Taekyoung Kwon

2.2k total citations
96 papers, 1.2k citations indexed

About

Taekyoung Kwon is a scholar working on Computer Networks and Communications, Information Systems and Signal Processing. According to data from OpenAlex, Taekyoung Kwon has authored 96 papers receiving a total of 1.2k indexed citations (citations by other indexed papers that have themselves been cited), including 51 papers in Computer Networks and Communications, 35 papers in Information Systems and 27 papers in Signal Processing. Recurrent topics in Taekyoung Kwon's work include User Authentication and Security Systems (26 papers), Advanced Authentication Protocols Security (20 papers) and Advanced Malware Detection Techniques (19 papers). Taekyoung Kwon is often cited by papers focused on User Authentication and Security Systems (26 papers), Advanced Authentication Protocols Security (20 papers) and Advanced Malware Detection Techniques (19 papers). Taekyoung Kwon collaborates with scholars based in South Korea, United States and Japan. Taekyoung Kwon's co-authors include Sooyeon Shin, JooSeok Song, JongHyup Lee, Jin Hong, Yanghee Choi, Yanghee Choi, Hana Cho, Sangheon Pack, M. Naghshineh and T. J. Kim and has published in prestigious journals such as IEEE Transactions on Information Theory, IEEE Transactions on Industrial Electronics and IEEE Access.

In The Last Decade

Taekyoung Kwon

90 papers receiving 1.1k citations

Peers

Taekyoung Kwon
Steven Y. Ko United States
Susanne Wetzel United States
Zouheir Trabelsi United Arab Emirates
Steven Y. Ko United States
Taekyoung Kwon
Citations per year, relative to Taekyoung Kwon Taekyoung Kwon (= 1×) peers Steven Y. Ko

Countries citing papers authored by Taekyoung Kwon

Since Specialization
Citations

This map shows the geographic impact of Taekyoung Kwon's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Taekyoung Kwon with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Taekyoung Kwon more than expected).

Fields of papers citing papers by Taekyoung Kwon

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Taekyoung Kwon. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Taekyoung Kwon. The network helps show where Taekyoung Kwon may publish in the future.

Co-authorship network of co-authors of Taekyoung Kwon

This figure shows the co-authorship network connecting the top 25 collaborators of Taekyoung Kwon. A scholar is included among the top collaborators of Taekyoung Kwon based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Taekyoung Kwon. Taekyoung Kwon is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Kwon, Taekyoung, et al.. (2024). On the Correlation Between Deepfake Detection Performance and Image Quality Metrics. 14–19. 1 indexed citations
2.
Kwon, Taekyoung, et al.. (2024). Fuzzing JavaScript Interpreters with Coverage-Guided Reinforcement Learning for LLM-Based Mutation. 1656–1668. 4 indexed citations
4.
Kwon, Taekyoung, et al.. (2024). Coexistence of Deepfake Defenses: Addressing the Poisoning Challenge. IEEE Access. 12. 11674–11687. 3 indexed citations
5.
Kwon, Taekyoung, et al.. (2024). On the Impact of Deployment Errors in Location-Based Key Predistribution Protocols for Wireless Sensor Networks. IEEE Access. 12. 35765–35778. 1 indexed citations
6.
Lee, Younho, et al.. (2021). A Password Meter without Password Exposure. Sensors. 21(2). 345–345. 3 indexed citations
7.
Kwon, Taekyoung, et al.. (2020). A Study of Machine Learning based Hardware Trojans Detection Mechanisms for FPGAs. Journal of Internet Computing and services. 21(2). 109–119. 1 indexed citations
8.
Shin, Sooyeon & Taekyoung Kwon. (2018). Cryptanalysis of the Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks. 4. 46–52. 1 indexed citations
9.
Shin, Sooyeon & Taekyoung Kwon. (2017). Cryptanalysis of the IoT notion-based Authentication and Key Agreement Scheme for Wireless Sensor Networks. 3. 121–130. 1 indexed citations
10.
Kwon, Taekyoung, Mun‐Kyu Lee, & Daesung Kwon. (2013). Information security and cryptology - ICISC 2012 : 15th International Conference, Seoul, Korea, November 28-30, 2012 : revised selected papers. Springer eBooks. 9 indexed citations
11.
Kwon, Taekyoung. (2011). Privacy preservation with X.509 standard certificates. Information Sciences. 181(13). 2906–2921. 12 indexed citations
12.
Shin, Sooyeon, et al.. (2010). An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks. IEEE Transactions on Industrial Informatics. 6(4). 744–757. 119 indexed citations
13.
Cho, Kideok, et al.. (2008). RARA: Rate Adaptation Using Rate-Adaptive Acknowledgment for IEEE 802.11 WLANs. 62–66. 8 indexed citations
15.
Lim, Chae Hoon & Taekyoung Kwon. (2006). Strong and robust RFID authentication enabling perfect ownership transfer. 11 indexed citations
16.
Kwon, Taekyoung. (2001). Authentication and Key Agreement Via Memorable Passwords.. Network and Distributed System Security Symposium. 7–9. 27 indexed citations
17.
Kwon, Taekyoung & JooSeok Song. (2000). A Study on the Generalized Key Agreement and Password Authentication Protocol. IEICE Transactions on Communications. 83(9). 2044–2050. 8 indexed citations
18.
Kwon, Taekyoung, et al.. (1999). An Improvement of the Password-Based Authentication Protocol (K1P) on Security against Replay Attacks. IEICE Transactions on Communications. 82(7). 991–997. 29 indexed citations
19.
Kwon, Taekyoung & JooSeok Song. (1998). Efficient Key Exchange and Authentication Protocols Protecting Weak Secrets. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. 81(1). 156–163. 12 indexed citations
20.
Kwon, Taekyoung & JooSeok Song. (1996). A key distribution and authentication method on the Q.931 calling sequence of ISDN. 623–628. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026