Howon Kim

4.2k total citations · 1 hit paper
175 papers, 2.4k citations indexed

About

Howon Kim is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Howon Kim has authored 175 papers receiving a total of 2.4k indexed citations (citations by other indexed papers that have themselves been cited), including 102 papers in Artificial Intelligence, 71 papers in Information Systems and 43 papers in Computer Networks and Communications. Recurrent topics in Howon Kim's work include Cryptography and Data Security (41 papers), Coding theory and cryptography (37 papers) and Cryptography and Residue Arithmetic (37 papers). Howon Kim is often cited by papers focused on Cryptography and Data Security (41 papers), Coding theory and cryptography (37 papers) and Cryptography and Residue Arithmetic (37 papers). Howon Kim collaborates with scholars based in South Korea, Luxembourg and Indonesia. Howon Kim's co-authors include Thi-Thu-Huong Le, Jihyun Kim, Jae‐Hyun Kim, Hwajeong Seo, Hyoeun Kang, Yustus Eko Oktian, Yongsu Kim, Zhe Liu, Harashta Tatimma Larasati and Donggeon Lee and has published in prestigious journals such as IEEE Access, Sensors and IEEE Transactions on Smart Grid.

In The Last Decade

Howon Kim

147 papers receiving 2.2k citations

Hit Papers

Long Short Term Memory Recurrent Neural Network Classifie... 2016 2026 2019 2022 2016 100 200 300 400

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Howon Kim South Korea 23 1.3k 1.1k 547 496 492 175 2.4k
Zhiyuan Tan United Kingdom 25 1.4k 1.1× 1.8k 1.7× 668 1.2× 553 1.1× 493 1.0× 109 2.9k
Chai Kiat Yeo Singapore 26 663 0.5× 1.4k 1.3× 433 0.8× 314 0.6× 650 1.3× 223 2.6k
Shen Su China 18 778 0.6× 888 0.8× 353 0.6× 703 1.4× 294 0.6× 79 1.9k
Antonio Montieri Italy 24 1.5k 1.1× 1.7k 1.6× 625 1.1× 442 0.9× 281 0.6× 51 2.3k
Priyadarsi Nanda Australia 24 1.2k 0.9× 1.8k 1.7× 562 1.0× 723 1.5× 393 0.8× 106 2.4k
Zheng Qin China 32 1.5k 1.1× 936 0.9× 492 0.9× 848 1.7× 328 0.7× 170 3.5k
William G. Hatcher United States 13 583 0.4× 1.2k 1.2× 224 0.4× 702 1.4× 426 0.9× 24 2.1k
Rui Zhang United States 29 1.4k 1.1× 906 0.9× 411 0.8× 655 1.3× 566 1.2× 144 2.7k
Hong Wen China 30 949 0.7× 1.5k 1.4× 302 0.6× 672 1.4× 1.9k 3.9× 219 3.5k
Libing Wu China 33 1.5k 1.2× 1.3k 1.2× 207 0.4× 1.4k 2.8× 782 1.6× 169 3.3k

Countries citing papers authored by Howon Kim

Since Specialization
Citations

This map shows the geographic impact of Howon Kim's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Howon Kim with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Howon Kim more than expected).

Fields of papers citing papers by Howon Kim

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Howon Kim. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Howon Kim. The network helps show where Howon Kim may publish in the future.

Co-authorship network of co-authors of Howon Kim

This figure shows the co-authorship network connecting the top 25 collaborators of Howon Kim. A scholar is included among the top collaborators of Howon Kim based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Howon Kim. Howon Kim is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
4.
Le, Thi-Thu-Huong, et al.. (2025). DDoSBERT: Fine-tuning variant text classification bidirectional encoder representations from transformers for DDoS detection. Computer Networks. 262. 111150–111150. 1 indexed citations
6.
Kim, Howon, et al.. (2024). A Deep Inside Quantum Technology Industry Trends and Future Implications. IEEE Access. 12. 115776–115801. 4 indexed citations
7.
Le, Thi-Thu-Huong, et al.. (2024). Robust Vulnerability Detection in Solidity-Based Ethereum Smart Contracts Using Fine-Tuned Transformer Encoder Models. IEEE Access. 12. 154700–154717. 6 indexed citations
8.
Le, Thi-Thu-Huong, et al.. (2024). Robust Credit Card Fraud Detection Based on Efficient Kolmogorov-Arnold Network Models. IEEE Access. 12. 157006–157020. 8 indexed citations
9.
Larasati, Harashta Tatimma, et al.. (2023). DEMIX: Domain-Enforced Memory Isolation for Embedded System. Sensors. 23(7). 3568–3568. 1 indexed citations
10.
Le, Thi-Thu-Huong, et al.. (2023). Time Series Electrical Motor Drives Forecasting Based on Simulation Modeling and Bidirectional Long-Short Term Memory. Sensors. 23(17). 7647–7647. 2 indexed citations
11.
Yoo, Jang‐Hee, et al.. (2023). Pointing Gesture Recognition via Self-supervised Regularization for ASD Screening. 3028–3035. 3 indexed citations
12.
Le, Thi-Thu-Huong, et al.. (2022). Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method. Sensors. 22(3). 1154–1154. 116 indexed citations
13.
Kang, Hyoeun, et al.. (2020). A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization. Sensors. 20(24). 7158–7158. 5 indexed citations
14.
Seo, Hwajeong, et al.. (2018). The Recent Research Trend and Prospective on Authenticated Encryption Schemes. KIISE Transactions on Computing Practices. 24(10). 563–568. 1 indexed citations
15.
Kim, Jihyun, et al.. (2016). Analyzing Effective of Activation Functions on Recurrent Neural Networks for Intrusion Detection. Journal of Multimedia Information System. 3(3). 91–96. 4 indexed citations
16.
Kim, Howon & Dooho Choi. (2015). Revised Selected Papers of the 16th International Workshop on Information Security Applications - Volume 9503. 2 indexed citations
17.
Seo, Hwajeong, et al.. (2015). Montgomery multiplication and squaring for Optimal Prime Fields. Computers & Security. 52. 276–291. 1 indexed citations
18.
Lee, Donggeon, Hwajeong Seo, & Howon Kim. (2014). Metastability-based Feedback Method for Enhancing FPGA-based TRNG. 9(3). 235–248. 2 indexed citations
20.
Lee, Hyun Suk, Howon Kim, Jong Min Kim, & Sunggu Lee. (1995). Adaptive Virutal Cut-through as an Alternative to Wormhole Routing.. Proceedings of the International Conference on Parallel Processing. 68–75. 3 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026