Jinoh Kim

2.1k total citations · 1 hit paper
86 papers, 1.3k citations indexed

About

Jinoh Kim is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Jinoh Kim has authored 86 papers receiving a total of 1.3k indexed citations (citations by other indexed papers that have themselves been cited), including 66 papers in Computer Networks and Communications, 53 papers in Artificial Intelligence and 29 papers in Information Systems. Recurrent topics in Jinoh Kim's work include Network Security and Intrusion Detection (39 papers), Anomaly Detection Techniques and Applications (27 papers) and Internet Traffic Analysis and Secure E-voting (25 papers). Jinoh Kim is often cited by papers focused on Network Security and Intrusion Detection (39 papers), Anomaly Detection Techniques and Applications (27 papers) and Internet Traffic Analysis and Secure E-voting (25 papers). Jinoh Kim collaborates with scholars based in United States, South Korea and China. Jinoh Kim's co-authors include Sang C. Suh, Hyunjoo Kim, Donghwoon Kwon, Ikkyun Kim, Kuinam J. Kim, Alex Sim, Jonghyun Kim, Sang‐Yoon Chang, Kesheng Wu and Doron Rotem and has published in prestigious journals such as IEEE Access, Sensors and Sustainability.

In The Last Decade

Jinoh Kim

80 papers receiving 1.2k citations

Hit Papers

A survey of deep learning-based network anomaly detection 2017 2026 2020 2023 2017 100 200 300 400 500

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Jinoh Kim United States 16 916 867 380 243 106 86 1.3k
Hongliang Zhu China 10 661 0.7× 607 0.7× 433 1.1× 312 1.3× 90 0.8× 56 1.1k
Changzhen Hu China 16 721 0.8× 601 0.7× 464 1.2× 411 1.7× 63 0.6× 109 1.2k
Kuinam J. Kim South Korea 11 542 0.6× 529 0.6× 301 0.8× 167 0.7× 87 0.8× 43 907
Izhar Ahmed Khan China 18 622 0.7× 485 0.6× 276 0.7× 139 0.6× 231 2.2× 42 1.0k
Yang Xin China 16 1.1k 1.2× 954 1.1× 722 1.9× 481 2.0× 125 1.2× 128 1.9k
Noura Limam Canada 14 964 1.1× 540 0.6× 182 0.5× 256 1.1× 71 0.7× 38 1.3k
Sevil Şen Türkiye 14 658 0.7× 461 0.5× 320 0.8× 296 1.2× 104 1.0× 45 1.1k
Ansam Khraisat Australia 12 1.5k 1.7× 1.1k 1.3× 910 2.4× 258 1.1× 204 1.9× 33 1.8k
Chunming Wu China 24 881 1.0× 683 0.8× 326 0.9× 411 1.7× 143 1.3× 209 1.8k
Miao Xie China 17 669 0.7× 553 0.6× 268 0.7× 157 0.6× 180 1.7× 33 1.0k

Countries citing papers authored by Jinoh Kim

Since Specialization
Citations

This map shows the geographic impact of Jinoh Kim's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jinoh Kim with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jinoh Kim more than expected).

Fields of papers citing papers by Jinoh Kim

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Jinoh Kim. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jinoh Kim. The network helps show where Jinoh Kim may publish in the future.

Co-authorship network of co-authors of Jinoh Kim

This figure shows the co-authorship network connecting the top 25 collaborators of Jinoh Kim. A scholar is included among the top collaborators of Jinoh Kim based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Jinoh Kim. Jinoh Kim is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Siriwardhana, Yushan, Pawani Porambage, Madhusanka Liyanage, et al.. (2025). Descriptor: 5G Wireless Network Intrusion Detection Dataset (5G-NIDD). 2. 358–369. 1 indexed citations
2.
Kim, Jinoh, et al.. (2024). Distributed Software Build Assurance for Software Supply Chain Integrity. Applied Sciences. 14(20). 9262–9262. 1 indexed citations
3.
Kim, Jinoh, et al.. (2024). Wireless Link Routing to Secure Against Fake Base Station in 5G. 1–3. 1 indexed citations
4.
Khan, Qaiser M., et al.. (2024). Toward Post-Quantum Digital Certificate for eSIM. 1–3. 2 indexed citations
5.
Kim, Jinoh, et al.. (2024). Fake Base Station Detection and Blacklisting. 1–9. 2 indexed citations
6.
Chang, Sang‐Yoon, et al.. (2024). Anomaly Detection in 5G using Variational Autoencoders. 1–6. 2 indexed citations
7.
Kim, Jinoh, et al.. (2024). Blockchain Handshaking with Software Assurance: Version++ Protocol for Bitcoin Cryptocurrency. Electronics. 13(19). 3857–3857. 1 indexed citations
8.
Chang, Sang‐Yoon, et al.. (2024). Flying Base Station Channel Capacity. 24–31.
9.
Chang, Sang‐Yoon, et al.. (2023). Base station gateway to secure user channel access at the first hop edge. Computer Networks. 240. 110165–110165. 2 indexed citations
10.
Sim, Alex, et al.. (2023). Leveraging History to Predict Infrequent Abnormal Transfers in Distributed Workflows. Sensors. 23(12). 5485–5485.
11.
Kwon, Donghwoon, et al.. (2023). Evaluating Unbalanced Network Data for Attack Detection. 23–26. 1 indexed citations
12.
Kim, Jinoh, et al.. (2023). Version++: Cryptocurrency Blockchain Handshaking With Software Assurance. 13. 804–809. 3 indexed citations
13.
Kim, Chiho, Sang‐Yoon Chang, Jonghyun Kim, & Jinoh Kim. (2023). An Empirical Evaluation of Autoencoding-Based Location Spoofing Detection. 574–579.
14.
Kim, Jinoh, et al.. (2023). Distributed and Lightweight Software Assurance in Cellular Broadcasting Handshake and Connection Establishment. Electronics. 12(18). 3782–3782. 1 indexed citations
15.
Kim, Jinoh, et al.. (2022). Enhancing IoT anomaly detection performance for federated learning. Digital Communications and Networks. 8(3). 314–323. 41 indexed citations
16.
Lee, Dong‐Eun, et al.. (2020). A Learning-based Data Augmentation for Network Anomaly Detection. 1–10. 10 indexed citations
17.
Kim, Jinoh, Hasan Abbasi, Luis Chacòn, et al.. (2011). Parallel in situ indexing for data-intensive computing. 65–72. 37 indexed citations
18.
Jordan, Nicholas R., Carissa Schively Slotterback, Kirsten Valentine Cadieux, et al.. (2011). TMDL Implementation in Agricultural Landscapes: A Communicative and Systemic Approach. Environmental Management. 48(1). 1–12. 22 indexed citations
19.
Kim, Jinoh & Doron Rotem. (2010). Using Replication for Energy Conservation in RAID Systems.. Parallel and Distributed Processing Techniques and Applications. 703–709. 7 indexed citations
20.
Kim, Jinoh, Frederick Steiner, & Elizabeth J. Mueller. (2010). Cranes, Crops and Conservation: Understanding Human Perceptions of Biodiversity Conservation in South Korea’s Civilian Control Zone. Environmental Management. 47(1). 1–10. 15 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026