Dowon Hong

1.3k total citations · 1 hit paper
72 papers, 737 citations indexed

About

Dowon Hong is a scholar working on Artificial Intelligence, Information Systems and Computer Vision and Pattern Recognition. According to data from OpenAlex, Dowon Hong has authored 72 papers receiving a total of 737 indexed citations (citations by other indexed papers that have themselves been cited), including 50 papers in Artificial Intelligence, 38 papers in Information Systems and 14 papers in Computer Vision and Pattern Recognition. Recurrent topics in Dowon Hong's work include Cryptography and Data Security (24 papers), Coding theory and cryptography (21 papers) and Cryptography and Residue Arithmetic (15 papers). Dowon Hong is often cited by papers focused on Cryptography and Data Security (24 papers), Coding theory and cryptography (21 papers) and Cryptography and Residue Arithmetic (15 papers). Dowon Hong collaborates with scholars based in South Korea, China and United States. Dowon Hong's co-authors include Cheol-Hee Park, Ik Rae Jeong, Changho Seo, Youngsoo Kim, Ju-Sung Kang, Dong Hoon Lee, Jong‐Geun Park, Hyunjin Kim, Nam-Su Jho and Sun‐Mi Park and has published in prestigious journals such as Physical Review A, IEEE Access and Information Sciences.

In The Last Decade

Dowon Hong

67 papers receiving 679 citations

Hit Papers

An Enhanced AI-Based Netw... 2022 2026 2023 2024 2022 40 80 120

Author Peers

Peers are selected by citation overlap in the author's most active subfields. citations · hero ref

Author Last Decade Papers Cites
Dowon Hong 528 261 242 138 130 72 737
Anderson C. A. Nascimento 613 1.2× 187 0.7× 286 1.2× 113 0.8× 184 1.4× 58 845
Raylin Tso 762 1.4× 375 1.4× 252 1.0× 118 0.9× 69 0.5× 94 942
Elaine B. Barker 500 0.9× 187 0.7× 200 0.8× 423 3.1× 81 0.6× 25 836
Niels Ferguson 456 0.9× 199 0.8× 269 1.1× 309 2.2× 111 0.9× 11 808
Konstantinos M. Giannoutakis 109 0.2× 232 0.9× 348 1.4× 61 0.4× 75 0.6× 56 563
Chaojing Tang 761 1.4× 262 1.0× 280 1.2× 59 0.4× 156 1.2× 162 1.2k
Xuejia Lai 548 1.0× 144 0.6× 147 0.6× 401 2.9× 114 0.9× 82 894
Serge Vaudenay 600 1.1× 293 1.1× 296 1.2× 237 1.7× 70 0.5× 97 864
Henri Gilbert 419 0.8× 205 0.8× 206 0.9× 160 1.2× 44 0.3× 29 615

Countries citing papers authored by Dowon Hong

Since Specialization
Citations

This map shows the geographic impact of Dowon Hong's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Dowon Hong with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Dowon Hong more than expected).

Fields of papers citing papers by Dowon Hong

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Dowon Hong. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Dowon Hong. The network helps show where Dowon Hong may publish in the future.

Co-authorship network of co-authors of Dowon Hong

This figure shows the co-authorship network connecting the top 25 collaborators of Dowon Hong. A scholar is included among the top collaborators of Dowon Hong based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Dowon Hong. Dowon Hong is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Kim, Young Soo, Cheol-Hee Park, & Dowon Hong. (2025). A Robust Framework for Comprehensive Container Image Vulnerability Assessment. IEEE Access. 13. 35837–35847. 1 indexed citations
2.
Hong, Dowon, et al.. (2023). Improvement of the Efficiency of Neural Cryptography-Based Secret Key Exchange Algorithm. IEEE Access. 11. 45323–45333. 1 indexed citations
3.
Park, Cheol-Hee, et al.. (2021). Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems. Security and Communication Networks. 2021. 1–12. 40 indexed citations
4.
Hong, Dowon, et al.. (2020). A Study on Synthetic Data Generation Based Safe Differentially Private GAN. Information Security and Cryptology. 30(5). 945–956. 1 indexed citations
5.
Hong, Dowon, et al.. (2019). Research for Speed Improvement Method of Lightweight Block Cipher CHAM using NEON SIMD. Journal of KIISE. 46(5). 485–491. 2 indexed citations
6.
Park, Cheol-Hee, et al.. (2018). Optimal Implementation of Format Preserving Encryption Algorithm FEA in Various Environments. Information Security and Cryptology. 28(1). 41–51. 2 indexed citations
7.
Hong, Dowon, et al.. (2017). Secure Format-Preserving Encryption for Message Recovery Attack. Journal of KIISE. 44(8). 860–869. 1 indexed citations
8.
Park, Cheol-Hee, Dowon Hong, & Changho Seo. (2016). A Secure and Practical Encrypted Data De-duplication with Proof of Ownership in Cloud Storage. Journal of KIISE. 43(10). 1165–1172. 4 indexed citations
9.
Park, Sun‐Mi, et al.. (2015). Generalization to Any Field of Toeplitz Matrix Vector Product Based on Multi-Way Splitting Method and Its Application. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E98.A(1). 378–383. 1 indexed citations
10.
Hong, Dowon, et al.. (2011). The study of text extraction for forensic data. 186–189.
11.
Pan, Sung Bum, et al.. (2011). Fast polynomial reconstruction attack against fuzzy fingerprint vault. 2. 299–302. 1 indexed citations
12.
Hong, Dowon, et al.. (2011). Privacy-preserving disjunctive normal form operations on distributed sets. Information Sciences. 231. 113–122. 14 indexed citations
13.
Yoon, Hyo‐Jin, et al.. (2009). ANALYSIS OF PRIVACY-PRESERVING ELEMENT REDUCTION OF A MULTISET. Journal of the Korean Mathematical Society. 46(1). 59–69. 3 indexed citations
14.
Hong, Dowon, et al.. (2008). Forensic Data Acquisition from Cell Phones using JTAG Interface.. Security and Management. 410–414. 6 indexed citations
15.
Mohaisen, Aziz & Dowon Hong. (2008). Mitigating the ICA Attack against Rotation-Based Transformation for Privacy Preserving Clustering. ETRI Journal. 30(6). 868–870. 2 indexed citations
16.
Shin, Sang Uk, et al.. (2008). A New Forensic Image Format for High Capacity Disk Storage. 399–402. 4 indexed citations
17.
Kim, Youngsoo, Dowon Hong, & Dongho Won. (2008). A Forensic Investigation for Suspects' Digital Evidences Using Image Categorization. 3. 241–244. 1 indexed citations
18.
Hong, Dowon, et al.. (2007). Data Acquisition From Cell Phone Using Logical Approach. Zenodo (CERN European Organization for Nuclear Research). 13 indexed citations
19.
Park, Sun‐Mi, et al.. (2006). Efficient Bit-Parallel Multiplier for Irreducible Pentanomials Using a Shifted Polynomial Basis. IEEE Transactions on Computers. 55(9). 1211–1215. 14 indexed citations
20.
Hong, Dowon, et al.. (2003). Convergence of Jump-Diffusion Modelsto the Black–Scholes Model. Stochastic Analysis and Applications. 21(1). 141–160. 3 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026