Security, Privacy, and Advanced Computing Laboratory (SPACL) at Kennesaw State University, Marietta, Georgia, USA
Research Projects
Cyber Physical Systems |
- Title: Optimization of Multiple Drone-based Surveillance and Exploration System (active)
- Synopsis: recently, networked mobile robot systems are getting more attentions for many applications. To make the systems more efficient, it is very important to optimally coordinate them according to their mission. In a system with multiple mobile agents, it is frequently true that the delay in the system is mainly due to the relative slowness of the speed of the mobile agents. Therefore, it is very important to decide their trajectories such that such a delay can be minimized. In this project, we study the near-optimal trajectories of the mobile agents with the goal of minimizing the latency caused by them for various missions.
- Publications:
- Donghyun Kim, Lirong Xue, Deying Li, Yuqing Zhu, Wei Wang, Alade O. Tokuta, "On Trajectory Planning of Multiple Drones To Minimize Latency in Search-and-reconnaissance Operations," accepted by IEEE Transactions on Mobile Computing (TMC).
- Donghyun Kim, Wei Wang, Deying Li, Joong-Lyul Lee, Weili Wu, Alade O. Tokuta, "A Joint Optimization of Data Ferry Trajectories and Communication Powers of Ground Sensors for Long-term Environmental Monitoring," Journal Of Combinatorial Optimization (JOCO), vol. 31, issue 4, pp. 1550-1568, May 2016.
- Lirong Xue, Donghyun Kim, Yuqing Zhu, Deying Li, Wei Wang, Alade O. Tokuta, "Multiple Heterogeneous Data Ferry Trajectory Planning in Wireless Sensor Networks," Proceedings of the 33rd IEEE International Conference on Computer Communications (INFOCOM 2014), April 27, 2014 - May 2, 2014, Toronto, Canada. [Sllides] (accept rate: 320/1645 = 19.4%)
- Donghyun Kim, R.N. Uma, Baraki H. Abay, Weili Wu, Wei Wang, Alade O. Tokuta, "Minimum Latency Multiple Data MULE Trajectory Planning in Wireless Sensor Networks," IEEE Transactions on Mobile Computing (TMC), vol. 13, no. 4, pp. 838-851, April 2014.
- Donghyun Kim, Baraki H. Abay, R.N. Uma, Weili Wu, Wei Wang, Alade O. Tokuta, "Minimizing Data Collection Latency in Wireless Sensor Network with Multiple Mobile Elements," Proceedings of the 31st IEEE International Conference on Computer Communications (INFOCOM 2012), pp. 504-512, March 2012, Orlando, FL, USA. [Slides] (accept rate: 278/1547 = 17.97)
- Donghyun Kim, Lirong Xue, Deying Li, Yuqing Zhu, Wei Wang, Alade O. Tokuta, "On Trajectory Planning of Multiple Drones To Minimize Latency in Search-and-reconnaissance Operations," accepted by IEEE Transactions on Mobile Computing (TMC).
- Title: Optimizing Coverage of Wireless Sensor Networks (active)
- Synopsis: nowadays, wireless sensor networks are widely adopted to various surveillance and monitoring systems. In the literature, the coverage of a wireless sensor network refers its ability to provide a surveillance service with a certain quality. In this project, we investigate the algorithms to support various coverage requirements in wireless sensor networks and camera sensor networks.
- Publications:
- Donghyun Kim, Yeojin Kim, Deying Li, Jungtaek Seo, "A New Maximum Fault-tolerance Barrier-coverage Problem in Hybrid Sensor Network and Its Polynomial Time Exact Algorithm," accepted by Ad Hoc Networks (ADHOC).
- Donghyun Kim, Wei Wang, Junggab Son, Weili Wu, Wonjun Lee, Alade O. Tokuta, "Maximum Lifetime Combined Barrier-coverage of Weak Static Sensors and Strong Mobile Sensors," IEEE Transactions on Mobile Computing (TMC), published online.
- Ling Guo, Deying Li, Yuqing Zhu, Donghyun Kim, Yi Hong, Wenping Chen, "Enhancing Barrier Coverage with Quality of Monitoring in Wireless Camera Sensor Networks," Ad Hoc Networks (ADHOC), vol. 51, issue c, pp. 62-79, Nov 2016.
- Yi Hong, Deying Li, Donghyun Kim, Wenping Chen, Jiguo Yu, Alade O. Tokuta, "Maximizing Target-temporal Coverage of Mission-driven Camera Sensor Networks," Journal of Combinatorial Optimization (JOCO), published online.
- Donghyun Kim, Yesenia Velasco, Zishen Yang, Wei Wang, Rasheed Hussain, R.N. Uma, "Cost Effective Mobile and Static Road Side Unit Deployment for Vehicular Adhoc Networks," Proceedings of International Workshop on Computing, Networking and Communications (CNC) in conjunction with International Conference on Computing, Networking and Communications (ICNC 2016), February 15-18, 2016, Kauai, HI, USA.
- Baiofei Xu, Yuqing Zhu, Donghyun Kim, Deying Li, Huaipan Jiang, Alade O. Tokuta, "Strengthening Barrier-coverage of Static Sensor Network with Mobile Sensor Nodes," Wireless Networks (WINE), vol. 22, issue 1, pp. 1-10, January 2016.
- Biaofei Xu, Yuqing Zhu, Deying Li, Donghyun Kim, Weili Wu, "Minimum (k, ω)-Angle Barrier Coverage in Wireless Camera Sensor Networks," International Journal of Sensor Networks (IJSNET), vol. 21, issue 3, pp. 179-188, January 2016.
- Donghyun Kim, Hyunbum Kim, Deying Li, Sung-Sik Kwon, Alade O. Tokuta, Jorge A. Cobb, "Maximum Lifetime Dependable Barrier-coverage in Wireless Sensor Networks," Ad Hoc Networks (ADHOC), vol. 36, issue P1, pp. 296-307, January 2016.
- Meng Yang, Donghyun Kim, Deying Li, Wenping Chen, Alade O. Tokuta, "Maximum Lifetime Suspect Monitoring on the Street with Battery-powered Camera Sensors," Wireless Networks (WINE), vol. 21, issue. 4, May 2015.
- Donghyun Kim, Junggab Son, Wei Wang, Deying Li, Alade O. Tokuta, Sunghyun Cho, "Bandwidth-aware Breach-free Barrier Construction with VANET nodes for Realtime Fugitive Search," Proceedings of IEEE Military Communications Conference (MILCOM 2015), October 26-28, 2015, Tampa, FL, USA.
- Joong-Lyul Lee, Donghyun Kim, Lidan Fan, Hyungjae Chang, "Barrier-coverage for City Block Monitoring in Bandwidth Sensitive Vehicular Adhoc Networks," Proceedings of The IEEE 10th International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2014), December 19-21, 2014, Maui, HI, USA.
- Haiming Luo, Hongwei Du, Donghyun Kim, Qiang Ye, Rongrong Zhu, Jing Zhang, "Imperfection Better Than Perfection: Beyond Optimal Lifetime Barrier Coverage in Wireless Sensor Networks," Proceedings of The IEEE 10th International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2014), December 19-21, 2014, Maui, HI, USA.
- Ling Guo, Donghyun Kim, Deying Li, Wenping Chen, Alade O. Tokuta, "Constructing Belt-barrier Providing β-Quality of Monitoring with Minimum Camera Sensors," Proceedings of the 23rd International Conference on Computer Communications and Networks (ICCCN 2014), August 4-7, 2014, Shanghai, China. (accept rate: 28%)
- Biaofei Xu, Donghyun Kim, Deying Li, Joonglyul Lee, Huaipan Jiang, Alade O. Tokuta, "Fortifying Barrier-coverage of Wireless Sensor Network with Mobile Sensor Nodes," Proceedings of the 9th International Conference on Wireless Algorithms, Systems, Applications (WASA 2014), June 23-25, 2014, Harbin, China.
- Yi Hong, Junghyun Kim, Donghyun Kim, Deying Li, Alade O. Tokuta, "Desperate Coverage Problem in Mission-driven Camera Sensor Networks," International Journal of Distributed Sensor Networks (IJDSN), April 24, 2014.
- Meng Yang, Donghyun Kim, Deying Li, Wenping Chen, Hongwei Du, Alade O. Tokuta, "Sweep-coverage with Energy-restricted Mobile Wireless Sensor Nodes," Proceedings of the 8th International Conference on Wireless Algorithms, Systems, Applications (WASA 2013), LNCS 7992, pp. 486-497, August 7-10, 2013, Zhangjiajie, China.
- Yi Hong, Donghyun Kim, Deying Li, Wenping Chen, Alade O. Tokuta, Zhiming Ding, "Target-temporal Effective-sensing Coverage in Mission-driven Camera Sensor Networks," Proceedings of the IEEE International Conference on Computer Communications and Networks (ICCCN 2013), July 30 -August 2, 2013, Nassau, Bahamas. [Slides]
- Yi Hong, Donghyun Kim, Deying Li, Biaofei Xu, Wenping Chen, Alade O. Tokuta, "Maximum Lifetime Effective-sensing Partial Target-coverage in Camera Sensor Networks," Proceedings of the 1st International Workshop on Modeling, Measurements and Optimization of Video Performance over Wireless Networks (WiVid 2013) in conjunction with WiOpt 2013, pp. 619-626, May 17, 2013, Tsukuba Science City, Japan. [Slides]
- Donghyun Kim, Jiwoong Kim, Deying Li, Sung-Sik Kwon, Alade O. Tokuta, "On Sleep-wakeup Scheduling of Non-penetrable Barrier-coverage of Wireless Sensors," Proceedings of the IEEE Global Communications Conference (GLOBECOM 2012), pp. 321-327, December 3-7, 2012, Anaheim, CA, USA. (accept rate: 966/2560 = 37.7%) [Slides]
- Title: Improving Efficiency of Virtual Backbone in Wireless Networks (active)
- Synopsis: in the literatures, a wireless network generally consists a set of computing devices, which are connected with each other using wireless communication technology. Because of its simplicity, many existing routing protocols in wireless networks exploit flooding strategy, in which every node participates in the protocols by broadcasting the messages it received to its neighbors. However, it is known that such flooding-oriented protocols suffer from huge amount of collisions and redundancy, thus is very energy inefficient. In the literature, a virtual backbone of a wireless network is a subset of connected nodes such that any pair of nodes can communicate through the subset. It is known that a wireless networking employing a virtual backbone is suffer less from the drawback of the flooding based routing strategies. In this project, we study how to compute an efficient virtual backbone with various objectives such as higher throughput and better fault-tolerance.
- Publications:
- Wei Wang, Bei Liu, Donghyun Kim, Deying Li, Jingyi Wang, Wei Gao, "A New Constant Factor Approximation To Construct Highly Fault-tolerant Connected Dominating Set," IEEE/ACM Transactions on Networking (ToN), published online.
- Bei Liu, Wei Wang, Donghyun Kim, Deying Li, Jingyi Wang, Alade O. Tokuta, Yaolin Jiang, "On Approximating Minimum 3-connected m-dominating Set Problem in Unit Disk Graph," IEEE/ACM Transactions on Networking (ToN), vol. 24, issue 5, pp. 2690-2701, October 2016.
- Bei Liu, Wei Wang, Donghyun Kim, Yingshu Li, Sung-Sik Kwon, "A Simpler Constant Factor Approximation for k-connected m-domination Set Problem in Unit Disk Graph," Proceedings of The 25th International Conference on Computer Communication and Networks (ICCCN 2016), August 1-4, 2016, Waikoloa, Hawaii, USA.
- Xianliang Liu, Wei Wang, Donghyun Kim, Zishen Yang, Alade O. Tokuta, Yaolin Jiang, "The First Constant Factor Approximation for Minimum Partial Connected Dominating Set Problem in Bounded Growth Graph," Wireless Networks (WINE), vol. 22, issue 2, pp. 553-562, February 2016.
- Wei Wang, Bei Liu, Donghyun Kim, Deying Li, Jingyi Wang, Yaolin Jiang, "A Better Constant Approximation of Minimum 3-connected m-dominating Set Problem in Unit Disk Graph using Tutte Decomposition," Proeedings of the 34th IEEE International Conference on Computer Communications (INFOCOM 2015), April 26-30, 2015, Hong Kong.
- Yi Hong, Donovan Bradley, Donghyun Kim, Deying Li, Alade O. Tokuta, Zhiming Ding, "Construction of Higher Spectral-efficiency Virtual Backbone in Wireless Networks," Ad
Hoc Networks (ADHOC), vol. 25, Part A, pp. 228–236, February 2015.
- Yi Hong, Donghyun Kim, Deying Li, Jiaofei Zhong, Alade O. Tokuta, "On Computing Resilient Virtual Backbone in CRNs," Proceedings of International Conference on Information Science & Applications (ICISA 2014), May 6-9, 2014, Seoul, Korea. [Slides]
- Wei Wang, Donghyun Kim, Min Kyung An, Wei Gao, Xianyue Li, Zhao Zhang, Weili Wu, "On Construction of Quality Fault-Tolerant Virtual Backbone in Wireless Networks," IEEE/ACM Transactions on Networking (TON), vol. 21, issue 5, pp. 1499-1510, October 2013.
- Deying Li, Donghyun Kim, Qinghua Zhu, Lin Liu, Weili Wu, "Minimum Total Communication Power Connected Dominating Set in Wireless Networks," Proceedings of the 7th International Conference on Wireless Algorithms, Systems, Applications (WASA 2012), LNCS 7405, pp. 132-141, August 2012, Yellow Mountains, China.
- Hongjie Du, Weili Wu, Shan Shan, Donghyun Kim, Wonjun Lee, "Constructing Weakly
Connected Dominating Set for Secure Clustering in Distrubuted Sensor Network," Journal Of
Combinatorial Optimization (JOCO), vol. 23, pp. 301-307, February
2012.
- Donghyun Kim, Zhao Zhang, Xianyue Li, Wei Wang, Weili Wu, Ding-Zhu Du, "A Better Approximation Algorithm For Computing Connected Dominating Sets in Unit Ball Graphs," IEEE Transactions on Mobile Computing (TMC), vol. 9, no. 8, pp. 1108-1118, August 2010.
- Donghyun Kim, Wei Wang, Xianyue Li, Zhao Zhang, Weili Wu, "A New Constant Factor Approximation for Computing 3-Connected m-Dominating Sets in Homogeneous Wireless Networks," Proceedings of the 29th IEEE Conference on Computer Communications (INFOCOM 2010), March 2010. (accept rate: 276/1575 = 17.52%) - US NSF Student Travel Grant for INFOCOM 2010 (US$1150, competition ratio: 16/91 = 17.582%)
- Donghyun Kim, Yiwei Wu, Yingshu Li, Feng Zou, Ding-Zhu Du, "Constructing Minimum Connected Dominating Sets with Bounded Diameters in Wireless Networks," IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 20, no. 2, pp. 147-157, February 2009.
- Donghyun Kim, Xianyue Li, Feng Zou, Zhao Zhang, Weili Wu, "Recyclable Connected Dominating Set for Large Scale Dynamic Wireless Networks," Proceedings of the 3rd International Conference on Wireless Algorithms, Systems and Applications (WASA 2008), October 26-28, 2008, Dallas, TX, USA.
- Feng Zou, Xianyue Li, Donghyun
Kim, Weili Wu, "Construction of Minimum Connected Dominating Set
in 3-Dimensional Wireless Network," Proceedings
of the 3rd International Conference on Wireless Algorithms, Systems
and Applications (WASA 2008), October 26-28, 2008, Dallas, TX, USA.
- Miscellaneous Topics and Publications:
- Donghyun Kim, Yesenia Velasco, Wei Wang, R.N. Uma, Rasheed Hussain, Sejin Lee, "A New Comprehensive RSU Installation Strategy for Cost-Efficient VANET Deployment," IEEE Transactions on Vehicular Technology (TVT), vol. 66, issue 5, pp. 4200-4211, May 2017.
- Sejin Lee, Donghyun Kim, "Spherical Signature Description of 3D Point Cloud and Environmental Feature Learning based on Deep Belief Nets for Urban Structure Classification," Journal of Korea Robotics Society, vol 11, no. 3, pp. 115-126, August 2016.
- Claudio Silva, Michele Nogueira, Donghyun Kim, Eduardo Cerqueira, Aldri Santos, "Cognitive Radio Based Connectivity Management for Resilient End-to-End Communications in VANETs Computer Communications," Computer Communications (COMCOM), vol. 79, pp. 1-8, April 1, 2016.
- Sejin Lee, Donghyun Kim, Alade O. Tokuta, "Development of Advanced Sonar Sensor Model for Underwater Terrain Mapping based on Occupancy Grids," International Journal of Applied Engineering Research (IJAER), vol. 10, no. 17, pp. 38045-38050, September 2015.
- Donghyun Kim, Wei Wang, Weili
Wu, Deying Li, Changcun Ma, Nassim Sohaee, Wonjun Lee, Yuexuan Wang, Ding-Zhu Du, "On Bounding Node-to-sink Latency in Wireless Sensor
Networks with Multiple Sinks," International
Journal of Sensor Networks (IJSNET), vol. 13, no. 1, pp. 13-29, March
2013.
- Jun Duan, Donghyun Kim, Wenping Chen, Deying Li, "A New Localized Geometric Routing with Guaranteed Delivery on 3-D Wireless Networks," Proceedings of the IEEE International Conference on Computer Communication Networks (ICCCN 2012), pp. 1-7, July 30-August 2, 2012, Munich, Germany. (accept rate: 82/266 = 30.8%)
- Xiaofeng Gao, Yi Zhu, Donghyun Kim, Jianzhong Li, Weili Wu, "A Novel Multi-Channel Data Broadcast Scheme for Multimedia Database System," Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems (ICPADS 2012), pp. 132-139, December 17-19, 2012, Singapore.
- Donghyun Kim, Wei Wang,
Nassim Sohaee, Changcun Ma, Weili Wu, Wonjun Lee, Ding-Zhu Du, "Minimum
Data Latency Bound k-Sinks Placement Problem in Wireless Sensor
Networks," IEEE/ACM Transactions
on Networking (TON), vol. 19, issue 5, pp. 1344-1353, October 2011.
- Donghyun Kim, Wei Wang, Ling Ding, Jihwan Lim, Heekuck Oh, Weili Wu, "Minimum Average Routing Path Clustering Problem in Multi-hop 2-D Underwater Sensor Networks," Optimization Letters (OPTL), vol. 4, no 3, pp. 383-392, August 2010.
- Wei Wang, Donghyun Kim, Nassim Sohaee, Changcun Ma, Weili Wu, "A PTAS for Minimum d-Hop Underwater Sink Placement Problem in 2-D Underwater Sensor Networks," Discrete Mathematics, Algorithms and Applications (DMAA), vol. 1, issue 2, pp. 283-289, June 2009.
- Wei Wang, Donghyun Kim, James Willson, Bhavani Thuraisingham, Weili Wu, "A Better Approximation for Minimum Average Routing Path Clustering Problem in 2D-Underwater Sensor Networks," Discrete Mathematics, Algorithms and Applications (DMAA), vol. 1, issue 2, pp. 175-191, June 2009.
Cybersecurity |
- Title: Internet of Things (IoT) Mobile Cloud Security and Privacy (active)
- Synopsis: along with the recent advances in IoT mobile cloud technologies, a number of new security and privacy issues arise. In this emerging environment, private user data generated by computationally weak IoT terminals such as smartphones is transferred to the resourceful end cloud for further processing. Naturally, there are a number of possible breaches from which the privacy and secrecy of user data can be invaded by both the insiders (e.g. system administrator) and outsiders (e.g. eavesdropper and active attackers). This project aims to explore the new security and privacy issues of the environment and provide efficient solutions and remedies for them using various mathematical tools such as algorithms and applied cryptography.
- Publications:
- Junggab Son, Donghyun Kim, Md Zakirul Alam Bhuiyan, Rasheed Hussain, Heeckuck Oh, "A New Outsourcing Conditional Proxy Re-Encryption Suitable for Mobile Cloud Environment," accepted by Concurrency and Computation: Practice and Experience (CPE).
- Junggab Son, Donghyun Kim, Rasheed Hussain, Sung-Sik Kwon, Alade O. Tokuta, Jungtaek Seo, "Privacy Aware Incentive Mechanism to Collect Mobile Data While Preventing Duplication," Proceedings of IEEE Military Communications Conference (MILCOM 2015), October 26-28, 2015, Tampa, FL, USA.
- Kanghyo Lee, Donghyun Kim, Dongsu Ha, Ubaidullah Rajput, Heekuck Oh, "On Security and Privacy Issues of Fog Computing supported Internet of Things Environment," Proceedings of the 5th International Conference On Network of the Future (NOF 2015), September 30 - October 2, 2015, Montreal, Canada.
- Junggab Son, Donghyun Kim, Rasheed Hussain, Heekuck Oh, "Conditional Proxy Re-Encryption for Secure Big Data Group Sharing in Cloud Environment," Proceedings of the 2nd International Workshop on Security and Privacy in Big Data (BigSecurity 2014) in conjunction with INFOCOM 2014, April 27, 2014 - May 2, 2014, Toronto, Canada.
- Junggab Son, Hyunbum Kim, Donghyun Kim, Heekuck Oh, "On Secure Data Sharing in Cloud Storage," Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication (IMCOM 2014), January 9-11, 2014, Siem Reap, Cambodia. (accept rate: 29%)
- Junggab Son, Donghyun Kim, Md Zakirul Alam Bhuiyan, Rasheed Hussain, Heeckuck Oh, "A New Outsourcing Conditional Proxy Re-Encryption Suitable for Mobile Cloud Environment," accepted by Concurrency and Computation: Practice and Experience (CPE).
- Title: Vehicular Adhoc Network (VANET) Security and Privacy (active)
- Synopsis: VANET refers to a wireless network of mobile vehicles, in which each node is a main source of highly private information such as the current location of each driver. In essence, VANET is a highly spatio-temporal adhoc mobile network, but still occasionally utilizes the strong back-end infrastructure, which is connected to the VANET nodes via relay nodes installed along the road (i.e. road side units). Due to the unique entities and the unique structure of VANET, it becomes highly challenging to preserve the privacy of the drivers and protect the whole system from malicious attackers (both inside and outside). This project aims to explore the new security and privacy issues of this new environment and provide efficient solutions and remedies for them using various mathematical tools such as algorithms and applied cryptography.
- Publications:
- Junggab Son, Donghyun Kim, Hyunggeun Oh, Dongsoo Ha, Wonjun Lee, "Toward VANET Utopia: A New Privacy Preserving Trustworthiness Management Scheme for VANET," Proceedings of The 9th IEEE International Conference on Social Computing and Networking (SocialCom 2016), October 8-10, 2016, Atlanta, GA, USA.
- Rasheed Hussain, Donghyun Kim, Alade O. Tokuta, Hayk M. Melikyan, Heekuck Oh, "Covert Communication based Privacy Preservation in Mobile Vehicular Networks," Proceedings of IEEE Military Communications Conference (MILCOM 2015), October 26-28, 2015, Tampa, FL, USA.
- Rasheed Hussain, Zeinab Rezaeifar, Donghyun Kim, Alade O. Tokuta, Heekuck Oh, "On Secure and Efficient Beacon Braodcasting among One-hop Neighbors in Vehicular Adhoc Networks," Proceedings of IEEE Military Communications Conference (MILCOM 2014), October 6–8, 2014, Baltimore, MD, USA.
- Rasheed Hussain, Fizza Abbas, Junggab Son, Donghyun Kim, Sangjin Kim, Heekuck Oh, "Vehicle Witnesses as a Service: Leveraging Vehicles as Witnesses on the Road in VANET Clouds," Proceedings of the 5th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013), Dec. 2-5. 2013, Bristol, United Kingdom.
- Title: Security, Privacy, Reliability in Smart Grid Communication Network (active)
- Synopsis: smart grid is a newer generation of electricity supply network and is recently getting lots of attentions due to its huge benefits. Smartgrid is distinguished from the traditional power supply network by some of its unique components such as smart meters and the integrated communication network. As a result, smargrid suffers from a series of new security, privacy, reliability issues. For instance, to make the smart grid more dependable, it is extremely important to ensure that private information from each smart meter to the system operators or the power suppliers to be delivered in a privacy preserving and secure, but still informative manner. On the other hand, the communication network has to be extremely reliable, otherwise a massive damage can be easily done by deliberate cyberattacks. This project aims to study the potential cybersecurity issues in smart grid and provide solutions or remedies for them.
- Publications:
- Junggab Son, Donghyun Kim, Sejin Lee, Heekuck Oh, Alade O. Tokuta, Hayk M. Melikyan, "Trade Off Between Service Granularity and User Privacy in Smart Meter Operation," Proceedings of The IEEE 10th International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2014), December 19-21, 2014, Maui, HI, USA.
- Yi Hong, Donghyun Kim, Deying Li, Ling Guo, Junggab Son, Alade O. Tokuta, "Two New Multi-path Routing Algorithms for Fault-tolerant Communications in Smart Grid," Ad Hoc Networks (ADHOC), vol. 22, pp. 3-12, November 2014.
- Title: Security and Privacy in Online Social Networking (active)
- Synopsis: TBA
- Publications:
- Junggab Son, Donghyun Kim, Hyunggeun Oh, Dongsoo Ha, Wonjun Lee, "Toward VANET Utopia: A New Privacy Preserving Trustworthiness Management Scheme for VANET," Proceedings of The 9th IEEE International Conference on Social Computing and Networking (SocialCom 2016), October 8-10, 2016, Atlanta, GA, USA.
- Junggab Son, Donghyun Kim, Rahman Tashakkori, Alade O. Tokuta, Heekuck Oh, "A New Mobile Online Social Network based Location Sharing with Enhanced Privacy Protection," Proceedings of The 25th International Conference on Computer Communication and Networks (ICCCN 2016), August 1-4, 2016, Waikoloa, Hawaii, USA.
- Title: Malicious Behavior and Irregular Activity Detection (active)
- Synopsis: malware is a software with a malicious intent. The problem of detecting malware has been studied over time and becomes a classical topic. However, the newer generation of malwares are getting smarter and covert and therefore, it is getting more difficult to detect their malicious intent using existing approaches. This project aims to survey the recent strategies of the covert and intelligent malwares which attempt to hide their malicious intent in various ways, but still hazardous, introduce ingenious ways to detect them and minimize their damages.
- Publications:
- TBA
- Miscellaneous Topics and Publications:
- Donghyun Kim, Glenn R. Frye, Sung-Sik Kwon, Hyung Jae Chang, Alade O. Tokuta, "On Combinatoric Approach to Circumvent Internet Censorship using Decoy Routers," Proceedings of the 2013 IEEE Military Communications Conference (MILCOM 2013), Nov. 18-20, 2013, San Diego, CA, USA. [Slides]
- Jiwhan Lim, Sangjin Kim, Heekuck Oh, Donghyun Kim, "A New Designated Query Protocol for Serverless Mobile RFID Systems with Reader and Tag Privacy," Tsinghua Science and Technology (TST), vol. 17, no. 5, pp. 521-536, October 2012.
- Donghyun Kim, Sangjin Kim, Heekuck Oh, "A Novel Way of Issuing Multiple Private Keys in ID-based Cryptosystems," Proceedings of International Conference on Convergence Information Technology (ICCIT 2007), November 2007.
Big Data & Big Data Security |
- Title: Big Data Security (active)
- Synopsis: TBD
- Publications:
- TBA
- TBA
- Title: Optimization in Computational Social Science (active)
- Synopsis: computational social science uses computer to understand and analyze social phenomena by investigating social and behavioral interactions and among the members of a social group. Recently, the value of the information from online resources such as online social networks are getting more recognized and thus lots of research efforts are made to maximize its utilization using computational social computing. This project aims to investigate new social computing issues, in particular in terms of optimization and provide efficient solutions for them.
- Publications:
- Donghyun Kim, Jiaofei Zhong, Minhyuk Lee, Deying Li, Yingshu Li, Alade O. Tokuta, "Efficient Respondents Selection for Biased Survey using Homophily-high Social Relation Graph," Discrete Mathematics, Algorithms and Applications (DMAA), vol. 8, issue 4, December 2016.
- Wei Wang, Donghyun Kim, Matthew Tetteh, Jun Liang, Wonjun Lee, "On Cost-aware Biased Respondent Group Selection for Minority Opinion Survey," Discrete Mathematics, Algorithms and Applications (DMAA), vol. 8, issue 4, December 2016.
- Donghyun Kim, Hao Guo, Wei Wang, Joong-Lyul Lee, Sung-Sik Kwon, Alade O. Tokuta, "On Efficient Vaccine Distribution Strategy to Suppress Pandemic using Social Relation," Discrete Mathematics, Algorithms and Applications (DMAA), vol. 8, no.1, March 2016.
- Huan Ma, Yuqing Zhu, Deying Li, Donghyun Kim, Jun Liang, "Improving the Influence under IC-N Model in Social Networks," Discrete Mathematics, Algorithms and Applications (DMAA), vol. 7, no. 3, 2015.
- Donghyun Kim, Hao Guo, Yuchao Li, Wei Wang, Sung-Sik Kwon, Alade O. Tokuta, "Social Relation Based Long-term Vaccine Distribution Planning to Suppress Pandemic," Proceeding of the 4th International Conference on Computational Social Networks (CSoNet 2015), August 4-6, 2015, Beijing, China.
- Donghyun Kim, Wei Wang, Matthew Tetteh, Jun Liang, Soyoon Park, Wonjun Lee, "Biased Respondent Selection under Limited Budget for Minority Opinion Survey," Proceeding of the 4th International Conference on Computational Social Networks (CSoNet 2015), August 4-6, 2015, Beijing, China.
- Donghyun Kim, Deying Li, Omid Asgari, Yingshu Li, Alade O. Tokuta, Heekuck Oh, "Computing an Effective Decision Making Group of a Society using Social Network Analysis," Journal Of Combinatorial Optimization (JOCO), vol. 28, issue 3, pp. 577-587, October 2014.
- Donghyun Kim, Jiaofei Zhong, Minhyuk Lee, Deying Li, Alade O. Tokuta, "Efficient Respondents Selection for Biased Survey using Online Social Networks," Proceedings of the 2nd Workshop on Computational Social Networks (CSoNet 2014) in conjunction with COCOON 2014, August 4-5, 2014, Atlanta, GA, USA. [Slides]
- Songsong Li, Yuqing Zhu, Deying Li, Donghyun Kim, Huan Ma, Huang Hejiao, "Influence Maximization in Social Networks with User Attitude Modification," Proceedings of the 2014 IEEE International Conference on Communications (ICC 2014), June 10-14, 2014, Sydney, Australia. (accept rate: 990/2608 = 37.96%)
- Jabre L. Thornton, Donghyun Kim, Sung-Sik Kwon, Deying Li, Alade O. Tokuta, "k-Fragility Maximization Problem to Attack Robust Terrorist Networks," Journal of Information and Communication Convergence Engineering (JICCE), vol. 12, issue 1, pp. 33-38, March 2014.
- Songsong Li, Yuqing Zhu, Deying Li, Donghyun
Kim, Hejiao Huang, "Rumor Restriction in Online Social Networks," Proceedings of the 32nd IEEE International
Performance Computing and Communications Conference (IPCCC 2013),
Dec. 6-8, 2013, San Diego, CA, USA.
- Donghyun Kim, Deying Li, Omid Asgari, Yingshu Li, Alade O. Tokuta, "A Dominating Set Based Approach to Identify Effective Leader Group of Social Network," Proceedings of the Workshop on Computational Social Networks (CSoNet 2013) in conjunction with COCOON 2013, LNCS 7936, pp.841-848, June 21 - 23, 2013, Hangzhou, China. [Slides]
- Xu Zhu, Jieun Yu, Wonjun Lee, Donghyun Kim, Shan Shan, Ding-Zhu Du, "New
Dominating Sets in Social Networks," Journal
Of Global Optimization (JOGO), vol. 48, issue 4, pp. 633-642,
December 2010.
- Miscellaneous Topics and Publications:
- Neda Zarayeneh, Euiseong Ko, Jung Hun Oh, Sang Suh, Chunyu Liu, Jean Gao, Donghyun Kim, Mingon Kang, "Integration of Multi-omics Data for Integrative Gene Regulatory Network Inference," accepted by International Journal of Data Mining and Bioinformatics (IJDMB).
- Euiseong Ko, Mingon Kang, Hyung Jae Chang, Donghyun Kim, "Graph-theory Based Simplification Techniques for Efficient Biological Network Analysis," Proceedings of IEEE International Workshop on Big Data Security and Services in conjunction with IEEE BigDataService 2017, April 6-10, 2017, San Francisco, CA, USA.
- Neda Zarayeneh, Jung Hun Oh, Donghyun Kim, Chunyu Liu, Jean Gao, Sang C. Suh, Mingon Kang, "Integrative Gene Regulatory Network Inference Using Multi-omics Data," Proceedings of The 9th International Workshop on Biological Network Analysis and Integrative Graph-Based Approaches (IWBNA) in conjunction with IEEE BIBM 2016, December 15-18, 2016, Shenzhen, China.
- Neda Zarayeneh, Euiseong Ko, Jung Hun Oh, Sang Suh, Chunyu Liu, Jean Gao, Donghyun Kim, Mingon Kang, "Integration of Multi-omics Data for Integrative Gene Regulatory Network Inference," accepted by International Journal of Data Mining and Bioinformatics (IJDMB).
Algorithm Design and Analysis |
- Miscellaneous Topics and Publications:
- Changcun Ma, Donghyun Kim, Yuexuan Wang, Wei Wang, Nassim Sohaee, Weili Wu, "Hardness of k-Vertex Connected Subgraph Augmentation Problem," Journal Of Combinatorial Optimization (JOCO), vol. 20, no. 3, pp. 249-258, October 2010.
- Xianyue Li, Feng Zou, Yaochun Huang, Donghyun Kim, Weili Wu, "A Better Constant-Factor
Approximation for Selected-Internal Steiner Minimum Tree," Algorithmica, vol. 56, issue 3, pp. 333-341, January 2010.
- Feng Zou, Xianyue Li, Donghyun Kim, Weili Wu, "Two Constant Approximation Algorithms for Node-Weighted Steiner Tree in Unit Disk Graphs," Proceedings of the 2nd Annual International Conference on Combinatorial Optimization and Applications (COCOA 2008), August 2008.
- Xianyue Li, Yaochun Huang, Feng Zou, Donghyun Kim, Weili Wu, "(1+ρ)-Approximation for Selected-Internal Steiner Minimum Tree," Proceedings of the 14th Annual International Computing and Combinatorics Conference (COCOON 2008), June 2008.