Publications
International Conferences
2024
Fast Private Location-based Information Retrieval over the Torus [link]
Joon Soo Yoo, Mi Yeon Hong, Ji Won Heo, Kang Hoon Lee, Ji Won Yoon, 20th IEEE International Conference on Advanced Video and Signal-Based Surveillance (AVSS 2024 in BK21 CS list)
Faster Homomorphic DFT and Speech Analysis for Torus Fully Homomorphic Encryption [link]
Kanghoon Lee, Youngbae Jeon, and Ji Won Yoon, 9th IEEE European Symposium on Security and Privacy (Euro S&P 2024)
2023
Equilibrium Point Learning [link]
Dowoo Baik, Ji Won Yoon, The 15th Asian Conference on Machine Learning (ACML), 2023
Cheap and Fast Iterative Matrix Inverse in Encrypted Domain [link]
Tae Min Ahn, Kang Hoon Lee, Joon Soo Yoo and Ji Won Yoon , 28th European Symposium on Research in Computer Security (ESORICS) 2023 in BK21 CS list
Differential privacy using Gamma distribution [link]
Yongbin Park, Minchul Kim, Ji Won Yoon, Proceedings of the 22nd IEEE Statistical Signal Processing Workshop, SSP 2023
Discretization Error Reduction for High Precision Torus Fully Homomorphic Encryption [link]
Kang Hoon Lee and Ji Won Yoon , 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings (PKC) 2023
Invasion of location privacy using online map services and smartphone sensors [link]
Hyunsoo Kim, Youngbae Jeon, and Ji Won Yoon, The 18th ACM Asia Conference on Computer and Communications Security (ACM ASIACCS) 2023 in BK21 CS list
2022
Manifold Learning-based Frequency Estimation for extracting ENF signal from digital video [link]
Youngbae Jeon, Hyekyung Han, and Ji Won Yoon , International Conference on Pattern Recognition (ICPR) 2022, in BK21 CS list
2021
Efficient Adaptation of TFHE for High End-to-End Throughput [link]
Kang Hoon Lee and Ji Won Yoon, International Conference on Information Security Applications (WISA 2021)
2020
Location tracking technique for Regional ENF Classification Using ARIMA [link]
S. Kim, J. W. Yoon, ICTC 2020
Comparison of various interpolation techniques to infer localization of audio files using ENF signals [link]
H Han, KH Lee, Y Jeon, JW Yoon, 2020 International Conference on Software Security and Assurance (ICSSA), 46-51
ResMax: Detecting Voice Spoofing Attacks with Residual Network and Max Feature Map [link]
I. Kwak, S. Kwak, J. Lee, J. H. Huh, C. Lee, Y. B. Jeon, J. Hwang, J. W. Yoon, International conference of Pattern Recognition (ICPR), 2020, in BK21 CS list)
2019
Static Malware Analysis in Encrypted Domain [link]
T. Hwang and J. W. Yoon, ICTC, 2019
Forecasting the Electric Network Frequency signals on Power Grid [link]
W. Bang, and J. W. Yoon, ICTC 2019
Model Selection for data analysis in encrypted domains: application to simple linear regression [link]
M. Hong, J. W. Yoon, WISA 2019, Lecture Notes in Computer Science book series (LNCS, volume 11897)
A Bitwise Logistic Regression using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme [link pdf]
J. S. Yoo, J. H. Hwang, B. K. Song and J. W. Yoon, The 15th International Conference on Information Security Practice and Experience (ISPEC 2019)
Voice Presentation Attack Detection through Text-Converted Voice Command Analysis [link]
I. Y. Kwak, I.J. Kim, J.H. Huh, and J. W. Yoon, The ACM CHI Conference on Human Factors in Computing Systems, (CHI 2019), in BK21 CS list
2018
A New Bayesian Approach to Exploring Damaged assets by Monitoring Mission Failures Caused by Undetected Attack
S.W. Shim and J. W. Yoon, WISA 2018
Logarithm Design on Encrypted Data with Bitwise Operation
J. S. Yoon, B.K. Song, and J. W. Yoon, WISA 2018
I'm Listening to your Location! Inferring User Location with Acoustic Side Channel
Y. Jeon, M. Kim, H. Kim, H. Kim, J. H. Huh and J. W. Yoon, “The Web Conference 2018” (WWW 2018), in BK21 CS list)
PD-FDS: Purchase Density based Online Credit Card Fraud Detection System [link]
Y.J. Ki and J. W. Yoon, Proceedings of the KDD 2017: Workshop on Anomaly Detection in Finance, PMLR 71:76-84, 2018.
2017
A new side channel attack on digital door lock with vibration signal analysis: The longer password does not guarantee higher security level
Y. M. Ha, S. H. Jang, K. W. Kim and J. W. Yoon, International Conference on Multisensor Fusion and Integration for Intelligent Systems (MFI), 2017
Construction of a National Scale ENF Map using Online Multimedia Data
H. Kim, Y. Jeon and J. W. Yoon, ACM International Conference on Information and Knowledge Management, long full research paper (CIKM) 2017, in BK21 CS list
Model Parameter Estimation and Inference on Encrypted domain: Application to Noise Reduction in Encrypted Images
S. Lee and J. W. Yoon, WISA, 2017 (Best paper awarded)
An efficient method to securely store and handle genomic data [link]
Y.J. Ki and J. W. Yoon, 2017 International Conference on Software Security and Assurance (ICSSA)
2016
Classification of Home Appliance by using Probabilistic KNN with Sensor Data [link]
Seung-Joon Kang, and J. W. Yoon, the Asia-Pacific Signal and Information Processing Association (APSIPA), 2016 [area: signal processing and IoT]
A new approach to building a disguised server using the honey port against general scanning attacks [link]
Hyunsoo Park, Youngbae Jeon, and J. W. Yoon, The 11th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), 2016 [area: Network security]
A Practical approach to constructing triple-blind review process with maximal anonymity and fairness [link]
J. S. Jung, J.-I. Kim and J. W. Yoon, The 17th World Conference on Information Security Applications (WISA), 2016 [area: privacy and anomaly]
Honey Chatting: A Novel Instant Messaging System Robust to Eavesdropping over Communication [link, poster]
J.-I. Kim and J. W. Yoon, IEEE the 41st IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2016
An adaptive approximation for Gaussian wavelet Kernel [link]
Y. M. Ha and J. W. Yoon, IEEE The 18th International Conference on Advanced Communications Techology (ICACT) 2016
An efficient geometric shape coding and representation approach to obtain both skeleton and contours
J. W. Yoon, ACM IMCOM, 2016 [area: Computer vision]
2015
A simple sequential outlier detection with several residuals [link]
J. W. Yoon, European Signal Processing Conference (EUSIPCO), 2015 [area: signal processing]
Various threat models to detour the air-gapped systems of network separation [link]
Eunchong Lee, Hyunsoo Kim, and Ji Won Yoon, The 16th International Workshop on Information Security Applications (WISA), 2015 [area: information security]
A new technique to protect confidential documents from shoulder surfers using a shuffling method [link]
Hyunsoo Kim, Hyoungshick Kim and Ji Won Yoon, ICSSA 2015, [area: information security] (Selected as the best student paper)
Visual Honey Encryption: Application to steganography [link]
J. W. Yoon, H. S. Kim, H. J. Jo, H. L. Lee, and K. S. Lee, ACM Information Hiding and Multimedia Security (ACM IH & MMSec) 2015 [area: information security]
Passing go with DNA sequencing: Delivering messages in a covert transgenic channel [link]
J. Y. Chun, H.-L. Lee and J. W. Yoon, 2nd International Workshop on Genome Privacy and Security (GenoPri 2015), held in conjunction with the 36th IEEE Symposium on Security and Privacy (S&P), San Jose, CA, USA, 21, May, 2015
2014
Structural code scheme against brute-force attack [link]
H. J. Jo and J. W. Yoon, The 15th International Workshop on Information Security Applications (WISA 2014), [area: information security and applied mathematics]
Statistical coding scheme for the protection of cryptographic systems against brute-force attack (Poster) [link]
H. J. Jo and J. W. Yoon, IEEE Symposium on Security and Privacy (S&P), poster session, 2014 [area: information security and applied mathematics]
2013
Extracting Image Features for a new steganalysis approach
H. J. Jo and J. W. Yoon, International Conference on Internet, 2013, [area: information security]
Network Analysis of Korean legislators using Bipartite projection
J. Y. Lee, H. J. Jo and J. W. Yoon, International Conference on Internet, 2013, [area: information security]
2012
Bayesian separation of wind power generation signals
J. W. Yoon, F. Fusco, M. Wurst, International conference of Pattern Recognition (ICPR), 2012, in BK21 CS list
Mining residential household information from low-resolution smart meter data
F. Fusco, M. Wurst, J. W. Yoon, International conference of Pattern Recognition (ICPR), 2012, in BK21 CS list
Bayesian implementation of a Lagrangian macroscopic traffic flow model
J. W. Yoon, T. T. Tchrakian, International conference of Pattern Recognition (ICPR), 2012, in BK21 CS list
Predicting arrival times of buses using real-time GPS measurements
M. Sinn, J. W. Yoon, F. Calabrese, E. Bouillet, IEEE international conference on Intelligent Transportation systems (ITSC), 2012
Cityride: a predictive bike sharing journey advisor
J. W. Yoon, F. Pinelli, F. Calabrese, IEEE International conference on mobile data management, (MDM) 2012
2011
Effective measurement selection in truncated kernel density estimator: Voronoi mean shift algorithm for truncated kernels
J. W. Yoon, H. J. Lee, and H. S. Kim, International Conference on Ubiquitous Information Management and Communication, 2011
Large-scale Bayesian ICA with application to separation of the cosmic microwave background
S. P. Wilson, and J. W. Yoon, Big Learning, Workshop of NIPS, 2011
Inference for latent variable models with many hyper-parameters
J. W. Yoon and S. P. Wilson, World Statistical Congress, 2011, (ISI)
The Efficient Gaussian Approximation for a class of Latent Gaussian model
J. W. Yoon and S. Wilson, Irish conference on Signals and Systems (ISSC), 2011
2010
Improved Mean Shift Algorithm with Heterogeneous Node Weights
J. W. Yoon, and S. P. Wilson,International conference of Pattern Recognition (ICPR), 2010, in BK21 CS list
A highly efficient blocked Gibbs sampler reconstruction of multidimensional NMR spectra
J. W. Yoon, S. P. Wilson, K. H. Mok, International Conference on Artificial Intelligence and Statistics (AISTATS), 2010, in BK21 CS list, link
2009
A new collision-free pseudonym scheme in mobile ad-hoc network
J. W. Yoon, and H. S. Kim, International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, 2009. (WiOPT)
2008
Adaptive Classification by hybrid EKF with truncated filtering: Brain Computer Interfacing
J. W. Yoon, S. J. Roberts, M. Dyson, and J. Q. Gan, Intelligent Data Engineering and Automated Learning (IDEAL) 2008
Sequential Bayesian Estimation for Adaptive Classification
J. W. Yoon, S. J. Roberts, M. Dyson, and J. Q. Gan, IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems (MFI), 2008
2007
Bayesian Inference for 2D gel electrophoresis image analysis
J. W. Yoon, S. J. Godsill, C. H. Kang, T. S. Kim, Bioinformatics Research and Development 2007
2006
Bayesian inference for multidimensional NMR image reconstruction
J. W. Yoon, and S. J. Godsill, European Signal Processing Conference (EUSIPCO), 2006
Previous Published Papers (Before 2013)