​
Login / Signup
Kihun Hong
ORCID
Publication Activity (10 Years)
Years Active: 2004-2024
Publications (10 Years): 5
Top Topics
Countermeasures
Visual Information
False Positives
Rural Areas
Top Venues
ICASSP
HSI
WDC@AsiaCCS
ICML
</>
Publications
</>
Kihun Hong
,
Ada Kanapskyte
,
Harshavardhana T. Gowda
,
Wilsaan M. Joiner
,
Lee M. Miller
,
Stephen K. Robinson
,
Sanjay S. Joshi
,
Jonathon S. Schofield
The Influence of Haptic Feedback and Visual Information on Multi-Limb Coordination.
HSI
(2024)
Thien-Phuc Doan
,
Kihun Hong
,
Souhwan Jung
GAN Discriminator based Audio Deepfake Detection.
WDC@AsiaCCS
(2023)
Long Nguyen-Vu
,
Thien-Phuc Doan
,
Mai Bui
,
Kihun Hong
,
Souhwan Jung
On the Defense of Spoofing Countermeasures Against Adversarial Attacks.
IEEE Access
11 (2023)
Thien-Phuc Doan
,
Long Nguyen-Vu
,
Souhwan Jung
,
Kihun Hong
BTS-E: Audio Deepfake Detection Using Breathing-Talking-Silence Encoder.
ICASSP
(2023)
Sejun Park
,
Kihun Hong
,
Ganguk Hwang
Towards Understanding Ensemble Distillation in Federated Learning.
ICML
(2023)
Kihun Hong
,
Souhwan Jung
,
Namhi Kang
,
Younghan Kim
Integrated Authentication Model for Network Access in Next Generation Networks.
IEICE Trans. Commun.
(11) (2007)
Namhi Kang
,
Seongil Yoo
,
Younghan Kim
,
Souhwan Jung
,
Kihun Hong
Heterogeneous Routing Protocol Coordinator for Mobile Ad Hoc Networks.
UCS
(2006)
Kihun Hong
,
Souhwan Jung
A Hierarchical Key Management Scheme for Authentication of Roaming Mobile Nodes between Domains in Mobile Networks.
IEICE Trans. Commun.
(12) (2006)
Kihun Hong
,
Souhwan Jung
,
Shyhtsun Felix Wu
A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network.
WISA
(2005)
Kihun Hong
,
Souhwan Jung
An Efficient Authentication Scheme Using Recovery Information in Signature.
ICICS
(2004)
Kihun Hong
,
Souhwan Jung
,
Luigi Lo Iacono
,
Christoph Ruland
Impacts of Security Protocols on Real-Time Multimedia Communications.
WISA
(2004)