default search action
Junho Hong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Jihun Ha, J. Prasanth Ram, Young-Jin Kim, Junho Hong:
Data-Driven Two-Stage Fault Detection and Diagnosis Method for Photovoltaic Power Generation. IEEE Trans. Instrum. Meas. 73: 1-11 (2024) - [j16]Sangwon Lee, Junho Hong, Ling Liu, Wonik Choi:
TS-Fastformer: Fast Transformer for Time-series Forecasting. ACM Trans. Intell. Syst. Technol. 15(2): 24:1-24:20 (2024) - [i8]Aydin Zaboli, Seong Lok Choi, Tai-Jin Song, Junho Hong:
A Novel Generative AI-Based Framework for Anomaly Detection in Multicast Messages in Smart Grid Communications. CoRR abs/2406.05472 (2024) - [i7]Subhadip Ghosh, Aydin Zaboli, Junho Hong, Jaerock Kwon:
A Physics-Based Context-Aware Approach for Anomaly Detection in Teleoperated Driving Operations Under False Data Injection Attacks. CoRR abs/2410.13962 (2024) - 2023
- [j15]Subhadip Ghosh, Aydin Zaboli, Junho Hong, Jaerock Kwon:
An Integrated Approach of Threat Analysis for Autonomous Vehicles Perception System. IEEE Access 11: 14752-14777 (2023) - [j14]Aydin Zaboli, Vo-Nguyen Tuyet-Doan, Yong-Hwa Kim, Junho Hong, Wencong Su:
An LSTM-SAE-Based Behind-the-Meter Load Forecasting Method. IEEE Access 11: 49378-49392 (2023) - [j13]Aydin Zaboli, Junho Hong, Jaerock Kwon, John Moore:
A Survey on Cyber-Physical Security of Autonomous Vehicles Using a Context Awareness Method. IEEE Access 11: 136706-136725 (2023) - [j12]Ahmed Al Amin, Junho Hong, Van-Hai Bui, Wencong Su:
Emerging 6G/B6G Wireless Communication for the Power Infrastructure in Smart Cities: Innovations, Challenges, and Future Perspectives. Algorithms 16(10): 474 (2023) - [j11]Dong-Hyeon Ryu, Seong-Yun Jeon, Junho Hong, Mun-Kyu Lee:
Efficient Lp Distance Computation Using Function-Hiding Inner Product Encryption for Privacy-Preserving Anomaly Detection. Sensors 23(8): 4169 (2023) - [i6]Aydin Zaboli, Seong Lok Choi, Tai-Jin Song, Junho Hong:
ChatGPT and other Large Language Models for Cybersecurity of Smart Grid Applications. CoRR abs/2311.05462 (2023) - [i5]Mansi Girdhar, Junho Hong, Wencong Su, Akila Herath, Chen-Ching Liu:
SDN-Based Dynamic Cybersecurity Framework of IEC-61850 Communications in Smart Grid. CoRR abs/2311.12205 (2023) - [i4]Kuchan Park, Junho Hong, Wencong Su, Hyojong Lee:
Machine Learning based Post Event Analysis for Cybersecurity of Cyber-Physical System. CoRR abs/2311.13488 (2023) - 2022
- [j10]Mansi Girdhar, Yongsik You, Tai-Jin Song, Subhadip Ghosh, Junho Hong:
Post-Accident Cyberattack Event Analysis for Connected and Automated Vehicles. IEEE Access 10: 83176-83194 (2022) - [j9]Mansi Girdhar, Junho Hong, Hyojong Lee, Tai-Jin Song:
Hidden Markov Models-Based Anomaly Correlations for the Cyber-Physical Security of EV Charging Stations. IEEE Trans. Smart Grid 13(5): 3903-3914 (2022) - [i3]Mansi Girdhar, Junho Hong, Yongsik You, Tai-Jin Song:
Machine Learning-Enabled Cyber Attack Prediction and Mitigation for EV Charging Stations. CoRR abs/2208.10644 (2022) - [i2]Mansi Girdhar, Junho Hong, Yongsik You, Tai-Jin Song, Manimaran Govindarasu:
Cyber-Attack Event Analysis for EV Charging Stations. CoRR abs/2211.08530 (2022) - 2021
- [j8]Ruoxi Zhu, Chen-Ching Liu, Junho Hong, Jiankang Wang:
Intrusion Detection Against MMS-Based Measurement Attacks at Digital Substations. IEEE Access 9: 1240-1249 (2021) - [c6]Mansi Girdhar, Junho Hong, Ramya Karnati, Soonwoo Lee, Sungsoo Choi:
Cybersecurity of Process Bus Network in Digital Substations. ICEIC 2021: 1-6 - [c5]Ruoxi Zhu, Junho Hong, Chen-Ching Liu, Jiankang Wang:
Cyber System Recovery for IEC 61850 Substations. ISGT 2021: 1-5 - 2020
- [j7]In-Sun Choi, Junho Hong, Tae-Wan Kim:
Multi-Agent Based Cyber Attack Detection and Mitigation for Distribution Automation System. IEEE Access 8: 183495-183504 (2020) - [j6]Jiankang Wang, Gonzalo E. Constante, Christian Moya, Junho Hong:
Semantic analysis framework for protecting the power grid against monitoring-control attacks. IET Cyper-Phys. Syst.: Theory & Appl. 5(1): 119-126 (2020) - [c4]Junho Hong, Eunhwa Oh, Yeojin Yang, Kyungwoo Roh, Minji Oh, Jaesung Kim:
Consortium Blockchain-based V2G Energy Trading System Using Tokens. ICTC 2020: 677-682
2010 – 2019
- 2019
- [j5]Junho Hong, Reynaldo F. Nuqui, Anil Kondabathini, Dmitry Ishchenko, Aaron Martin:
Cyber Attack Resilient Distance Protection and Circuit Breaker Control for Digital Substations. IEEE Trans. Ind. Informatics 15(7): 4332-4341 (2019) - [j4]Junho Hong, Chen-Ching Liu:
Intelligent Electronic Devices With Collaborative Intrusion Detection Systems. IEEE Trans. Smart Grid 10(1): 271-281 (2019) - 2018
- [j3]Ying Chen, Junho Hong, Chen-Ching Liu:
Modeling of Intrusion and Defense for Assessment of Cyber Security at Power Substations. IEEE Trans. Smart Grid 9(4): 2541-2552 (2018) - [i1]Christian Moya, Junho Hong, Jiankang Wang:
Application of Correlation Indices on Intrusion Detection Systems: Protecting the Power Grid Against Coordinated Attacks. CoRR abs/1806.03544 (2018) - 2016
- [c3]Chih-Che Sun, Junho Hong, Chen-Ching Liu:
A coordinated cyber attack detection system (CCADS) for multiple substations. PSCC 2016: 1-7 - 2015
- [c2]Chih-Che Sun, Junho Hong, Chen-Ching Liu:
A co-simulation environment for integrated cyber and power systems. SmartGridComm 2015: 133-138 - 2014
- [j2]Junho Hong, Chen-Ching Liu, Manimaran Govindarasu:
Integrated Anomaly Detection for Cyber Security of the Substations. IEEE Trans. Smart Grid 5(4): 1643-1653 (2014) - [c1]Junho Hong, Chen-Ching Liu, Manimaran Govindarasu:
Detection of cyber intrusions using network-based multicast messages for substation automation. ISGT 2014: 1-5 - 2011
- [j1]Chee-Wooi Ten, Junho Hong, Chen-Ching Liu:
Anomaly Detection for Cybersecurity of the Substations. IEEE Trans. Smart Grid 2(4): 865-873 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-26 21:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint