Changho Seo

1.8k total citations
99 papers, 1.2k citations indexed

About

Changho Seo is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Changho Seo has authored 99 papers receiving a total of 1.2k indexed citations (citations by other indexed papers that have themselves been cited), including 51 papers in Artificial Intelligence, 36 papers in Information Systems and 18 papers in Computer Networks and Communications. Recurrent topics in Changho Seo's work include Coding theory and cryptography (19 papers), Cryptography and Data Security (16 papers) and Privacy-Preserving Technologies in Data (15 papers). Changho Seo is often cited by papers focused on Coding theory and cryptography (19 papers), Cryptography and Data Security (16 papers) and Privacy-Preserving Technologies in Data (15 papers). Changho Seo collaborates with scholars based in South Korea, India and Russia. Changho Seo's co-authors include Gyanendra Prasad Joshi, Deok‐Ho Kim, Keon Woo Kwon, Kahp‐Yang Suh, Andre Levchenko, Karam Han, Eunmok Yang, Dowon Hong, Sudan Jha and Hyunil Kim and has published in prestigious journals such as Advanced Functional Materials, Scientific Reports and IEEE Transactions on Information Theory.

In The Last Decade

Changho Seo

86 papers receiving 1.1k citations

Peers

Changho Seo
Changho Seo
Citations per year, relative to Changho Seo Changho Seo (= 1×) peers Weiyang Lin

Countries citing papers authored by Changho Seo

Since Specialization
Citations

This map shows the geographic impact of Changho Seo's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Changho Seo with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Changho Seo more than expected).

Fields of papers citing papers by Changho Seo

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Changho Seo. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Changho Seo. The network helps show where Changho Seo may publish in the future.

Co-authorship network of co-authors of Changho Seo

This figure shows the co-authorship network connecting the top 25 collaborators of Changho Seo. A scholar is included among the top collaborators of Changho Seo based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Changho Seo. Changho Seo is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Park, Cheol-Hee, et al.. (2025). SDBA: A Stealthy and Long-Lasting Durable Backdoor Attack in Federated Learning. IEEE Transactions on Dependable and Secure Computing. 22(6). 6929–6942.
2.
Anitha, R., et al.. (2022). A Hash-Based Quantum-Resistant Designated Verifier Signature Scheme. Mathematics. 10(10). 1642–1642. 5 indexed citations
3.
Selvakumar, S., et al.. (2022). Markovian Demands on Two Commodity Inventory System with Queue-Dependent Services and an Optional Retrial Facility. Mathematics. 10(12). 2046–2046. 4 indexed citations
4.
Anbazhagan, N., et al.. (2022). Analysis of M/M/1/N Stochastic Queueing—Inventory System with Discretionary Priority Service and Retrial Facility. Sustainability. 14(10). 6370–6370. 5 indexed citations
5.
Sharma, Gajendra, et al.. (2021). Usage of IoT Framework in Water Supply Management for Smart City in Nepal. Applied Sciences. 11(12). 5662–5662. 16 indexed citations
6.
Lydia, E. Laxmi, et al.. (2021). Green Energy Efficient Routing with Deep Learning Based Anomaly Detection for Internet of Things (IoT) Communications. Mathematics. 9(5). 500–500. 21 indexed citations
7.
Pustokhina, Irina V., Denis A. Pustokhin, B. T. Geetha, et al.. (2021). An improved gradient boosting tree algorithm for financial risk management. Knowledge Management Research & Practice. 1–12. 7 indexed citations
8.
Singla, Jimmy, Deepak Prashar, Sudan Jha, et al.. (2020). A Novel Fuzzy Logic-Based Medical Expert System for Diagnosis of Chronic Kidney Disease. Mobile Information Systems. 2020. 1–13. 15 indexed citations
9.
Prashar, Deepak, Nishant Jha, Sudan Jha, Gyanendra Prasad Joshi, & Changho Seo. (2020). Integrating IoT and Blockchain for Ensuring Road Safety: An Unconventional Approach. Sensors. 20(11). 3296–3296. 20 indexed citations
10.
Pustokhina, Irina V., Denis A. Pustokhin, Joel J. P. C. Rodrigues, et al.. (2020). Automatic Vehicle License Plate Recognition Using Optimal K-Means With Convolutional Neural Network for Intelligent Transportation Systems. IEEE Access. 8. 92907–92917. 104 indexed citations
11.
Yang, Eunmok, et al.. (2020). Privacy Preservation in Edge Consumer Electronics by Combining Anomaly Detection with Dynamic Attribute-Based Re-Encryption. Mathematics. 8(11). 1871–1871. 7 indexed citations
12.
Singla, Jimmy, Harsh Sadawarti, Deepak Prashar, et al.. (2020). Fuzzy Logic Systems for Diagnosis of Renal Cancer. Applied Sciences. 10(10). 3464–3464. 7 indexed citations
13.
Porkodi, V., Abdul Rahaman Wahab Sait, K. Shankar, et al.. (2020). Resource Provisioning for Cyber–Physical–Social System in Cloud-Fog-Edge Computing Using Optimal Flower Pollination Algorithm. IEEE Access. 8. 105311–105319. 31 indexed citations
14.
Jha, Sudan, Changho Seo, Eunmok Yang, & Gyanendra Prasad Joshi. (2020). Real time object detection and trackingsystem for video surveillance system. Multimedia Tools and Applications. 80(3). 3981–3996. 91 indexed citations
15.
Hong, Dowon, et al.. (2020). A Study on Synthetic Data Generation Based Safe Differentially Private GAN. Information Security and Cryptology. 30(5). 945–956. 1 indexed citations
16.
Park, Cheol-Hee, et al.. (2018). Optimal Implementation of Format Preserving Encryption Algorithm FEA in Various Environments. Information Security and Cryptology. 28(1). 41–51. 2 indexed citations
17.
Seo, Changho, et al.. (2018). Privacy Preserving Data Mining Methods and Metrics Analysis. Journal of Digital Convergence. 16(10). 445–452. 1 indexed citations
18.
Seo, Changho, et al.. (2011). Characteristics and the Analyses of Cryptographic FCSR Sequences for Physical Layer Security. 38(5). 405–410.
19.
Kim, Doyoung, et al.. (2011). The development of HD-VoIP application with G.711.1 for smartphone. 1–4. 1 indexed citations
20.
Cho, Jin‐Man, et al.. (2008). Design and Implementation of the CDMA2000 1x EV-DO Security Layer to which applies 3GPP2 C.S0024-A v.2.0 Standard. Information Security and Cryptology. 18(1). 59–65.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026