Hoon Jae Lee

4.1k total citations
237 papers, 2.3k citations indexed

About

Hoon Jae Lee is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Hoon Jae Lee has authored 237 papers receiving a total of 2.3k indexed citations (citations by other indexed papers that have themselves been cited), including 147 papers in Computer Networks and Communications, 74 papers in Artificial Intelligence and 69 papers in Information Systems. Recurrent topics in Hoon Jae Lee's work include Advanced Authentication Protocols Security (38 papers), User Authentication and Security Systems (36 papers) and Security in Wireless Sensor Networks (33 papers). Hoon Jae Lee is often cited by papers focused on Advanced Authentication Protocols Security (38 papers), User Authentication and Security Systems (36 papers) and Security in Wireless Sensor Networks (33 papers). Hoon Jae Lee collaborates with scholars based in South Korea, China and India. Hoon Jae Lee's co-authors include Pardeep Kumar, Sang-Gon Lee, Mangal Sain, Yustus Eko Oktian, Young Sil Lee, Ndibanje Bruce, Mohammed Abdulhakim Al-Absi, Hyotaek Lim, Ahmed Abdulhakim Al-Absi and Esko Alasaarela and has published in prestigious journals such as IEEE Access, Sensors and Sustainability.

In The Last Decade

Hoon Jae Lee

215 papers receiving 2.1k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Hoon Jae Lee South Korea 21 1.6k 877 533 432 357 237 2.3k
Samiran Chattopadhyay India 24 1.4k 0.9× 1.1k 1.2× 589 1.1× 528 1.2× 210 0.6× 170 2.4k
Khalid Mahmood Pakistan 27 1.4k 0.9× 1.3k 1.4× 744 1.4× 448 1.0× 312 0.9× 136 2.5k
Pedro Peris‐Lopez Spain 23 1.1k 0.7× 915 1.0× 450 0.8× 236 0.5× 367 1.0× 92 2.1k
Eyal de Lara Canada 30 1.8k 1.2× 1.1k 1.3× 419 0.8× 725 1.7× 125 0.4× 141 3.0k
Vincent Omollo Nyangaresi Kenya 28 916 0.6× 757 0.9× 597 1.1× 309 0.7× 116 0.3× 103 1.9k
Sannasi Ganapathy India 27 1.6k 1.1× 467 0.5× 887 1.7× 509 1.2× 114 0.3× 101 2.3k
Chris Karlof United States 13 4.0k 2.5× 356 0.4× 627 1.2× 708 1.6× 276 0.8× 19 4.5k
Bander Alzahrani Saudi Arabia 23 838 0.5× 482 0.5× 421 0.8× 259 0.6× 129 0.4× 98 1.5k
Guangtao Xue China 25 1.1k 0.7× 467 0.5× 533 1.0× 667 1.5× 77 0.2× 169 2.2k
Mooi Choo Chuah United States 24 1.2k 0.8× 293 0.3× 581 1.1× 437 1.0× 174 0.5× 134 2.1k

Countries citing papers authored by Hoon Jae Lee

Since Specialization
Citations

This map shows the geographic impact of Hoon Jae Lee's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Hoon Jae Lee with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Hoon Jae Lee more than expected).

Fields of papers citing papers by Hoon Jae Lee

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Hoon Jae Lee. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Hoon Jae Lee. The network helps show where Hoon Jae Lee may publish in the future.

Co-authorship network of co-authors of Hoon Jae Lee

This figure shows the co-authorship network connecting the top 25 collaborators of Hoon Jae Lee. A scholar is included among the top collaborators of Hoon Jae Lee based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Hoon Jae Lee. Hoon Jae Lee is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Al-Absi, Mohammed Abdulhakim, et al.. (2023). Inaudible Attack on AI Speakers. Electronics. 12(8). 1928–1928. 3 indexed citations
2.
Fu, Rui, Mohammed Abdulhakim Al-Absi, Kihwan Kim, et al.. (2021). Deep Learning-Based Drone Classification Using Radar Cross Section Signatures at mmWave Frequencies. IEEE Access. 9. 161431–161444. 41 indexed citations
3.
Al-Absi, Mohammed Abdulhakim, Rui Fu, Kihwan Kim, et al.. (2021). Tracking Unmanned Aerial Vehicles Based on the Kalman Filter Considering Uncertainty and Error Aware. Electronics. 10(24). 3067–3067. 6 indexed citations
4.
Lee, Hoon Jae, et al.. (2020). Proposed image encryption method using PingPong256. Journal of the Korea Society of Computer and Information. 25(1). 71–77. 1 indexed citations
5.
Al-Absi, Mohammed Abdulhakim, Ahmed Abdulhakim Al-Absi, & Hoon Jae Lee. (2019). Performance Enriching Channel Allocation Algorithm for Vehicle-to-Vehicle City, Highway and Rural Network. Sensors. 19(15). 3283–3283. 7 indexed citations
6.
Al-Absi, Mohammed Abdulhakim, Ahmed Abdulhakim Al-Absi, Taeyong Kim, & Hoon Jae Lee. (2018). An environmental channel throughput and radio propagation modeling for vehicle-to-vehicle communication. International Journal of Distributed Sensor Networks. 14(4). 812230021–812230021. 13 indexed citations
7.
Bruce, Ndibanje, Kihwan Kim, Young-Jin Kang, et al.. (2017). A Secure and Efficient Mutual Authentication Hand-off Protocol for Sensors Devices Support in Internet of Things. Sensors and Materials. 1–1. 2 indexed citations
8.
Lee, Sang-Gon, et al.. (2017). Custom Cryptographic Protocol Implementation Method Based on OpenSSL. Information Security and Cryptology. 27(3). 459–466. 1 indexed citations
9.
Lee, Young Sil, et al.. (2014). An Analysis of Security Problem against Wireless Network in Smartphone. 383–386. 1 indexed citations
10.
Yin, Xiaochun, et al.. (2014). An Efficient and Secure Data Storage Scheme using ECC in Cloud Computing. Journal of Internet Computing and services. 15(2). 49–58. 3 indexed citations
11.
Kim, Tae Yong, et al.. (2012). A study on password input method using authentication pattern and puzzle. 698–701. 1 indexed citations
12.
Sain, Mangal, Pardeep Kumar, & Hoon Jae Lee. (2012). A survey of middleware and security approaches for Wireless Sensor Networks. 64–69. 3 indexed citations
13.
Bruce, Ndibanje, et al.. (2012). Healthcare monitoring application in ubiquitous sensor network: Design and implementation based on pulse sensor with arduino. 34–38. 25 indexed citations
14.
Kumar, Pardeep, Iftekhar Salam, & Hoon Jae Lee. (2010). Addressing secure data routing scheme for heterogeneous sensor networks. 86–90. 1 indexed citations
15.
Lee, Hoon Jae, et al.. (2010). Text Region Detection Method in Mobile Phone Video. Journal of the Institute of Electronics Engineers of Korea. 47(5). 192–198. 1 indexed citations
16.
Lee, Hoon Jae, et al.. (2009). The Relationship between Korean Version of Berg Balance Scale with Ambulation Activities in Subjects with Stroke in Brain Stem and Cerebellum. Annals of Rehabilitation Medicine. 33(6). 664–667. 2 indexed citations
17.
Kim, Heejung, Sangwook Oh, Hoon Jae Lee, & Sanghoon Sull. (2008). Image Preprocessing for Camera Phone Based Text Recognition. ICEIC : International Conference on Electronics, Informations and Communications. 879–882. 2 indexed citations
18.
Lee, Hoon Jae, Young-Ho Park, & Tae Yong Kim. (2006). On the m-Parallel Nonlinear Combine Functions for the Parallel Stream Cipher. 2. 635–941. 1 indexed citations
19.
Lee, Sang-Gon & Hoon Jae Lee. (2006). ID-based Tripartite Multiple Key Agreement Protocol Combined with Key Derivation Function. ICEIC : International Conference on Electronics, Informations and Communications. 7(3). 133–142. 1 indexed citations
20.
Park, Youngho & Hoon Jae Lee. (1999). A Proposal of the Security System for the next Generation Mobile Telecommunication System. Journal of the Korea Industrial Information Systems Research. 4(4). 149–153.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026