Seng-Phil Hong

498 total citations
20 papers, 285 citations indexed

About

Seng-Phil Hong is a scholar working on Sociology and Political Science, Artificial Intelligence and Information Systems. According to data from OpenAlex, Seng-Phil Hong has authored 20 papers receiving a total of 285 indexed citations (citations by other indexed papers that have themselves been cited), including 8 papers in Sociology and Political Science, 8 papers in Artificial Intelligence and 7 papers in Information Systems. Recurrent topics in Seng-Phil Hong's work include Innovation in Digital Healthcare Systems (6 papers), Privacy, Security, and Data Protection (5 papers) and Privacy-Preserving Technologies in Data (3 papers). Seng-Phil Hong is often cited by papers focused on Innovation in Digital Healthcare Systems (6 papers), Privacy, Security, and Data Protection (5 papers) and Privacy-Preserving Technologies in Data (3 papers). Seng-Phil Hong collaborates with scholars based in South Korea, United States and India. Seng-Phil Hong's co-authors include Gail‐Joon Ahn, William J. Tolone, Jae-Jung Kim, Hye Ri Kim, Debnath Bhattacharyya, Sungmin Kang, Jaejung Kim, Yujin Shin, Taikyeong Jeong and Eugene S. Kim and has published in prestigious journals such as ACM Computing Surveys, Journal of Network and Computer Applications and International Journal of Distributed Sensor Networks.

In The Last Decade

Seng-Phil Hong

16 papers receiving 257 citations

Peers

Seng-Phil Hong
Eve Maler United States
Dieter Sommer Switzerland
Farida Chowdhury Bangladesh
Scott Ruoti United States
Eve Maler United States
Seng-Phil Hong
Citations per year, relative to Seng-Phil Hong Seng-Phil Hong (= 1×) peers Eve Maler

Countries citing papers authored by Seng-Phil Hong

Since Specialization
Citations

This map shows the geographic impact of Seng-Phil Hong's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Seng-Phil Hong with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Seng-Phil Hong more than expected).

Fields of papers citing papers by Seng-Phil Hong

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Seng-Phil Hong. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Seng-Phil Hong. The network helps show where Seng-Phil Hong may publish in the future.

Co-authorship network of co-authors of Seng-Phil Hong

This figure shows the co-authorship network connecting the top 25 collaborators of Seng-Phil Hong. A scholar is included among the top collaborators of Seng-Phil Hong based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Seng-Phil Hong. Seng-Phil Hong is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Bhattacharyya, Debnath, et al.. (2022). A Novel Approach in Bio-Medical Image Segmentation for Analyzing Brain Cancer Images with U-NET Semantic Segmentation and TPLD Models Using SVM. Traitement du signal. 39(2). 419–430. 8 indexed citations
2.
Kim, Hye Ri, et al.. (2018). A Study on the Design of Smart Contracts mechanism based on the Blockchain for anti-money laundering. Journal of Internet Computing and services. 19(5). 1–11. 4 indexed citations
3.
Kim, Hye Ri & Seng-Phil Hong. (2018). A Study on Personal Information Protection in Blockchain Network. 15(2). 81–92.
4.
Hong, Seng-Phil, et al.. (2017). A Trusted Sharing Model for Patient Records based on Permissioned Blockchain. Journal of Internet Computing and services. 18(6). 75–84. 10 indexed citations
5.
Hong, Seng-Phil, et al.. (2017). A Study on Privacy and Information Protection in Distributed Network Environment –Focused on Blockchain-. 14(2). 167–180. 1 indexed citations
6.
Kim, Hye Ri, et al.. (2017). A Study on Ways to Apply the Blockchain-based Online Voting System. International Journal of Control and Automation. 10(12). 121–130. 7 indexed citations
8.
Hong, Seng-Phil, et al.. (2014). Study on Enhancing Vulnerability Evaluations for BYOD Security. International Journal of Security and Its Applications. 8(4). 229–238. 1 indexed citations
9.
Hong, Seng-Phil, et al.. (2014). A Framework for Personal Information Handler in Smart Device Environment. 11(1). 13–24. 1 indexed citations
10.
Hong, Seng-Phil, Sungmin Kang, & Jaejung Kim. (2013). Design and Implementation of Reliable Content Transaction System in Smartphone Environment. International Journal of Smart Home. 7(6). 333–342. 2 indexed citations
11.
Hong, Seng-Phil, et al.. (2013). Privacy Care Architecture in Wireless Sensor Networks. International Journal of Distributed Sensor Networks. 9(5). 369502–369502. 7 indexed citations
12.
Hong, Seng-Phil, et al.. (2012). Development of Framework for Trusted Financial Service in N-Screen Environment. Journal of Internet Computing and services. 13(3). 127–137. 1 indexed citations
13.
Shin, Yujin, et al.. (2012). Design of e-Learning System in N-Screen Environment. Journal of Internet Computing and services. 13(5). 45–53. 1 indexed citations
14.
Kim, Jae-Jung & Seng-Phil Hong. (2011). A Method of Risk Assessment for Multi-Factor Authentication. Journal of Information Processing Systems. 7(1). 187–198. 39 indexed citations
15.
Kim, Eugene S., et al.. (2009). Privacy information protection in portable device. 643–646. 1 indexed citations
16.
Hong, Seng-Phil, et al.. (2008). Systematic Website Verification for Privacy Protection. 7. 231–234.
17.
Jeong, Taikyeong, et al.. (2008). Neural Net Water Level Trend Prediction and Dynamic Water Level Sampling Frequency. 29–37. 2 indexed citations
18.
Hong, Seng-Phil, et al.. (2006). Privacy Framework in Ubiquitous Computing Environments. Information Security and Cryptology. 16(3). 157–164.
19.
Tolone, William J., et al.. (2005). Access control in collaborative systems. ACM Computing Surveys. 37(1). 29–41. 184 indexed citations
20.
Ahn, Gail‐Joon, et al.. (2005). Towards secure information sharing using role-based delegation. Journal of Network and Computer Applications. 30(1). 42–59. 14 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026