scispace - formally typeset
H

Howon Kim

Researcher at Pusan National University

Publications -  297
Citations -  3405

Howon Kim is an academic researcher from Pusan National University. The author has contributed to research in topics: Encryption & Cryptography. The author has an hindex of 25, co-authored 270 publications receiving 2788 citations. Previous affiliations of Howon Kim include Electronics and Telecommunications Research Institute & Katholieke Universiteit Leuven.

Papers
More filters
Proceedings ArticleDOI

Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection

TL;DR: This paper applies Long Short Term Memory (LSTM) architecture to a Recurrent Neural Network (RNN) and train the IDS model using KDD Cup 1999 dataset and confirms that the deep learning approach is effective for IDS.
Book ChapterDOI

WIPI mobile platform with secure service for mobile RFID network environment

TL;DR: A light-weight security mechanism which is constructed by mobile RFID security mechanism based on WIPI (Wireless Internet Platform for Interoperability) can be applicable to various mobile RFIDs services that required secure business applications in mobile environment.
Journal ArticleDOI

Nonintrusive Load Monitoring Based on Advanced Deep Learning and Novel Signature

TL;DR: It is shown that the combination between advanced deep learning and novel signature can be a robust solution to overcome NILM's issues and improve the performance of load identification.
Journal ArticleDOI

Design and implementation of a private and public key crypto processor and its application to a security system

TL;DR: The design and implementation of a crypto processor, a special-purpose microprocessor optimized for the execution of cryptography algorithms, which can be used for various security applications such as storage devices, embedded systems, network routers, security gateways using IPSec and SSL protocol, etc.
Proceedings ArticleDOI

An Effective Intrusion Detection Classifier Using Long Short-Term Memory with Gradient Descent Optimization

TL;DR: This paper finds the most suitable optimizer among six optimizes for Long Short-Term Memory Recurrent Neural Network (LSTM RNN) model applied in IDS and demonstrates the approach is really efficiency to intrusion detection with accuracy is 97.54%, detection rate is 98.95%, and false alarm rate is reasonable.