Jin Kwak

1.4k total citations · 1 hit paper
86 papers, 614 citations indexed

About

Jin Kwak is a scholar working on Computer Networks and Communications, Information Systems and Signal Processing. According to data from OpenAlex, Jin Kwak has authored 86 papers receiving a total of 614 indexed citations (citations by other indexed papers that have themselves been cited), including 58 papers in Computer Networks and Communications, 47 papers in Information Systems and 29 papers in Signal Processing. Recurrent topics in Jin Kwak's work include Network Security and Intrusion Detection (28 papers), Advanced Malware Detection Techniques (21 papers) and User Authentication and Security Systems (18 papers). Jin Kwak is often cited by papers focused on Network Security and Intrusion Detection (28 papers), Advanced Malware Detection Techniques (21 papers) and User Authentication and Security Systems (18 papers). Jin Kwak collaborates with scholars based in South Korea, Australia and New Zealand. Jin Kwak's co-authors include Julian Jang‐Jaccard, Fariza Sabrina, Wen Xu, Jinting Zhu, Amardeep Singh, Jae‐Cheol Ryou, Seong‐Ho Choi, Tae‐Jin Lee, Soohyun Oh and Tong Liu and has published in prestigious journals such as Sensors, BioMed Research International and IEEE Internet of Things Journal.

In The Last Decade

Jin Kwak

71 papers receiving 573 citations

Hit Papers

IGRF-RFE: a hybrid feature selection method for MLP-based... 2023 2026 2024 2025 2023 50 100 150

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Jin Kwak South Korea 13 394 256 248 233 62 86 614
Qussai Yaseen Jordan 16 447 1.1× 203 0.8× 273 1.1× 360 1.5× 54 0.9× 44 696
Hisham Alasmary Saudi Arabia 16 413 1.0× 251 1.0× 290 1.2× 245 1.1× 43 0.7× 44 691
Weizhong Qiang China 12 361 0.9× 133 0.5× 233 0.9× 246 1.1× 59 1.0× 63 606
Jiqiang Liu China 13 398 1.0× 177 0.7× 298 1.2× 156 0.7× 39 0.6× 46 603
Tao Ban Japan 17 492 1.2× 416 1.6× 455 1.8× 234 1.0× 91 1.5× 96 840
Grégory Blanc France 12 323 0.8× 211 0.8× 259 1.0× 156 0.7× 19 0.3× 33 569
Khair Eddin Sabri Jordan 11 375 1.0× 196 0.8× 320 1.3× 108 0.5× 46 0.7× 34 539
Miguel Castro United States 8 810 2.1× 186 0.7× 311 1.3× 277 1.2× 46 0.7× 14 1.0k
Mahdi Abadi Iran 16 429 1.1× 373 1.5× 465 1.9× 187 0.8× 26 0.4× 50 744
Hamed HaddadPajouh Canada 7 545 1.4× 401 1.6× 306 1.2× 228 1.0× 44 0.7× 10 714

Countries citing papers authored by Jin Kwak

Since Specialization
Citations

This map shows the geographic impact of Jin Kwak's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jin Kwak with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jin Kwak more than expected).

Fields of papers citing papers by Jin Kwak

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Jin Kwak. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jin Kwak. The network helps show where Jin Kwak may publish in the future.

Co-authorship network of co-authors of Jin Kwak

This figure shows the co-authorship network connecting the top 25 collaborators of Jin Kwak. A scholar is included among the top collaborators of Jin Kwak based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Jin Kwak. Jin Kwak is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Jang‐Jaccard, Julian, et al.. (2023). MAGNETO and DeepInsight: Extended Image Translation with Semantic Relationships for Classifying Attack Data with Machine Learning Models. Electronics. 12(16). 3463–3463. 3 indexed citations
2.
Jang‐Jaccard, Julian, et al.. (2023). Network Intrusion Detection in Internet of Blended Environment Using Ensemble of Heterogeneous Autoencoders (E-HAE). Computer Systems Science and Engineering. 46(3). 3261–3284.
3.
Jang‐Jaccard, Julian, Wen Xu, Amardeep Singh, et al.. (2023). IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset. Journal Of Big Data. 10(1). 179 indexed citations breakdown →
4.
Xu, Wen, Julian Jang‐Jaccard, Tong Liu, Fariza Sabrina, & Jin Kwak. (2022). Improved Bidirectional GAN-Based Approach for Network Intrusion Detection Using One-Class Classifier. Computers. 11(6). 85–85. 27 indexed citations
5.
Choi, Seul-Ki & Jin Kwak. (2020). Feature Analysis and Detection Techniques for Piracy Sites. KSII Transactions on Internet and Information Systems. 14(5). 6 indexed citations
8.
Kwak, Jin, et al.. (2013). Study on Analysis Methodology for Android Applications. 網際網路技術學刊. 14(5). 851–857. 1 indexed citations
9.
Kwak, Jin, et al.. (2013). Privacy-enhanced social network service SNS. 16. 6905–6919. 1 indexed citations
10.
Kwak, Jin, et al.. (2013). Performance Improvement of a Movie Recommendation System based on Personal Propensity and Secure Collaborative Filtering. Journal of Information Processing Systems. 9(1). 157–172. 27 indexed citations
11.
Kwak, Jin, et al.. (2013). Smart Card and Dynamic ID Based Electric Vehicle User Authentication Scheme. Journal of Digital Convergence. 11(7). 141–148. 1 indexed citations
12.
Kwak, Jin, et al.. (2013). Secure User Authentication Scheme Based on Facial Recognition for Smartwork Environment. The Journal of Advanced Navigation Technology. 17(3). 314–325. 1 indexed citations
13.
Kwak, Jin, et al.. (2012). The Design of Anti-DDoS System using Defense on Depth. Information Security and Cryptology. 22(3). 679–689.
14.
Park, Chul‐Kee, et al.. (2011). A Study on Information Security Management System for Security Enhancement of Enterprise. 800–803. 1 indexed citations
15.
Park, Chul‐Kee, et al.. (2011). A Study on Enterprise and Government Information Security Enhancement with Information Security Management System. The Journal of Advanced Navigation Technology. 15(6). 1220–1227. 2 indexed citations
16.
Kwak, Jin, et al.. (2011). Design of Improved Strong Password Authentication Scheme to Secure on Replay Attack. Information Security and Cryptology. 21(6). 133–140.
17.
Yeo, Sang-Soo, et al.. (2009). Government Information Security System with ITS Product Pre-qualification. The Journal of Advanced Navigation Technology. 13(5). 763–772. 1 indexed citations
18.
Kwak, Jin, et al.. (2008). Vulnerability and Security Requirement Analysis on Security Token and Protection Profile Development based on Common Criteria Version 3.1. Information Security and Cryptology. 18(2). 139–150. 1 indexed citations
19.
Yeo, Sang-Soo, et al.. (2007). A Practical Proxy Device for Protecting RFID Tag's Identifier. 55–58. 3 indexed citations
20.
Kwak, Jin, et al.. (2005). Proceedings of the Second international conference on Information Security Practice and Experience.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026