Publication

  • Publications

    Papers:

    1. "Which Option is a Cost-Efficient Way to Improve Transfer Learning Performance?" Theoretical Computer Science in writing.
    2. "Pairwise Gaussian GCN:Defending Against Graph Adversarial Attacks," IEEE Transactions on Artificial Intelligence in writing.
    3. T.Kim, D. Seo, S. Kim, I. Lee, "A Comprehensive Approach to User Delegation and Anonymity within Decentralized Identifiers for IoT," in Sensors as part of the Special Issue Security, Cybercrime, and Digital Forensics for the IoT, 2023. https://doi.org/10.3390/s24072215.
    4. B. Xie, H. Xu, Y. Joe, Z. Cai, D. Seo, "Lightweight Super-Resolution Model for Complete Model Copyright Protection" in Tsinghua Science and Technology, 2023. https://doi.org/10.26599/TST.2023.9010082.
    5. T.Kim, Y. Hwang, D. Seo, I. Lee, "Data Access Control for Secure Authentication using Dual VC scheme based on CP-ABE in DID" in Journal of Circuits, Systems, and Computers, 2023. https://doi.org/10.1142/S0218126624500944.
    6. K.Zhang, D. Shin, D. Seo, Z. Cai, "Few-Shot Graph Classification with Structural-Enhanced Contrastive Learning for Graph Data Copyright Protection," in Tsinghua Science and Technology, 2023. https://doi.org/10.26599/TST.2023.9010071.
    7. H.Song, T.Kim, Y. Hwang, D. Seo, I. Lee, "A Study on Dynamic Group Signature Scheme with Threshold Traceability for Blockchain," in High-Confidence Computing, 2023. https://doi.org/10.1016/j.hcc.2023.100163
    8. C. Wang, Z.Cai, D. Seo, Y.Li, "TMETA: Trust Management for the Cold Start of IoT Services with Digital-Twin-Aided Blockchain," in IEEE Internet of Things, 10.1109/JIOT.2023.3285108
    9. H.Lee and D. Seo, "FedLC: Optimizing Federated Learning in Non-IID Data via Label-wise Clustering," in IEEE Access, 2023, https://doi.org/10.1109/ACCESS.2023.3271517.
    10. K. Zhang, Z. Cai, D. Seo, "Privacy-Preserving Federated Graph Neural Network Learning on Non-IID Graph Data," in Wireless Communications and Mobile Computing, vol. 2023, Article ID 8545101, 13 pages, 2023. https://doi.org/10.1155/2023/8545101
    11. D. Seo, "A Study on C-ITS Security Technology Analysis," in Journal of Korea Software Assessment and Valuation Society, vol 18, No.2, pp. 103-113, 2022.
    12. D. Seo, "A Study on Secure Cloud Analysis for National Infrastructure," in Journal of Korea Software Assessment and Valuation Society, vol 18, No.2, pp. 141-151, 2022.
    13. Y. Hwang, H. Song, D. Seo, and I. Lee, "A Study on Data Sharing Scheme using ECP-ABSC that Provides Data User Traceability in the Cloud," in KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 16, NO. 12, Dec. 2022. http://doi.org/10.3837/tiis.2022.12.015.
    14. H. Lee, M. Kang, Y. Li, D. Seo, D. Kim, "Epidemic Vulnerability Index for Effective Vaccine Distribution against Pandemic," in IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2022, doi: 10.1109/TCBB.2022.3198365.
    15. W. Kim, S. Kim, D. Seo, I. Lee, "Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs," Wireless Communications and Mobile Computing, vol. 2022, Article ID 1903197, 17 pages, 2022. https://doi.org/10.1155/2022/1903197.
    16. Y. Hwang, S. Kim, D. Seo, I. Lee, "An SKP-ABE Scheme for Secure and Efficient Data Sharing in Cloud Environments", Wireless Communications and Mobile Computing, vol. 2022, Article ID 1384405, 18 pages, 2022. https://doi.org/10.1155/2022/1384405
    17. H. Ren, S. Kim, D. Seo and I. Lee, "A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks," KSII Transactions on Internet and Information Systems, vol. 16, no. 5, pp. 1687-1707, 2022. DOI: 10.3837/tiis.2022.05.015.
    18. H. Lee, M. Kang, Y. Li, D. Seo, D. Kim, "Epidemic Vulnerability Index for Effective Vaccine Distribution against Pandemic," Bioinformatics Research and Applications. ISBRA 2021. Lecture Notes in Computer Science, vol 13064. Springer, Cham. (https://doi.org/10.1007/978-3-030-91415-8_3)
    19. S. Zhu, R. Li, Z. Cai, D. Kim, D. Seo, W. Li "Secure Verifiable Aggregation for Blockchain-based Federated Averaging," High-Confidence Computing, Volume 2, Issue 1, pp.1-8, 2021. (https://doi.org/10.1016/j.hcc.2021.100046).
    20. W. Kim, S. Kim, D. Seo. I. Lee, Broadcast Proxy Reencryption Based on Certificateless Public Key Cryptography for Secure Data Sharing," Wireless Communications and Mobile Computing, vol. 2021, Article ID 1567019, 16 pages, 2021. (https://doi.org/10.1155/2021/1567019)
    21. J. Li, C. Wang, D.Seo, X.Cheng, Y. He, L. Sun, K. Xiao, "Deep Learning-based Service Scheduling Mechanism for Green RSUs in IoVs," Wireless Communications and Mobile Computing, vol. 2021, Article ID 7018486, 15 pages (https://doi.org/10.1155/2021/7018486)
    22. V. Malladi, Y. Li, M. Siddula, D. Seo and, Y. Huan, "Decentralized Aggregation Design and Study of Federated Learning," 2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI), pp. 328-337, 2021. (doi: 10.1109/SWC50871.2021.00052)
    23. D. Lee, W. Kim, D. Seo, I. Lee, "An Efficient Public Verifiable Certificateless Multi-Receiver Signcryption Scheme for IoT Environments," IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E104D, no.11, pp.1869-1879, 2021. (https://doi.org/10.1587/transinf.2021NGP0012)
    24. K. Zhang, Z. Tian, Z. Cai and D. Seo, "Link-privacy preserving graph embedding data publication with adversarial learning," in Tsinghua Science and Technology, vol.27, no.2, pp.244-256, April 2022. (doi: 10.26599/TST.2021.9010015)
    25. T.Kim, W. Kim, D. Seo, I. Lee, "A Secure Encapsulation schemes based on Key Recovery System in IoMT Environment" Sensors, 21(10), 3474, 2021. (https://doi.org/10.3390/s21103474)
    26. W. Kim, D. Seo, D. Kim, I. Lee, "Group Delegated ID-based Proxy Re-encryption for Enterprise Cloud Storage Environment" Wireless Communications and Mobile Computing, vol. 2021, Article ID 7641389, 12 pages, 2021. (https://doi.org/10.1155/2021/7641389)
    27. W. Kim, D. Seo, D. Kim, I. Lee, "Data Distribution for Multiple Receiver in Connected Car Environment using 5G Communication," in Security and Communication Networks (Hindawi) (https://www.hindawi.com/journals/scn/2021/5599996/)
    28. V. Zeufack, D. Kim, D. Seo, A. Lee, "An Unsupervised Anomaly Detection Framework for Detecting Anomalies in Real Time through Network System’s Log Files Analysis," in High-Confidence Computing, 2021. (https://doi.org/10.1016/j.hcc.2021.100030)
    29. G. Ra, D. Seo, D. Kim, I. Lee, "A Federated Framework for Fine-Grained Cloud Access Control for Service Providers" in IEEE Access, 2021, 10.1109/ACCESS.2021.3067958 (https://ieeexplore.ieee.org/document/9382975)
    30. J. Sharma, D. Kim, A. Lee, D. Seo, "On Differential Privacy based Framework for Enhancing User Data Privacy in Mobile Edge Computing Environment," in IEEE Access, vol. 9, pp.38107-38118, 2021. (doi: 10.1109/ACCESS.2021.3063603)
    31. J. Sharma, D. Kim, A. Lee, D. Seo, "Differential Privacy using Fuzzy Convolution NeuralNetwork (DP-FCNN) with Laplace Mechanism and Authentication Access in Edge Computing," The 14th IEEE International Conference on Ubiquitous Information Management and Communication (IMCOM 2021), 2021.01.
    32. T. Kim, W. Kim, D. Seo and I. Lee, "Secure Encapsulation Schemes based on Key Recovery System," SVCC 2020 (Silicon Valley Cybersecurity Conference), 2020.12. https://link.springer.com/chapter/10.1007%2F978-3-030-72725-3_2
    33. Zaobo He, Akshita Maradapu Vera Venkata Sai, Yan Huang, Daehee Seo and Hanzhou Zhang, "Differentially private approximate aggregation based on feature selection," Journal of Combinatorial Optimization (JOCO), 41, pp. 318–327, 2021. (https://doi.org/10.1007/s10878-020-00666-1)
    34. G. Ra, D. Seo, M. Z. A. Bhuiyan, I. Lee, "An Anonymous Protocol with User Identification and Linking Capabilities for User Privacy in a Permissioned Blockchain," Electronics, 9(8), 1183. 2020 (https://doi.org/10.3390/electronics9081183)
    35. M. Jang, D. Kim, S. Ryu, Y. Ju, D. Seo, H. Yoon, "An Intelligent Recommendation Algorithm for Red Team Strategy in Edge Computing Powered Massive Cyber Defense Exercise," Computer Communications (ComCom) vol. 165, pp. 141-148, January 2021. (https://doi.org/10.1016/j.comcom.2020.10.008)
    36. D. Kim, J. Son, D. Seo, Y. Kim, J. Seo, "A Novel Transparent and Auditable Fog-Cloud Storage Framework with Compensation Mechanism," Tshinghua Science and Technology, Volume: 25 , Issue: 1, pp.465-464, Feb. 2020.
    37. G. Ra, D. Seo, M. Z. A. Bhuiyan, I. Lee, "A Study on Anonymous Protocol in a Permission Blockchain with Ensure Privacy for a Member," SpaCCS 2019 (LNCS, volume: 11611), pp.456-464, 2019.
    38. Daehee Seo, MiYeon Yoon, ByungGil Lee, DongSub Cho, Jang-Mi Baek, “Improved Secure Durability Service for Digital Content support OSMU,” INFORMATION-An International Interdisciplinary Journal, Vol.17, No.5, pp.1877-1884, 2014. (SCOPUS&EBSCO)
    39. Daehee Seo, “Anchorage Deviation Ship Management and Monitoring Scheme,” International Journal of Control and Automation, Vol.7, No.8, pp.13-18. 2014. (SCOPUS&EBSCO and EI index)
    40. Daehee Seo, JongHyun Kim, ByungGil Lee and JangMi Baek, “Architecture for Dynamic Security Service in Overlay Network Environments,” INFORMATION-An International Interdisciplinary Journal, Vol.17, No.5, pp.1885-1892, 2014. (SCOPUS&EBSCO)
    41. DoHeyung Kim, Daehee Seo, ByungDoo Kim, ByungGil Lee, “A New Criterion Pose and Shape of Objects for Collision Risk Estimation,” International Conference on Electronics, Control and Signal Processing Conference 2013, pp. 1706-1710, 2013.12.30.
    42. ByungDoo Kim, DoHyeung Kim, Daehee Seo, ByungGil Lee, “GPU based Signal Processing for Sea Surveillance Radar,” IEEE ISPACS 2013, 2013.11.12.
    43. Daehee Seo, DoHyeung KIM, ByungGil LEE, JungChan, NA, HyunSuk CHO, KabSeung KO, JangMi BAEK, “Anchorage Deviation Ship Management based on Long Range Sensors,” ACIT 2013, pp. 211-215, 2013.08.
    44. Daehee Seo, SangWoo Lee, ByungDoo Kim, ByungGil Lee, JangMi Baek, “File Multi-analyses for Real-time attack source and spread site trace,” International Journal of Security and Its Applications, Vol 7, No. 3, pp. 215-222, 2013.05. (SCOPUS & EI Compendex)
    45. Sang-Woo Lee, Byung-Gil Lee and Daehee Seo, “Robust Video Watermarking Based on Temporal Modulation with Error Correcting Code,” International Journal of Security and Its Applications Vol. 7, No. 3, pp. 367-376, 2013.05. (SCOPUS & EI Compendex)
    46. Daehee Seo, Jang-Mi Baek, Gae-il An, Jong-Hyen Kim, "Scalable wireless network security for Bluetooth in Global collaborative environment," U-media 2011, pp.1-6, 2011.07.
    47. Hyung-Jin Lim, Moonseong Kim, Jong-Hyouk Lee, Daehee Seo, Tai M. Chung, “Reducing Communication Overhead for Nested NEMO Networks: Roaming Authentication and Access Control Structure,” Journal of IEEE Transactions on Vehicular Technology, pp1-17. 2011.07.
    48. Daehee Seo, JangMi Baek, Gaeil An, JoungHyun Kim, “Scalable wireless network security for Bluetooth in Global collaborative environment,” U-media 2011, pp.1-6, 2011.07.
    49. Gaeil An, Daehee Seo, JoungHyun Kim, Kiyoung Kim, Dingil Seo, “Context-based Remote Security Control for Mobile Communication Device,” ISCIT 2010, pp815-820, 2010.10
    50. Daehee Seo, Jang-Mi Baek, Dong-Sub Cho, “Secure RFID Authentication Scheme for EPC Class Gen2,” ICUIMC 2009, pp.221-227, 2009.
    51. Daehee Seo, Jang-Mi Baek, Dong-Sub Cho, “Secure Authentication and Management Scheme for RFID,” MSWIM 2008, pp.106-110, 2008.
    52. Seokung Youn, JoongMan Kim, Daehee Seo, YuJae Won, “A Lightweight Cryptographic Capability Negotiation Mechanism based on MIKEY for VoIP, JWIS 2007, pp.383-391, 2007.7.10.
    53. Taejin Lee, Younggeun Won, Daehee Seo, YuJae Won, “A Development of Secure VoIP Application Service based on XCAP, JWUS 2007, pp.299-306, 2007.7.10.
    54. Daehee Seo, Jang-Mi Baek, Jiang Li, Soo-Young Kang, Im-Yeong Lee, Hyung-Geun Oh, “A Study on Improved RFID Authentication Scheme,” MUE 07, pp567-572, 2007.
    55. Daehee Seo, Jang-Mi Baek, Dong-sub Cho, "Secure Authentication and Management Scheme for RFID," ACM Q2SWinet, pp.106-110, 2008.
    56. Daehee Seo, Jang-Mi Baek, Seung-Hee Yoo, So-hee Han, Yil-Hyeong Moon, and Dong-sub Cho, "Hierarchical Secure Authentication of Scalable Bluetooth Scatternet in Ubiquitous Healthcare System," IEEE BIBM, poster section, 2008.
    57. Sohee Han, Daehee Seo, Seunghee Yoo, Yil-Heong Mun, and Dong-sub Cho, "Towards Personalized Protection for Personal Content," IEEE BIBM, poster section, 2008.
    58. Yil-hyeong Mun, Sohee Han, Seunghee Yoo, Daehee Seo, and Dong-sub Cho, /"Web Link Group Recommend System Design using Page Classification for Bio Web Information Search" IEEE BIBM, poster section, 2008.
    59. Daehee Seo, Im-Yeong Lee, Hee-Un Park, "A Study on Secure SDP of RFID using Bluetooth Communication", ICCSA 2005, pp117-126, 2005. (LNCS 3381, SCIE:Science Citation Index Expanded)
    60. Daehee Seo, Deok-Gyu Lee, Im-Yeong Lee, "A Study on Scalable Bluetooth Piconet for Secure Ubiquitous", HSI 2005, pp45-56, 2005. (LNCS 3597, SCIE)
    61. Deok-Gyu Lee, Seo-il Kang, Daehee Seo, Im-Yeong Lee, “Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification”, ICCSA 2006, pp326-335, 2006. (LNCS 3983, SCIE)
    62. Daehee Seo, Im-Yeong Lee, "A Study on Secure and Efficient Sensor Network Management Scheme Using PTD", ICCSA 2004, pp1020-1028, 2004. (LNCS 3045, SCIE)
    63. Daehee Seo, Im-Yeong Lee, Hee-Un Park, "A Study on Key Recovery Agent Protection Profile Having Composition Function", ICCSA 2004, pp557-566, 2004. (LNCS 3043, SCIE)
    64. Daehee Seo, Im-Yeong Lee, Soo-Young Chae, Choon-Soo Kim, “Single Sign-On Authentication Model using MAS(Multi-Agent System)” PacRim 2003 proceeding, pp1138-1141, 2003.
    65. Daehee Seo, Im-Yeong Lee, Dong-Ik Oh, Doo-Soon Park, "Secure Bluetooth Piconet Using Non-anonymous Group Key", EurAsia-ICT2002, pp766~777, 2002. (LNCS 2510, SCIE)
    66. Daehee Seo, Im-Yeong Lee, "A Study on Secure Payment System Applying Bluetooth" SAM '02(International Conference on Security and Management), pp155~161, 2002.
    67. Daehee Seo, Hee-Un Park, Kyung-Su Lee, Dong-Sik Kim, Im-Yeong Lee, Yong-Hae Kog "Information-Gathering Secure Mobile Agent", International Conference on East-Asian Language Processing and Internet Information Technology 2002, pp181~184, 2002.
    68. Daehee Seo, Hee-Un Park, Im-Yeong Lee, "A Study on Security of Integration Administration System for the EC", International Conference on East-Asian Language Processing and Internet Information Technology 2002, pp185~192, 2002.
  • US Patents

    1. Daehee Seo, SungHee Oh, ByungDoo Kim, DoHyung Kim, KwanTae Cho, JoongYoung Chi, ByungGil Lee, JoongChan Na, “COLLISION RISK PREDICTION METHOD AND APPARATUS USING METEOROLOGICAL INFORMATION,” 14/644001, May, 2015.
    2. Daehee Seo, SungHee Oh, ByungDoo Kim, DoHyung Kim, KwanTae Cho, JoongYoung Chi, ByungGil Lee, JoongChan Na, “Time and event related ship detection method using DPAOI(Data Processing with Area of Interest) search at recorded data of AIS, radar and CCTV”, 14/643572, May, 2015.
    3. Daehee Seo, SungHee Oh, ByungDoo Kim, DoHyung Kim, KwanTae Cho, JoongYoung Chi, ByungGil Lee, JoongChan Na, “The optical CCTV system’s multi-fusion ship tracking and display method using co-integrated tracking position value and information with Radar and AIS,” 14/630683, February, 2015.
    4. Daehee Seo, SungHee Oh, ByungDoo Kim, DoHyung Kim, KwanTae Cho, JoongYoung Chi, ByungGil Lee, JoongChan Na, “Method of Anchorage Deviation Ship Management and Monitoring Scheme using Spherical Trigonometry based on Long Range Sensors”, 14/330230, July, 2014.
    5. Daehee Seo, JaeHoon Na, ByungGil Lee, HyunSuk Cho, “Mulitiple authenticaiton method for web multi contents,” 14/028011, 2013.9.16
    6. Daehee Seo, Gae-il An, Sung-Won Lee, Gi-Young Kim, Jong-Hyun Kim, Sun-Hee Lim, “Method and Apparatus of anonymity-based cyber security information sharing for protecting personal identification information,” 13/493120, 2012.06.
    7. Daehee Seo, Sun-Hee Lim, Gae-il An, Sung-Won Lee, Gi-Young Kim, Jong-Hyun Kim, “System and method for sharing information between heterogeneous service providers,” 13/473515, 2012.05.
    8. Daehee Seo, Sun-Hee Lim, Gae-il An, Sung-Won Lee, Gi-Young Kim, Jong-Hyun Kim, “Apparatus and Method for the Prediction of Cyber Threats,” 13/451,375, 2012.04.
    9. Daehee Seo, Gae-il An, Sung-Won Lee, Gi-Young Kim, Jong-Hyun Kim, Sun-Hee Lim, “METHOD OF SECURE NETWORKS INFORMATION SHARING FOR GLOBAL COLLABORATIVE,” 13/473515, 2012.05.
    10. Daehee Seo, Yong-Hyuk Moon, Hyeok-Chan Kwon, Seung-Min Lee, Jae-Hoon Nah, Taek-Yong Nam, Dong-il Seo, “Security Label Generation method and apparatus for scalable content distribution,” 13/329,769, 2011.12.
    11. Daehee Seo, Hyeok-Chan Kwon, Seung-Min Lee, Yong-Hyuk Moon, Jae-Hoon Nah, Taek-Yong Nam, Dong-il Seo, “Authentication Apparatus and method for Non-Real IPTV system,” 13/170,331 2011.06.28.
    12. Daehee Seo, Hyeok-Chan Kwon, Seung-Min Lee, Yong-Hyuk Moon, Jae-Hoon Nah, Taek-Yong Nam, Dong-il Seo, “CONTENT SHARING METHOD BASED ON NON-REALTIME IPTV SERVICE,” 13/167,256 2011.06.23
    13. Daehee Seo, Hyeok-Chan Kwon, Seung-Min Lee, Yong-Hyuk Moon, Jae-Hoon Nah, Taek-Yong Nam, Dong-il Seo, “Method and System for Providing Layered Access Control for Scalable media,” 13/329,492 2011.12.19.
  • Thesis/Dissertation

    Thesis/Dissertation:

    • Ph.D. Dissertation : A Study on Secure and Efficient Crypto Protocols for Ubiquitous Environment, Feb 2006.
    • M.S. Thesis : A Study on Security and Crypto Protocols for Secure Networks, Feb 2003.