Hyunsoo Kwon

400 total citations
24 papers, 248 citations indexed

About

Hyunsoo Kwon is a scholar working on Information Systems, Artificial Intelligence and Computer Networks and Communications. According to data from OpenAlex, Hyunsoo Kwon has authored 24 papers receiving a total of 248 indexed citations (citations by other indexed papers that have themselves been cited), including 22 papers in Information Systems, 18 papers in Artificial Intelligence and 4 papers in Computer Networks and Communications. Recurrent topics in Hyunsoo Kwon's work include Cryptography and Data Security (15 papers), Cloud Data Security Solutions (13 papers) and Privacy-Preserving Technologies in Data (6 papers). Hyunsoo Kwon is often cited by papers focused on Cryptography and Data Security (15 papers), Cloud Data Security Solutions (13 papers) and Privacy-Preserving Technologies in Data (6 papers). Hyunsoo Kwon collaborates with scholars based in South Korea and Australia. Hyunsoo Kwon's co-authors include Junbeom Hur, Changhee Hahn, Han‐Seung Shin, Dae-Young Kim, Jongkil Kim, Dongyoung Koo, Jihwan Lee, Kyungtae Kang, Sang‐Tae Lee and Daeyoung Kim and has published in prestigious journals such as IEEE Access, IEEE Internet of Things Journal and IEEE Transactions on Information Forensics and Security.

In The Last Decade

Hyunsoo Kwon

21 papers receiving 236 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Hyunsoo Kwon South Korea 12 164 145 78 23 20 24 248
Chuangui Ma China 7 86 0.5× 97 0.7× 94 1.2× 11 0.5× 16 0.8× 43 179
G. S. Anandha Mala India 8 98 0.6× 61 0.4× 74 0.9× 34 1.5× 19 0.9× 43 282
Ziyuan Wang China 10 124 0.8× 51 0.4× 47 0.6× 19 0.8× 27 1.4× 46 261
Fucai Zhou China 7 201 1.2× 192 1.3× 111 1.4× 30 1.3× 27 1.4× 24 296
Li Peng China 8 165 1.0× 226 1.6× 57 0.7× 21 0.9× 4 0.2× 8 332
K Sowjanya India 7 166 1.0× 154 1.1× 144 1.8× 40 1.7× 22 1.1× 14 296
Insoon Jo South Korea 8 230 1.4× 76 0.5× 360 4.6× 42 1.8× 120 6.0× 17 494
Jinxin Liu Canada 6 40 0.2× 124 0.9× 153 2.0× 12 0.5× 95 4.8× 13 242
Changhee Hahn South Korea 11 177 1.1× 249 1.7× 90 1.2× 26 1.1× 30 1.5× 37 323
L. SaiRamesh India 9 44 0.3× 76 0.5× 132 1.7× 14 0.6× 35 1.8× 27 230

Countries citing papers authored by Hyunsoo Kwon

Since Specialization
Citations

This map shows the geographic impact of Hyunsoo Kwon's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Hyunsoo Kwon with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Hyunsoo Kwon more than expected).

Fields of papers citing papers by Hyunsoo Kwon

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Hyunsoo Kwon. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Hyunsoo Kwon. The network helps show where Hyunsoo Kwon may publish in the future.

Co-authorship network of co-authors of Hyunsoo Kwon

This figure shows the co-authorship network connecting the top 25 collaborators of Hyunsoo Kwon. A scholar is included among the top collaborators of Hyunsoo Kwon based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Hyunsoo Kwon. Hyunsoo Kwon is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Kwon, Hyunsoo. (2025). Secure and Scalable Device Attestation Protocol with Aggregate Signature. Symmetry. 17(5). 698–698. 1 indexed citations
2.
Kwon, Hyunsoo, et al.. (2023). Study about Parenting Burnout and Induced Factors for Parenting Burnout of Mothers with Young Children. 157(3). 25–42. 1 indexed citations
3.
Kwon, Hyunsoo, et al.. (2022). Certificate Transparency With Enhanced Privacy. IEEE Transactions on Dependable and Secure Computing. 20(5). 3860–3872. 4 indexed citations
4.
Kwon, Hyunsoo, Junbeom Hur, & Changhee Hahn. (2022). Order-Hiding Range Query Over Encrypted Cloud Data. IEEE Access. 10. 75604–75618.
5.
Hahn, Changhee, Hyunsoo Kwon, Daeyoung Kim, & Junbeom Hur. (2021). Enabling Fast Public Auditing and Data Dynamics in Cloud Services. 4–4.
6.
Hahn, Changhee, et al.. (2020). Enabling Fast Public Auditing and Data Dynamics in Cloud Services. IEEE Transactions on Services Computing. 15(4). 2047–2059. 22 indexed citations
7.
Kwon, Hyunsoo, et al.. (2019). (In-)Security of Cookies in HTTPS: Cookie Theft by Removing Cookie Flags. IEEE Transactions on Information Forensics and Security. 15. 1204–1215. 8 indexed citations
8.
Hahn, Changhee, Hyunsoo Kwon, & Junbeom Hur. (2018). Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage. 920–923. 9 indexed citations
9.
Hahn, Changhee, et al.. (2018). Efficient Multi-user Similarity Search Over Encrypted Data in Cloud Storage. Wireless Personal Communications. 107(3). 1337–1353. 4 indexed citations
10.
Hahn, Changhee, Hyunsoo Kwon, & Junbeom Hur. (2018). Trustworthy Delegation Toward Securing Mobile Healthcare Cyber-Physical Systems. IEEE Internet of Things Journal. 6(4). 6301–6309. 18 indexed citations
11.
Kwon, Hyunsoo, Changhee Hahn, Kyungtae Kang, & Junbeom Hur. (2018). Secure deduplication with reliable and revocable key management in fog computing. Peer-to-Peer Networking and Applications. 12(4). 850–864. 11 indexed citations
12.
Kwon, Hyunsoo, et al.. (2018). A Practical De-mixing Algorithm for Bitcoin Mixing Services. 15–20. 13 indexed citations
13.
Kwon, Hyunsoo, Changhee Hahn, Dongyoung Koo, & Junbeom Hur. (2017). Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage. 391–398. 15 indexed citations
14.
Kwon, Hyunsoo, et al.. (2016). Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks. Multimedia Tools and Applications. 76(19). 19507–19521. 21 indexed citations
15.
Kwon, Hyunsoo, et al.. (2016). A survey on MITM and its countermeasures in the TLS handshake protocol. 724–729. 10 indexed citations
16.
Hahn, Changhee, Hyunsoo Kwon, & Junbeom Hur. (2016). Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks. Mobile Information Systems. 2016. 1–13. 17 indexed citations
17.
Kwon, Hyunsoo, et al.. (2015). A secure OTP algorithm using a smartphone application. 476–481. 11 indexed citations
18.
Kwon, Hyunsoo, et al.. (2015). Privacy-preserving public auditing for educational multimedia data in cloud computing. Multimedia Tools and Applications. 75(21). 13077–13091. 17 indexed citations
19.
Kwon, Hyunsoo, et al.. (2015). Evaluation of antioxidant activity and oxidative stability of spice-added mayonnaise. Food Science and Biotechnology. 24(4). 1285–1292. 19 indexed citations
20.
Kwon, Hyunsoo, Changhee Hahn, Dae-Young Kim, & Junbeom Hur. (2015). Secure deduplication for multimedia data with user revocation in cloud storage. Multimedia Tools and Applications. 76(4). 5889–5903. 17 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026