Seunghun Jin

1.1k total citations
57 papers, 752 citations indexed

About

Seunghun Jin is a scholar working on Information Systems, Computer Networks and Communications and Computer Vision and Pattern Recognition. According to data from OpenAlex, Seunghun Jin has authored 57 papers receiving a total of 752 indexed citations (citations by other indexed papers that have themselves been cited), including 20 papers in Information Systems, 19 papers in Computer Networks and Communications and 18 papers in Computer Vision and Pattern Recognition. Recurrent topics in Seunghun Jin's work include Access Control and Trust (11 papers), Advanced Vision and Imaging (8 papers) and Digital Rights Management and Security (7 papers). Seunghun Jin is often cited by papers focused on Access Control and Trust (11 papers), Advanced Vision and Imaging (8 papers) and Digital Rights Management and Security (7 papers). Seunghun Jin collaborates with scholars based in South Korea and United States. Seunghun Jin's co-authors include Jae Wook Jeon, Munsang Kim, Xuan Dai Pham, Sung-Kee Park, Kyoung Mu Lee, Daeseon Choi, Dongkyun Kim, Hyunsoo Yoon, Namje Park and Thuy Tuong Nguyen and has published in prestigious journals such as IEEE Access, IEEE Transactions on Vehicular Technology and IEEE Transactions on Industrial Informatics.

In The Last Decade

Seunghun Jin

55 papers receiving 687 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Seunghun Jin South Korea 13 353 205 171 137 132 57 752
Mohammed S. Elbamby Finland 8 246 0.7× 456 2.2× 341 2.0× 49 0.4× 106 0.8× 14 868
Haohong Wang United States 17 426 1.2× 370 1.8× 324 1.9× 34 0.2× 86 0.7× 78 895
Vladimir Poulkov Bulgaria 13 155 0.4× 413 2.0× 355 2.1× 63 0.5× 36 0.3× 153 798
Andy Harter United Kingdom 6 484 1.4× 672 3.3× 652 3.8× 46 0.3× 95 0.7× 7 1.2k
Miao Hu China 14 257 0.7× 281 1.4× 152 0.9× 20 0.1× 108 0.8× 66 679
Elsayed E. Hemayed Egypt 14 397 1.1× 135 0.7× 43 0.3× 86 0.6× 156 1.2× 68 701
Shujie Yang China 13 174 0.5× 433 2.1× 193 1.1× 20 0.1× 130 1.0× 70 685
A. Smailagic United States 6 441 1.2× 481 2.3× 246 1.4× 16 0.1× 149 1.1× 7 778
Mingxuan Sun United States 14 219 0.6× 132 0.6× 117 0.7× 21 0.2× 144 1.1× 53 659
Lujie Zhong China 19 274 0.8× 840 4.1× 372 2.2× 25 0.2× 150 1.1× 70 1.1k

Countries citing papers authored by Seunghun Jin

Since Specialization
Citations

This map shows the geographic impact of Seunghun Jin's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Seunghun Jin with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Seunghun Jin more than expected).

Fields of papers citing papers by Seunghun Jin

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Seunghun Jin. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Seunghun Jin. The network helps show where Seunghun Jin may publish in the future.

Co-authorship network of co-authors of Seunghun Jin

This figure shows the co-authorship network connecting the top 25 collaborators of Seunghun Jin. A scholar is included among the top collaborators of Seunghun Jin based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Seunghun Jin. Seunghun Jin is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Kim, Seung-Hyun, et al.. (2020). Is Your Android App Insecure? Patching Security Functions With Dynamic Policy Based on a Java Reflection Technique. IEEE Access. 8. 83248–83264. 5 indexed citations
2.
Kim, Jinsu, et al.. (2019). CCTV Video Processing Metadata Security Scheme Using Character Order Preserving-Transformation in the Emerging Multimedia. Electronics. 8(4). 412–412. 34 indexed citations
3.
Kim, Soo-Hyung, et al.. (2018). Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment. Journal of Information Processing Systems. 14(2). 523–538. 5 indexed citations
4.
Cho, Sangrae, et al.. (2018). Learning based biometric key generation method using CNN and RNN. 136–139. 9 indexed citations
5.
Hwang, Jung Yeon, et al.. (2016). Simplified small exponent test for batch verification. Theoretical Computer Science. 662. 48–58. 12 indexed citations
6.
Jin, Seunghun, et al.. (2014). Device control protocol using mobile phone. 355–359. 12 indexed citations
7.
Jin, Seunghun, et al.. (2010). An FPGA-based vehicle speed measurement system using an uncalibrated camera. ICCAS 2010. 1691–1696. 8 indexed citations
8.
Jin, Seunghun, et al.. (2010). A real-time window-based image processing architecture using a mapping table. ICCAS 2010. 1678–1681. 1 indexed citations
9.
Kim, Seung-Hyun, Daeseon Choi, & Seunghun Jin. (2009). Digital ID Wallet: Provide Selective Disclosure and Users Control of Identity Information.. Security and Management. 457–462. 1 indexed citations
10.
Jin, Seunghun, et al.. (2009). A dedicated hardware architecture for real-time auto-focusing using an FPGA. Machine Vision and Applications. 21(5). 727–734. 7 indexed citations
11.
Jin, Seunghun, Dongkyun Kim, Xuan Dai Pham, & Jae Wook Jeon. (2009). FPGA-based image processing system for remote robot control. 1. 120–124. 2 indexed citations
12.
Kim, Dongkyun, et al.. (2009). Real-time binary shape matching system based on FPGA. 1194–1199. 2 indexed citations
13.
Choi, Daeseon, et al.. (2009). Identity Data Security System for the Digital Identity Wallet. 3. 1678–1681.
14.
Jin, Seunghun, et al.. (2008). The Security Limitations of SSO in OpenID. International Conference on Advanced Communication Technology. 10. 1608–1611. 17 indexed citations
16.
Choi, Daeseon, Seunghun Jin, & Hyunsoo Yoon. (2007). Trust Management for User-Centric Identity Management on the Internet. 1–4. 3 indexed citations
17.
Choi, Daeseon, Seunghun Jin, & Hyunsoo Yoon. (2006). A Personal Information Leakage Prevention Method on the Internet. 1–5. 5 indexed citations
18.
Kim, Seung-Hyun & Seunghun Jin. (2006). Virtual route scheme for preventing authentication bypass in the WWW environment. 2006 8th International Conference Advanced Communication Technology. 2246. 6 pp.–827. 1 indexed citations
19.
Lee, Younho, et al.. (2005). Trust evaluation model for wireless sensor networks. KAIST Institutional Repository (KAIST). 491–496. 53 indexed citations
20.
Shin, Dongwan, Gail‐Joon Ahn, Sangrae Cho, & Seunghun Jin. (2003). A role administration system in role-based authorization infrastructures. 325–330. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026