al Alkeem, Song-Kyoo Kim, Chan Yeob Yeun, Mohamed Jamal Zemerly, Kin Fai Poon, Gabriele Gianini, Paul D. Yoo:
An Enhanced Electrocardiogram Biometric Authentication System Using Machine Learning. IEEE Access 7: 123069-123075 (2019) - [j18]Song-Kyoo Kim, Chan Yeob Yeun, Paul D. Yoo:
An Enhanced Machine Learning-Based Biometric Authentication System Using RR-Interval Framed Electrocardiograms. IEEE Access 7: 168669-168674 (2019) - [j17]Hussam M. N. Al Hamadi, Chan Yeob Yeun, Mohamed Jamal Zemerly, Mahmoud Al-Qutayri, Amjad Gawanmeh, Yousof Al-Hammadi, Ernesto Damiani:
A Novel Protocol for Security of Location Based Services in Multi-agent Systems. Wirel. Pers. Commun. 108(3): 1841-1868 (2019) - [c43]Ali Al Dhaheri, Chan Yeob Yeun, Ernesto Damiani:
New Two-Level µTESLA Protocol for IoT Environments. SERVICES 2019: 84-91 - [e1]Olivier Blazy, Chan Yeob Yeun:
Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11469, Springer 2019, ISBN 978-3-030-20073-2 [contents] - [i4]Song-Kyoo Kim, Chan Yeob Yeun, Ernesto Damiani, Nai-Wei Lo:
A Machine Learning Framework for Biometric Authentication using Electrocardiogram. CoRR abs/1903.12340 (2019) - [i3]Ebrahim Al Alkeem, Song-Kyoo Kim, Chan Yeob Yeun, M. Jamal Zemerly, Kin Fai Poon, Paul D. Yoo:
An Enhanced Electrocardiogram Biometric Authentication System Using Machine Learning. CoRR abs/1907.00366 (2019) - [i2]Hyoung-Kyu Song, Ebrahim Al Alkeem, Jaewoong Yun, Tae-Ho Kim, Hyerin Yoo, Dasom Heo, Chan Yeob Yeun, Myungsu Chae:
Deep User Identification Model with Multiple Biometrics. CoRR abs/1909.05417 (2019) - 2018
- [j16]Dina Shehada, Chan Yeob Yeun, M. Jamal Zemerly, Mahmoud Al-Qutayri, Yousof Al-Hammadi, Jiankun Hu:
A new adaptive trust and reputation model for Mobile Agent Systems. J. Netw. Comput. Appl. 124: 33-43 (2018) - [c42]Perpetus Jacques Houngbo, Joël T. Hounsou, Ernesto Damiani, Rasool Asal, Stelvio Cimato, Fulvio Frati, Chan Yeob Yeun:
Embedding a Digital Wallet to Pay-with-a-Selfie, from Functional Requirements to Prototype. AFRICATEK 2018: 47-56 - [c41]Perpetus Jacques Houngbo, Joël T. Hounsou, Ernesto Damiani, Rasool Asal, Stelvio Cimato, Fulvio Frati, Chan Yeob Yeun:
Embedding a Digital Wallet to Pay-with-a-Selfie, Defining the System Architecture as Blockchain Based. AFRICATEK 2018: 109-124 - [c40]Tasneem Salah, Haya Hasan, M. Jamal Zemerly, Chan Yeob Yeun, Mahmoud Al-Qutayri, Yousof Al-Hammadi, Jiankun Hu:
Secure Autonomous Mobile Agents for Web Services. GLOBECOM 2018: 1-6 - [c39]Tasneem Salah, M. Jamal Zemerly, Chan Yeob Yeun, Mahmoud Al-Qutayri, Yousof Al-Hammadi:
IoT Applications: From Mobile Agents to Microservices Architecture. IIT 2018: 117-122 - 2017
- [j15]Ebrahim Al Alkeem, Dina Shehada, Chan Yeob Yeun, M. Jamal Zemerly, Jiankun Hu:
New secure healthcare system using cloud of things. Clust. Comput. 20(3): 2211-2229 (2017) - [j14]Dina Shehada, Chan Yeob Yeun, M. Jamal Zemerly, Mahmoud Al-Qutayri, Yousof Al-Hammadi, Ernesto Damiani, Jiankun Hu:
BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications. Secur. Commun. Networks 2017: 3606424:1-3606424:18 (2017) - [j13]Abdelrahman AlMahmoud, Maurizio Colombo, Chan Yeob Yeun, Hassan Al-Muhairi:
Enhancement of Key Derivation in Web Service Security - Performance Bottleneck in Real-Time Messaging Systems. Wirel. Pers. Commun. 97(4): 5171-5184 (2017) - [c38]Ernesto Damiani, Perpetus Jacques Houngbo, Joël T. Hounsou, Rasool Asal, Stelvio Cimato, Fulvio Frati, Dina Shehada, Chan Yeob Yeun:
Porting the Pay with a (Group) Selfie (PGS) Payment System to Crypto Currency. AFRICATEK 2017: 159-168 - [c37]Heba Abunahla, Dina Shehada, Chan Yeob Yeun, Baker Mohammad, Thanos Stouraitis:
A novel secure conference communication in IoT devices based on memristors. ICECS 2017: 58-61 - [c36]Tasneem Salah, Mohamed Jamal Zemerly, Chan Yeob Yeun, Mahmoud Al-Qutayri, Yousof Al-Hammadi:
Performance comparison between container-based and VM-based services. ICIN 2017: 185-190 - [c35]Shaikha AlShehyari, Chan Yeob Yeun, Ernesto Damiani:
Monitoring darknet activities by using network telescope. ICITST 2017: 123-128 - [c34]Lamya Alqaydi, Chan Yeob Yeun, Ernesto Damiani:
Security enhancements to TLS for improved national control. ICITST 2017: 274-279 - [c33]Mouza Ahmed Bani Shemaili, Chan Yeob Yeun, Mohamed Jamal Zemerly, Khalid Mubarak, Hyun Ku Yeun, Yoon Seok Chang, Basim Zafar, Mohammed Simsim, Yasir Salih, Gaemyoung Lee:
A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources. MONAMI 2017: 231-246 - [c32]Fatma Mohamed, Bushra AlBelooshi, Khaled Salah, Chan Yeob Yeun, Ernesto Damiani:
A Scattering Technique for Protecting Cryptographic Keys in the Cloud. FAS*W@SASO/ICCAC 2017: 301-306 - [c31]Haya Hasan, Tasneem Salah, Dina Shehada, M. Jamal Zemerly, Chan Yeob Yeun, Mahmoud Al-Qutayri, Yousof Al-Hammadi:
Secure lightweight ECC-based protocol for multi-agent IoT systems. WiMob 2017: 1-8 - [i1]Ernesto Damiani, Perpetus Jacques Houngbo, Rasool Asal, Stelvio Cimato, Fulvio Frati, Joël T. Hounsou, Dina Shehada, Chan Yeob Yeun:
Pay-with-a-Selfie, a human-centred digital payment system. CoRR abs/1706.07187 (2017) - 2016
- [c30]Tasneem Salah, M. Jamal Zemerly, Chan Yeob Yeun, Mahmoud Al-Qutayri, Yousof Al-Hammadi:
The evolution of distributed systems towards microservices architecture. ICITST 2016: 318-325 - [c29]Yousuf Alsalami, Chan Yeob Yeun, Thomas Martin, Majid Khonji:
Linear and differential cryptanalysis of small-sized random (n, m)-S-boxes. ICITST 2016: 447-454 - [c28]Heba Abunahla, Dina Shehada, Chan Yeob Yeun, Curtis J. Okelly, Maguy Abi Jaoude, Baker Mohammad:
Novel microscale memristor with uniqueness property for securing communications. MWSCAS 2016: 1-4 - 2015
- [c27]Buti Al Delail, Chan Yeob Yeun:
Recent advances of smart glass application security and privacy. ICITST 2015: 65-69 - [c26]Ebrahim Al Alkeem, Chan Yeob Yeun, M. Jamal Zemerly:
Security and privacy framework for ubiquitous healthcare IoT devices. ICITST 2015: 70-75 - [c25]Fatema Al Mansoori, Chan Yeob Yeun:
Emerging new trends of location based systems security. ICITST 2015: 158-163 - [c24]Maryam Sepehri, Stelvio Cimato, Ernesto Damiani, Chan Yeob Yeun:
Data Sharing on the Cloud: A Scalable Proxy-Based Protocol for Privacy-Preserving Queries. TrustCom/BigDataSE/ISPA (1) 2015: 1357-1362 - [c23]Lina Bariah, Dina Shehada, Ehab Salahat, Chan Yeob Yeun:
Recent Advances in VANET Security: A Survey. VTC Fall 2015: 1-7 - [c22]Ehab Salahat, Dina Shehada, Chan Yeob Yeun:
Novel Performance Analysis of Multi-Access MIMO Relay Cooperative RM-DCSK over Nakagami-m Fading Subject to AWGGN. VTC Fall 2015: 1-5 - 2014
- [j12]Muhra Ahmed, Quang Hieu Vu, Rasool Asal, Hassan Al-Muhairi, Chan Yeob Yeun:
Lightweight secure storage model with fault-tolerance in cloud environment. Electron. Commer. Res. 14(3): 271-291 (2014) - 2013
- [j11]Hussam M. N. Al Hamadi, Chan Yeob Yeun, Mohamed Jamal Zemerly:
A Novel Security Scheme for the Smart Grid and SCADA Networks. Wirel. Pers. Commun. 73(4): 1547-1559 (2013) - [c21]Faisal Al Hawi, Chan Yeob Yeun, Khaled Salah:
Secure Framework for the Return Routability Procedure in MIPv6. GreenCom/iThings/CPScom 2013: 1386-1391 - [c20]Mouza Ahmad Bani Shemaili, Chan Yeob Yeun, Mohamed Jamal Zemerly, Khalid Mubarak, Yoon Seok Chang:
Securing E-Seal real time tracking system for Internet of Things. ICITST 2013: 65-69 - 2012
- [j10]Hyeran Mun, Kyusuk Han, Yang Sun Lee, Chan Yeob Yeun, Hyo Hyun Choi:
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math. Comput. Model. 55(1-2): 214-222 (2012) - [j9]Kyusuk Han, Hyeran Mun, Taeshik Shon, Chan Yeob Yeun, Jong Hyuk Park:
Secure and efficient public key management in next generation mobile networks. Pers. Ubiquitous Comput. 16(6): 677-685 (2012) - [c19]Mouza Ahmad Bani Shemaili, Chan Yeob Yeun, Khalid Mubarak, Mohamed Jamal Zemerly:
A new lightweight hybrid cryptographic algorithm for the internet of things. ICITST 2012: 87-92 - [c18]Abdelrahman AlMahmoud, Maurizio Colombo, Chan Yeob Yeun, Hassan Al-Muhairi:
Smart authentication for real-time business process monitoring. ICITST 2012: 253-258 - [c17]Omniyah Gul, Mahmoud Al-Qutayri, Quang Hieu Vu, Chan Yeob Yeun:
Data integration of electronic health records using artificial neural networks. ICITST 2012: 313-317 - [c16]Joonsang Baek, Quang Hieu Vu, Andrew Jones, Sameera Al-Mulla, Chan Yeob Yeun:
Smart-frame: A flexible, scalable, and secure information management framework for smart grids. ICITST 2012: 668-673 - 2011
- [j8]Kyusuk Han, Chan Yeob Yeun, Taeshik Shon, Jong Hyuk Park, Kwangjo Kim:
A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication. Int. J. Commun. Syst. 24(4): 461-472 (2011) - [j7]Divyan M. Konidala, Daeyoung Kim, Chan Yeob Yeun, Byoungcheon Lee:
Security Framework for RFID-based Applications in Smart Home Environment. J. Inf. Process. Syst. 7(1): 111-120 (2011) - [j6]Mohammed Alzaabi, Chan Yeob Yeun, Thomas Anthony Martin:
Ensuring Anonymity for LBSs in Smartphone Environment. J. Inf. Process. Syst. 7(1): 121-136 (2011) - [c15]Hamad Marzouqi, Khaled Salah, Mahmoud Al-Qutayri, Chan Yeob Yeun:
A unified countermeasure against side channel attacks on cryptographic RFID. ICITST 2011: 13-18 - [c14]Muna Abdulla Al Shehhi, Joonsang Baek, Chan Yeob Yeun:
The use of Boolean functions in stream ciphers. ICITST 2011: 29-33 - [c13]Noura Al Ebri, Joonsang Baek, Chan Yeob Yeun:
Study on Secret Sharing Schemes (SSS) and their applications. ICITST 2011: 40-45 - [c12]Ameera Salem Abdouli, Joonsang Baek, Chan Yeob Yeun:
Survey on computationally hard problems and their applications to cryptography. ICITST 2011: 46-52 - [c11]Hajer Al Housani, Joonsang Baek, Chan Yeob Yeun:
Survey on certificateless public key cryptography. ICITST 2011: 53-58 - [c10]Fatma Ahmad Bazargan, Chan Yeob Yeun, Mohamed Jamal Zemerly:
Understanding the security challenges of virtualized environments. ICITST 2011: 67-72 - [c9]Hussam M. N. Al Hamadi, Chan Yeob Yeun, Mohamed Jamal Zemerly, Mahmoud Al-Qutayri, Amjad Gawanmeh:
Formal modeling and verification of DLK protocol. ICITST 2011: 578-583 - 2010
- [j5]Duc-Liem Vo, Hyunrok Lee, Chan Yeob Yeun, Kwangjo Kim:
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings. Comput. Electr. Eng. 36(1): 155-159 (2010) - [c8]Khawla Alghafli, Chan Yeob Yeun:
New authentication protocol for IP CAS of IPTV. ICITST 2010: 1-6 - [c7]Dang Nguyen Duc, Kwangjo Kim, Chan Yeob Yeun:
Reconsidering Ryu-Takagi RFID authentication protocol. ICITST 2010: 1-6 - [c6]Hyeran Mun, Chan Yeob Yeun, Kyusuk Han, Byung-Ho Chung:
Enhancement of anonymous authentication scheme in wireless sensor network. ICITST 2010: 1-4
2000 – 2009
- 2009
- [c5]Mouza Ahmad Bani Shemaili, Chan Yeob Yeun, Mohamed Jamal Zemerly:
RFID lightweight mutual authentication using shrinking generator. ICITST 2009: 1-6 - [c4]Chan Yeob Yeun, Salman Mohammed Al-Marzouqi:
Practical Implementations for Securing VoIP Enabled Mobile Devices. NSS 2009: 409-414 - 2008
- [j4]Nai-Wei Lo, Kuo-Hui Yeh, Chan Yeob Yeun:
New mutual agreement protocol to secure mobile RFID-enabled devices. Inf. Secur. Tech. Rep. 13(3): 151-157 (2008) - [j3]Chan Yeob Yeun, Kyusuk Han, Duc-Liem Vo, Kwangjo Kim:
Secure authenticated group key agreement protocol in the MANET environment. Inf. Secur. Tech. Rep. 13(3): 158-164 (2008) - 2005
- [j2]Anand S. Gajparia, Chris J. Mitchell, Chan Yeob Yeun:
Supporting User Privacy in Location Based Services. IEICE Trans. Commun. 88-B(7): 2837-2847 (2005) - 2004
- [c3]Divyan M. Konidala, Chan Yeob Yeun, Kwangjo Kim:
A secure and privacy enhanced protocol for location-based services in ubiquitous society. GLOBECOM 2004: 2164-2168 - 2003
- [c2]Georgios Kalogridis, Chan Yeob Yeun, Gary Clemo:
Flexible Delegation Security for Improved Distribution in Ubiquitous Environments. SEC 2003: 361-372 - 2000
- [b1]Chan Yeob Yeun:
Design, analysis and applications of cryptographic techniques. Royal Holloway, University of London, UK, 2000
1990 – 1999
- 1999
- [c1]Chan Yeob Yeun:
Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison. IMACC 1999: 307- - 1998
- [j1]Chris J. Mitchell, Chan Yeob Yeun:
Fixing a Problem in the Helsinki Protocol. ACM SIGOPS Oper. Syst. Rev. 32(4): 21-24 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-01 00:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint