| Logistic regression on homomorphic encrypted data at scale K Han, S Hong, JH Cheon, D Park Proceedings of the AAAI conference on artificial intelligence 33 (01), 9466-9471, 2019 | 252* | 2019 |
| Ultrafast homomorphic encryption models enable secure outsourcing of genotype imputation M Kim, AO Harmanci, JP Bossuat, S Carpov, JH Cheon, I Chillotti, W Cho, ... Cell systems 12 (11), 1108-1120. e4, 2021 | 94 | 2021 |
| A hybrid of dual and meet-in-the-middle attack on sparse and ternary secret LWE JH Cheon, M Hhan, S Hong, Y Son IEEE Access 7, 89497-89506, 2019 | 79 | 2019 |
| Remark on the security of ckks scheme in practice JH Cheon, S Hong, D Kim Cryptology ePrint Archive, 2020 | 64 | 2020 |
| Efficient Sorting of Homomorphic Encrypted Data With k-Way Sorting Network S Hong, S Kim, J Choi, Y Lee, JH Cheon IEEE Transactions on Information Forensics and Security 16, 4389-4404, 2021 | 53 | 2021 |
| Secure tumor classification by shallow neural network using homomorphic encryption S Hong, JH Park, W Cho, H Choe, JH Cheon BMC genomics 23 (1), 284, 2022 | 48 | 2022 |
| Privacy-preserving approximate GWAS computation based on homomorphic encryption D Kim, Y Son, D Kim, A Kim, S Hong, JH Cheon BMC Medical Genomics 13 (Suppl 7), 77, 2020 | 37 | 2020 |
| Privacy-preserving model evaluation for logistic and linear regression using homomorphically encrypted genotype data S Hong, YA Choi, DS Joo, G Gürsoy Journal of biomedical informatics 156, 104678, 2024 | 12 | 2024 |
| Lizard public key encryption JH Cheon, S Park, J Lee, D Kim, Y Song, S Hong, D Kim, J Kim, SM Hong, ... NIST PQC Round 1 (4), 2018 | 12 | 2018 |
| Polynomial functional encryption scheme with linear ciphertext size JH Cheon, S Hong, C Lee, Y Son Cryptology ePrint Archive, 2018 | 7 | 2018 |
| SQUiD: ultra-secure storage and analysis of genetic data for the advancement of precision medicine J Blindenbach, J Kang, S Hong, C Karam, T Lehner, G Gürsoy Genome Biology 25 (1), 314, 2024 | 6* | 2024 |
| A secure SNP panel scheme using homomorphically encrypted K-mers without SNP calling on the user side S Park, M Kim, S Seo, S Hong, K Han, K Lee, JH Cheon, S Kim BMC genomics 20 (Suppl 2), 188, 2019 | 5 | 2019 |
| Secure and scalable gene expression quantification with pQuant S Hong, CR Walker, YA Choi, G Gürsoy Nature Communications 16 (1), 2380, 2025 | 1 | 2025 |
| Fully Encrypted Machine Learning Protocol using Functional Encryption S Hong, J Kim, C Lee, M Seo Cryptology ePrint Archive, 2024 | 1 | 2024 |
| Practical sorting on large-scale encrypted data JH Cheon, S Hong US Patent App. 18/915,995, 2025 | | 2025 |