Inshil Doh

769 total citations
59 papers, 535 citations indexed

About

Inshil Doh is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Inshil Doh has authored 59 papers receiving a total of 535 indexed citations (citations by other indexed papers that have themselves been cited), including 34 papers in Computer Networks and Communications, 26 papers in Information Systems and 21 papers in Artificial Intelligence. Recurrent topics in Inshil Doh's work include Blockchain Technology Applications and Security (12 papers), Security in Wireless Sensor Networks (11 papers) and Network Security and Intrusion Detection (9 papers). Inshil Doh is often cited by papers focused on Blockchain Technology Applications and Security (12 papers), Security in Wireless Sensor Networks (11 papers) and Network Security and Intrusion Detection (9 papers). Inshil Doh collaborates with scholars based in South Korea, Australia and Sweden. Inshil Doh's co-authors include Kijoon Chae, Nishat I Mowla, Nguyen H. Tran, Ji-Young Lim, Ji-Young Lim, Hayoung Oh, Shi Li, Min Young Chung, Mihui Kim and Hyowon Kim and has published in prestigious journals such as IEEE Access, IEEE Transactions on Vehicular Technology and Computer Networks.

In The Last Decade

Inshil Doh

54 papers receiving 512 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Inshil Doh South Korea 11 296 197 141 139 91 59 535
Reza Fotohi Iran 16 498 1.7× 144 0.7× 107 0.8× 167 1.2× 127 1.4× 35 655
Abd Ullah Khan Pakistan 16 468 1.6× 137 0.7× 266 1.9× 275 2.0× 79 0.9× 36 659
Abdullatif Albaseer Qatar 13 219 0.7× 224 1.1× 59 0.4× 168 1.2× 44 0.5× 47 481
Sourav Saha India 11 438 1.5× 223 1.1× 499 3.5× 195 1.4× 75 0.8× 14 731
Hongwu Lv China 13 279 0.9× 121 0.6× 76 0.5× 172 1.2× 52 0.6× 66 492
Canhuang Dai China 7 300 1.0× 123 0.6× 87 0.6× 381 2.7× 121 1.3× 8 608
Weiting Zhang China 11 255 0.9× 169 0.9× 118 0.8× 104 0.7× 32 0.4× 52 497
Abdullah Alomari Saudi Arabia 12 249 0.8× 84 0.4× 94 0.7× 155 1.1× 44 0.5× 21 393
Naércio Magaia Portugal 14 337 1.1× 123 0.6× 100 0.7× 211 1.5× 41 0.5× 33 533

Countries citing papers authored by Inshil Doh

Since Specialization
Citations

This map shows the geographic impact of Inshil Doh's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Inshil Doh with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Inshil Doh more than expected).

Fields of papers citing papers by Inshil Doh

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Inshil Doh. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Inshil Doh. The network helps show where Inshil Doh may publish in the future.

Co-authorship network of co-authors of Inshil Doh

This figure shows the co-authorship network connecting the top 25 collaborators of Inshil Doh. A scholar is included among the top collaborators of Inshil Doh based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Inshil Doh. Inshil Doh is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Kim, Hyowon, et al.. (2025). Role-based federated learning exploiting IPFS for privacy enhancement in IoT environment. Computer Networks. 263. 111200–111200.
3.
Doh, Inshil, et al.. (2024). Blockchain and differential privacy-based data processing system for data security and privacy in urban computing. Computer Communications. 222. 161–176. 7 indexed citations
4.
Doh, Inshil, et al.. (2022). Cell Based Raft Algorithm for Optimized Consensus Process on Blockchain in Smart Data Market. IEEE Access. 10. 85199–85212. 8 indexed citations
6.
Doh, Inshil, et al.. (2020). Randomly Elected Blockchain System based on Grouping Verifiers for Efficiency and Security. 159–165. 2 indexed citations
7.
Doh, Inshil, et al.. (2018). RMBC: Randomized mesh blockchain using DBFT consensus algorithm. 712–717. 15 indexed citations
8.
Mowla, Nishat I, Inshil Doh, & Kijoon Chae. (2018). Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS. 2018 20th International Conference on Advanced Communication Technology (ICACT). 1–1. 2 indexed citations
9.
10.
Mowla, Nishat I, Inshil Doh, & Kijoon Chae. (2015). An efficient defense mechanism for spoofed IP attack in SDN based CDNi. 9. 92–97. 8 indexed citations
11.
Park, Jung Min, Inshil Doh, & Kijoon Chae. (2014). Secure U-healthcare service based on wireless sensor network. 17(1). 181–195. 1 indexed citations
12.
Doh, Inshil, Ji-Young Lim, Shi Li, & Kijoon Chae. (2014). Pairwise and group key setup mechanism for secure machine-to-machine communication. Computer Science and Information Systems. 11(3). 1071–1090. 4 indexed citations
13.
Choi, Yun‐Jeong & Inshil Doh. (2014). Hierarchical Aggregation of Uncertain Sensor Data for M2M Wireless Sensor Network Using Reinforcement Learning. International Journal of Distributed Sensor Networks. 10(5). 535707–535707. 2 indexed citations
14.
Doh, Inshil, Ji-Young Lim, Li Shi, & Kijoon Chae. (2013). Key Establishment and Management for Secure Cellular Machine-to-Machine Communication. 579–584. 6 indexed citations
15.
Doh, Inshil, Ji-Young Lim, & Kijoon Chae. (2012). Code updates based on minimal backbone and group key management for secure sensor networks. Mathematical and Computer Modelling. 57(11-12). 2801–2813. 4 indexed citations
16.
Doh, Inshil, Kijoon Chae, Ji-Young Lim, & Min Young Chung. (2012). An Improved Security Approach Based on Kerberos for M2M Open IPTV System. 754–759. 6 indexed citations
17.
Kim, Jun Suk, Inshil Doh, Bum‐Gon Choi, & Min Young Chung. (2012). Downlink scheduling scheme based on estimation of channel quality at the crossed timeslot for effective resource allocation in LTE-advanced system. 1–6. 1 indexed citations
18.
Doh, Inshil, Ji-Young Lim, & Kijoon Chae. (2011). Distributed authentication mechanism for secure channel establishment in ubiquitous medical sensor networks. ˜The œMissouri review. 7(3). 189–200. 6 indexed citations
19.
Doh, Inshil, Ji-Young Lim, & Kijoon Chae. (2011). Distributed Authentication Mechanism for Secure Channel Establishment in Ubiquitous Medical Sensor Networks. Mobile Information Systems. 7(3). 189–200. 7 indexed citations
20.
Oh, Hayoung, Inshil Doh, & Kijoon Chae. (2009). ATTACK CLASSIFICATION BASED ON DATA MINING TECHNIQUE AND ITS APPLICATION FOR RELIABLE MEDICAL SENSOR COMMUNICATION. 6(3). 20–32. 11 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026