Sign in
Sung-Hoon Lee
ORCID
Publication Activity (10 Years)
Years Active: 2013-2021
Publications (10 Years): 8
Top Topics
Authentication Scheme
Keystroke Dynamics
Identity Verification
Discriminating Features
Top Venues
ISSRE Workshops
Pervasive Mob. Comput.
Secur. Commun. Networks
Digital Identity Management
</>
Publications
</>
Ji Sun Shin
,
Shincheol Lee
,
Seoyun Choi
,
Minjae Jo
,
Sung-Hoon Lee
A New Distributed, Decentralized Privacy-Preserving ID Registration System.
IEEE Commun. Mag.
59 (6) (2021)
Sung-Hoon Lee
,
Seung-Hyun Kim
,
Jung Yeon Hwang
,
Soohyung Kim
,
Seung-Hun Jin
Is Your Android App Insecure? Patching Security Functions With Dynamic Policy Based on a Java Reflection Technique.
IEEE Access
8 (2020)
Hyun-Gu Lee
,
Jung Yeon Hwang
,
Shincheol Lee
,
Dong In Kim
,
Sung-Hoon Lee
,
Jaehwan Lee
,
Ji Sun Shin
A parameterized model to select discriminating features on keystroke dynamics authentication on smartphones.
Pervasive Mob. Comput.
54 (2019)
Hyun-Gu Lee
,
Jung Yeon Hwang
,
Dong In Kim
,
Shincheol Lee
,
Sung-Hoon Lee
,
Ji Sun Shin
Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors.
Secur. Commun. Networks
2018 (2018)
Sung-Hoon Lee
,
Seung-Hyun Kim
,
Soohyung Kim
,
Seung-Hun Jin
AppWrapper: Patching Security Functions with Dynamic Policy on Your Insecure Android Apps.
ISSRE Workshops
(2018)
Sung-Hoon Lee
,
Jong-Hyuk Roh
,
Soohyung Kim
,
Seung-Hun Jin
Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment.
J. Inf. Process. Syst.
14 (2) (2018)
Sung-Hoon Lee
,
Seung-Hyun Kim
,
Soo-Hyung Kim
,
Seung-Hun Jin
Appwrapping Providing Fine-Grained Security Policy Enforcement Per Method Unit in Android.
ISSRE Workshops
(2017)
Sung-Hoon Lee
,
Jong-Hyuk Roh
,
Soo-Hyung Kim
,
Seung-Hun Jin
A Study on Feature of Keystroke Dynamics for Improving Accuracy in Mobile Environment.
WISA
(2016)
Seung-Hyun Kim
,
Daeseon Choi
,
Seung-Hun Jin
,
Sung-Hoon Lee
Geo-location based QR-Code authentication scheme to defeat active real-time phishing attack.
Digital Identity Management
(2013)