Manpyo Hong

469 total citations
35 papers, 208 citations indexed

About

Manpyo Hong is a scholar working on Computer Networks and Communications, Information Systems and Computer Vision and Pattern Recognition. According to data from OpenAlex, Manpyo Hong has authored 35 papers receiving a total of 208 indexed citations (citations by other indexed papers that have themselves been cited), including 23 papers in Computer Networks and Communications, 11 papers in Information Systems and 9 papers in Computer Vision and Pattern Recognition. Recurrent topics in Manpyo Hong's work include Advanced Malware Detection Techniques (7 papers), Network Security and Intrusion Detection (6 papers) and IPv6, Mobility, Handover, Networks, Security (6 papers). Manpyo Hong is often cited by papers focused on Advanced Malware Detection Techniques (7 papers), Network Security and Intrusion Detection (6 papers) and IPv6, Mobility, Handover, Networks, Security (6 papers). Manpyo Hong collaborates with scholars based in South Korea, Saudi Arabia and Canada. Manpyo Hong's co-authors include Kyung-suk Lhee, Usman Tariq, Jonguk Kim, Irfan Ahmed, Hyunjung Shin, Kyunghee Choi, Seung-Kyu Park, Dong-Yoon Kim, Taeshik Shon and Jin Kwak and has published in prestigious journals such as Computers & Mathematics with Applications, Multimedia Tools and Applications and Electronics.

In The Last Decade

Manpyo Hong

31 papers receiving 191 citations

Peers

Manpyo Hong
Mohsen Amini Salehi United States
Burak Yavuz United States
Safiullah Khan South Korea
Yang Su China
Najwa Aaraj United States
Mohsen Amini Salehi United States
Manpyo Hong
Citations per year, relative to Manpyo Hong Manpyo Hong (= 1×) peers Mohsen Amini Salehi

Countries citing papers authored by Manpyo Hong

Since Specialization
Citations

This map shows the geographic impact of Manpyo Hong's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Manpyo Hong with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Manpyo Hong more than expected).

Fields of papers citing papers by Manpyo Hong

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Manpyo Hong. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Manpyo Hong. The network helps show where Manpyo Hong may publish in the future.

Co-authorship network of co-authors of Manpyo Hong

This figure shows the co-authorship network connecting the top 25 collaborators of Manpyo Hong. A scholar is included among the top collaborators of Manpyo Hong based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Manpyo Hong. Manpyo Hong is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Hong, Manpyo, et al.. (2021). AVoD: Advanced Verify-on-Demand for Efficient Authentication against DoS Attacks in V2X Communication. Security and Communication Networks. 2021. 1–9. 4 indexed citations
2.
Kim, Jimin, et al.. (2019). Emulation-Based Fuzzing Techniques for Identifying Web Interface Vulnerabilities in Embedded Device Firmware. Information Security and Cryptology. 29(6). 1225–1234. 1 indexed citations
3.
Hong, Manpyo, et al.. (2019). Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance. Multimedia Tools and Applications. 79(23-24). 16077–16091. 16 indexed citations
4.
Kim, Jimin, et al.. (2015). Review of one-time signatures for multicast authentication in smart grid. 1–4. 4 indexed citations
5.
Hong, Manpyo, et al.. (2014). Secure Collaborative Key Management for Dynamic Groups in Mobile Networks. Journal of Applied Mathematics. 2014. 1–10. 1 indexed citations
7.
Kim, Ki‐Hyung, et al.. (2013). A fast and efficient wireless AP connection approach based on NFC Tag. 2012. 1076–1077. 1 indexed citations
8.
Kim, Jai-Hoon, et al.. (2013). An interactive pervasive whiteboard based on MVC architecture for ubiquitous collaboration. Multimedia Tools and Applications. 74(5). 1557–1576. 3 indexed citations
9.
Shon, Taeshik, et al.. (2012). A Study on the Korean-Stroke based Graphical Password Approach. Information Security and Cryptology. 22(2). 189–200. 1 indexed citations
10.
Kim, Jonguk, et al.. (2012). Polynomial-based key management for secure intra-group and inter-group communication. Computers & Mathematics with Applications. 65(9). 1300–1309. 36 indexed citations
11.
Shon, Taeshik, et al.. (2012). Two-factor authentication system based on extended OTP mechanism. International Journal of Computer Mathematics. 90(12). 2515–2529. 5 indexed citations
12.
Kim, Jonguk, et al.. (2012). Go anywhere: user-verifiable authentication over distance-free channel for mobile devices. Personal and Ubiquitous Computing. 17(5). 933–943. 2 indexed citations
13.
Tariq, Usman, Yasir Malik, Bessam Abdulrazak, & Manpyo Hong. (2011). Collaborative Peer to Peer Defense Mechanism for DDoS Attacks. Procedia Computer Science. 5. 157–164. 11 indexed citations
14.
Lhee, Kyung-suk, et al.. (2010). A robust defense against Content-Sniffing XSS attacks. 315–320. 10 indexed citations
15.
Kim, Jonguk, et al.. (2010). EDGAR: Extended Dynamic Group-Key AgReement. 390–395. 1 indexed citations
16.
Ahmed, Irfan, Kyung-suk Lhee, Hyunjung Shin, & Manpyo Hong. (2010). Fast file-type identification. 1601–1602. 13 indexed citations
17.
Ahmed, Irfan, Kyung-suk Lhee, Hyunjung Shin, & Manpyo Hong. (2010). Content-based File-type Identification Using Cosine Similarity and a Divide-and-Conquer Approach. 27(6). 465–477. 6 indexed citations
18.
Roh, Byeong‐hee, et al.. (2008). Analysis and its solution on security threats in SIP-based mobility support environments. 4. 603–607. 1 indexed citations
19.
Ahmed, Irfan, et al.. (2007). Binding Update Authentication Scheme for Mobile IPv6. 109–114.
20.
Ahmed, Irfan, et al.. (2007). Binding Update Authentication Scheme for Mobile IPv6. 109–114. 6 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026