Donghoon Chang

2.8k total citations · 1 hit paper
35 papers, 971 citations indexed

About

Donghoon Chang is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Electrical and Electronic Engineering. According to data from OpenAlex, Donghoon Chang has authored 35 papers receiving a total of 971 indexed citations (citations by other indexed papers that have themselves been cited), including 18 papers in Artificial Intelligence, 16 papers in Computer Vision and Pattern Recognition and 9 papers in Electrical and Electronic Engineering. Recurrent topics in Donghoon Chang's work include Cryptographic Implementations and Security (15 papers), Chaos-based Image/Signal Encryption (12 papers) and Coding theory and cryptography (8 papers). Donghoon Chang is often cited by papers focused on Cryptographic Implementations and Security (15 papers), Chaos-based Image/Signal Encryption (12 papers) and Coding theory and cryptography (8 papers). Donghoon Chang collaborates with scholars based in India, United States and South Korea. Donghoon Chang's co-authors include Dan Hunter, James L. White, D.R. Paul, Somitra Kumar Sanadhya, Mohona Ghosh, Dougľas R. White, Christian Rathgeb, Christoph Busch, Pawel Drozdowski and Dongkyu Lee and has published in prestigious journals such as SHILAP Revista de lepidopterología, Polymer and IEEE Access.

In The Last Decade

Donghoon Chang

28 papers receiving 931 citations

Hit Papers

Effect of melt processing conditions on the extent of exf... 2001 2026 2009 2017 2001 250 500 750

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Donghoon Chang India 9 723 274 136 120 106 35 971
Mahmuda Akter Bangladesh 12 258 0.4× 93 0.3× 117 0.9× 15 0.1× 5 0.0× 48 611
R Karthik India 13 108 0.1× 87 0.3× 127 0.9× 36 0.3× 8 0.1× 67 576
Shengbao Wang China 14 145 0.2× 57 0.2× 92 0.7× 8 0.1× 17 0.2× 32 593
Zhaohui Yu China 15 56 0.1× 152 0.6× 200 1.5× 86 0.7× 8 0.1× 37 589
Yeon‐Seok Kim South Korea 10 446 0.6× 12 0.0× 585 4.3× 21 0.2× 25 0.2× 29 925
Shidong Liu China 14 217 0.3× 27 0.1× 93 0.7× 69 0.6× 14 0.1× 44 593
P. Sudhakar India 5 315 0.4× 260 0.9× 8 0.1× 10 0.1× 7 0.1× 36 484
Linjie Zhu United States 12 177 0.2× 43 0.2× 77 0.6× 4 0.0× 14 0.1× 31 469
Marek Kozłowski Poland 12 218 0.3× 96 0.4× 19 0.1× 14 0.1× 3 0.0× 41 394

Countries citing papers authored by Donghoon Chang

Since Specialization
Citations

This map shows the geographic impact of Donghoon Chang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Donghoon Chang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Donghoon Chang more than expected).

Fields of papers citing papers by Donghoon Chang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Donghoon Chang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Donghoon Chang. The network helps show where Donghoon Chang may publish in the future.

Co-authorship network of co-authors of Donghoon Chang

This figure shows the co-authorship network connecting the top 25 collaborators of Donghoon Chang. A scholar is included among the top collaborators of Donghoon Chang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Donghoon Chang. Donghoon Chang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Chang, Donghoon, et al.. (2023). Lynx: Family of Lightweight Authenticated Encryption Schemes Based on Tweakable Blockcipher. IEEE Internet of Things Journal. 11(8). 14357–14369. 4 indexed citations
2.
Ghosh, Mohona, et al.. (2022). FbHash-E: A time and memory efficient version of FbHash similarity hashing algorithm. Forensic Science International Digital Investigation. 41. 301375–301375. 4 indexed citations
3.
Chang, Donghoon, et al.. (2022). Resistance of Ascon Family Against Conditional Cube Attacks in Nonce-Misuse Setting. IEEE Access. 11. 4501–4516. 8 indexed citations
4.
Chang, Donghoon, Nilanjan Datta, Avijit Dutta, et al.. (2020). Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE. SHILAP Revista de lepidopterología. 1 indexed citations
5.
Chang, Donghoon, et al.. (2020). Cancelable Multi-Biometric Approach Using Fuzzy Extractor and Novel Bit-Wise Encryption. IEEE Transactions on Information Forensics and Security. 15. 3152–3167. 40 indexed citations
6.
Chattopadhyay, Anupam, et al.. (2019). Threshold Implementations of $\mathtt{GIFT}$ : A Trade-Off Analysis. IEEE Transactions on Information Forensics and Security. 15. 2110–2120. 11 indexed citations
7.
Chang, Donghoon, et al.. (2019). A Generalized Format Preserving Encryption Framework Using MDS Matrices. 3(1). 3–11.
8.
Chang, Donghoon, et al.. (2018). Generation of Secure and Reliable Honeywords, Preventing False Detection. IEEE Transactions on Dependable and Secure Computing. 16(5). 757–769. 13 indexed citations
9.
Chang, Donghoon, et al.. (2017). Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version). 3(3). 262–262. 1 indexed citations
10.
Chang, Donghoon, et al.. (2017). Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version). 3(3). 262–262. 1 indexed citations
11.
Sanadhya, Somitra Kumar, et al.. (2017). A new authenticated encryption technique for handling long ciphertexts in memory constrained devices. 3(3). 236–236. 3 indexed citations
12.
Chang, Donghoon, et al.. (2017). A new authenticated encryption technique for handling long ciphertexts in memory constrained devices. 3(3). 236–236. 5 indexed citations
13.
Chang, Donghoon, et al.. (2016). RCB: leakage-resilient authenticated encryption via re-keying. The Journal of Supercomputing. 74(9). 4173–4198. 2 indexed citations
14.
Chang, Donghoon, et al.. (2015). Properties of IZTO Thin Films Deposited on PET Substrates with The SiO<sub>2</sub> Buffer Layer. Journal of the Korean Ceramic Society. 52(1). 72–76. 6 indexed citations
15.
Chang, Donghoon. (2015). Tuesday Keynote. 807–808. 1 indexed citations
16.
Chang, Donghoon, Mohona Ghosh, & Somitra Kumar Sanadhya. (2013). Biclique cryptanalysis of full round AES with reduced data complexity. 2 indexed citations
17.
Chiang, Te‐Kuang & Donghoon Chang. (2012). The short-channel threshold voltage model for junctionless surrounding-gate MOSFETs. 42. 1–4.
18.
19.
20.
Hunter, Dan, et al.. (2001). Effect of melt processing conditions on the extent of exfoliation in organoclay-based nanocomposites. Polymer. 42(23). 9513–9522. 766 indexed citations breakdown →

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026