Jian Wang, Xiaodong Yang, Youwen Zhu, Junbeom Hur, Changhee Hahn, Xiaohui Ding, and Zhiqiang Zhang. “Decoupled and Privacy-Preserving Key Generation in ABE under the Minimal Disclosure Principle,” IEEE Transactions on Information Forensics and Security, accepted on 13 Feb 2026.
Hyunsoo Kim, Doowon Kim, Hodong Kim, Changhee Hahn, and Junbeom Hur. “Certificate Revocation in the TLS Ecosystem: A Survey,” ACM Computing Surveys, DOI: 10.1145/3785653, 20 Dec 2025.
Junaid Ahmad Khan, Muhammad Asif Khan, Nasir Saeed, Pierre Louis Cayrel, and Changhee Hahn. “Intrusion Detection Systems for In-Vehicle Networks: Protocols, Applications, and Challenges,” IEEE Access, DOI: 10.1109/ACCESS.2025.3645058, 18 Dec 2025.
Seokhee Kim and Changhee Hahn. “Dataset Ownership Verification with Invisible Backdoors,” Applied Intelligence, DOI: 10.1007/s10489-025-06994-1, 26 Nov 2025.
Zeinab Rezaeifar, Zahra Alavikia, and Changhee Hahn. “Location-based early detection and prevention of DDoS attacks in mMTC networks,” Ad Hoc Networks, DOI: 10.1016/j.adhoc.2025.104090, 06 Nov 2025.
Changhee Hahn. “Towards Secure and Efficient Wildcard Search for Cloud Storage,” IEEE Transactions on Dependable and Secure Computing, DOI: 10.1109/TDSC.2025.3594321, 31 Jul 2025.
Seokhee Kim and Changhee Hahn. “DOBEL: Detecting Backdoors in Ensemble Learning,” Cluster Computing, DOI: 10.1007/s10586-024-04961-y, 28 Apr 2025.
Kangmo Ahn, Chaewon Kwak, Dongyoung Koo, Changhee Hahn, and Junbeom Hur. “Quantifying Security in Volume-hiding Searchable Symmetric Encryption Schemes with a Novel Scoring Metric,” IEEE Access, DOI: 10.1109/ACCESS.2025.3557784, 04 Apr 2025.
Zeinab Rezaeifar and Changhee Hahn. “Securing Multi-Client Range Queries over Encrypted Data,” Cluster Computing, DOI: 10.1007/s10586-024-04472-w, 26 Apr 2024.
Hyundo Yoon, Muncheon Yu, Changhee Hahn, Dongyoung Koo, and Junbeom Hur. “Exploiting Hidden Information Leakages in Backward Privacy for Dynamic Searchable Symmetric Encryption,” Applied Sciences, DOI: 10.3390/app14062287, 08 Mar 2024.
Hyundo Yoon, Muncheon Yu, Chaewon Kwak, Changhee Hahn, Dongyoung Koo, and Junbeom Hur. “Shedding Light on Blind Spot of Backward Privacy in Dynamic Searchable Symmetric Encryption,” IEEE Access, DOI: 10.1109/ACCESS.2023.3345024, 19 Dec 2023.
Hodong Kim, Changhee Hahn, Hyunwoo J. Kim, Youngjoo Shin, and Junbeom Hur. “Deep Learning based Detection for Multiple Cache Side-channel Attacks,” IEEE Transactions on Information Forensics and Security, DOI: 10.1109/TIFS.2023.3340088, 05 Dec 2023.
Jaehwan Park and Changhee Hahn. “Priest: Adversarial Attack Detection Techniques for Signal Injection Attacks,” IEEE Access, DOI: 10.1109/ACCESS.2023.3307133, 22 Aug 2023.
Changhee Hahn, Hyundo Yoon, and Junbeom Hur. “Multi-Key Similar Data Search on Encrypted Storage with Secure Pay-Per-Query,” IEEE Transactions on Information Forensics and Security, DOI: 10.1109/TIFS.2023.3236178, 11 Jan 2023.
Hyunsoo Kwon, Sangtae Lee, Minjae Kim, Changhee Hahn, and Junbeom Hur. “Certificate Transparency with Enhanced Privacy,” IEEE Transactions on Dependable and Secure Computing, DOI: 10.1109/TDSC.2022.3214235, 13 Oct 2022.
Hyunsoo Kwon and Changhee Hahn. “Asymptotically Optimal and Secure Multiwriter/Multireader Similarity Search,” IEEE Access, DOI: 10.1109/ACCESS.2022.3208962, 22 Sep 2022.
Changhee Hahn, Hyunsoo Kwon, Daeyeong Kim, and Junbeom Hur. “Enabling Fast Public Auditing and Data Dynamics in Cloud Services,” IEEE Transactions on Services Computing, DOI: 10.1109/TSC.2020.3030947, 8 Aug 2022.
Changhee Hahn and Junbeom Hur. “Delegatable Order-Revealing Encryption for Reliable Cross-Database Query,” IEEE Transactions on Services Computing, DOI: 10.1109/TSC.2022.3192551, 20 Jul 2022.
Hyunsoo Kwon, Junbeom Hur, and Changhee Hahn. “Order-Hiding Range Query over Encrypted Cloud Data,” IEEE Access, DOI: 10.1109/ACCESS.2022.3192421, 19 Jul 2022.
Changhee Hahn and Jongkil Kim. “Verifiable Outsourced Decryption of Encrypted Data from Heterogeneous Trust Networks,” IEEE Internet of Things Journal, DOI: 10.1109/JIOT.2022.3181684, 09 Jun 2022.
Changhee Hahn, Jongkil Kim, Hyunsoo Kwon, and Junbeom Hur. “Efficient IoT Management with Resilience to Unauthorized Access to Cloud Storage,” IEEE Transactions on Cloud Computing, DOI: 10.1109/TCC.2020.2985046, 01 Apr 2022.
Changhee Hahn, Hodong Kim, Minjae Kim, and Junbeom Hur. “VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning,” IEEE Transactions on Dependable and Secure Computing, DOI: 10.1109/TDSC.2021.3126323, 09 Nov 2021.
Hyundo Yoon, Soojung Moon, Youngki Kim, Changhee Hahn, Wonjun Lee, and Junbeom Hur. “SPEKS: Forward Private SGX-based Public Key Encryption with Keyword Search,” Applied Sciences, DOI: 10.3390/app10217842, 05 Nov 2020.
Hyunsoo Kwon, Hyunjae Nam, Sangtae Lee, Changhee Hahn, and Junbeom Hur. “(In-)Security of Cookies in HTTPS: Cookie Theft by Removing Cookie Flags,” IEEE Transactions on Information Forensics and Security, Vol. 15, pp. 1204-1215, 2020. DOI: 10.1109/TIFS.2019.2938416
Changhee Hahn, Hyunsoo Kwon, and Junbeom Hur. “Trustworthy Delegation toward Securing Mobile Healthcare Cyber-Physical Systems,” IEEE Internet of Things Journal, Vol. 6, No. 4, pp. 6301-6309, 2019. DOI: 10.1109/JIOT.2018.2878216
Hyunsoo Kwon, Changhee Hahn, Kyungtae Kang, and Junbeom Hur. “Secure Deduplication with Reliable and Revocable Key Management in Fog Computing,” Peer-to-Peer Networking and Applications, Vol. 12, No. 4, pp. 850-864, 2019. DOI: 10.1007/s12083-018-0682-9
Changhee Hahn, Hyungjune Shin, Hyunsoo Kwon, and Junbeom Hur. “Efficient Multi-User Similarity Search over Encrypted Data in Cloud Storage,” Wireless Personal Communications, 107(3), pp. 1337-135, 2018. DOI: 10.1007/s11277-018-5744-z
Changhee Hahn, Hyunsoo Kwon, and Junbeom Hur. “Efficient attribute-based secure data sharing with hidden policies and traceability in mobile health networks,” Mobile Information Systems, 2016. DOI: 10.1155/2016/6545873
Hyunsoo Kwon, Daeyoung Kim, Changhee Hahn, and Junbeom Hur. “Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks,” Multimedia Tools and Applications, 76(19), pp. 19507-19521, 2016. DOI: 10.1007/s11042-015-3187-z
Daeyoung Kim, Hyunsoo Kwon, Changhee Hahn, and Junbeom Hur. “Privacy-preserving public auditing for educational multimedia data in cloud computing,” Multimedia Tools and Applications, 75(21), pp. 13077-13091, 2015. DOI: 10.1007/s11042-015-2594-5
Hyunsoo Kwon, Changhee Hahn, Daeyoung Kim, and Junbeom Hur. “Secure deduplication for multimedia data with user revocation in cloud storage,” Multimedia Tools and Applications, 76(4) pp. 5889-5903, 2015. DOI: 10.1007/s11042-015-2595-4
Changhee Hahn, Hyunsoo Kwon, Daeyoung Kim, and Junbeom Hur. “Enhanced authentication for outsourced educational contents through provable block possession,” Multimedia Tools and Applications, 75(21), pp. 13057-13076, 2015. DOI: 10.1007/s11042-015-2593-6