팔로우
Hyoungshick Kim
Hyoungshick Kim
skku.edu의 이메일 확인됨 - 홈페이지
제목
인용
인용
연도
Temporal node centrality in complex networks
H Kim, R Anderson
Physical Review E 85 (2), 026107, 2012
3222012
An image encryption scheme with a pseudorandom permutation based on chaotic maps
JW Yoon, H Kim
Communications in Nonlinear Science and Numerical Simulation 15 (12), 3998-4006, 2010
2022010
Backdoor attacks and countermeasures on deep learning: A comprehensive review
Y Gao, BG Doan, Z Zhang, S Ma, J Zhang, A Fu, S Nepal, H Kim
arXiv preprint arXiv:2007.10760, 2020
1592020
End-to-end evaluation of federated learning and split learning for internet of things
Y Gao, M Kim, S Abuadbba, Y Kim, C Thapa, K Kim, SA Camtepe, H Kim, ...
arXiv preprint arXiv:2003.13376, 2020
1482020
What’s in Twitter, I know what parties are popular and who you are supporting now!
A Boutet, H Kim, E Yoneki
Social network analysis and mining 3, 1379-1391, 2013
1212013
What's in your tweets? I know who you supported in the UK 2010 general election
A Boutet, H Kim, E Yoneki
Proceedings of the International AAAI Conference on Web and Social Media 6 …, 2012
1172012
Centrality prediction in dynamic human contact networks
H Kim, J Tang, R Anderson, C Mascolo
Computer Networks 56 (3), 983-996, 2012
1042012
DDoS attack mitigation in Internet of Things using software defined networking
ME Ahmed, H Kim
2017 IEEE third international conference on big data computing service and …, 2017
962017
Can we use split learning on 1d cnn models for privacy preserving training?
S Abuadbba, K Kim, M Kim, C Thapa, SA Camtepe, Y Gao, H Kim, ...
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
882020
Security challenges with network functions virtualization
MD Firoozjaei, JP Jeong, H Ko, H Kim
Future Generation Computer Systems 67, 315-324, 2017
882017
On the effectiveness of pattern lock strength meters: Measuring the strength of real world pattern locks
Y Song, G Cho, S Oh, H Kim, JH Huh
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
872015
Security and privacy challenges in the internet of things [security and privacy matters]
JH Lee, H Kim
IEEE Consumer Electronics Magazine 6 (3), 134-136, 2017
862017
Phishing detection with popular search engines: Simple and effective
JH Huh, H Kim
Foundations and Practice of Security: 4th Canada-France MITACS Workshop, FPS …, 2012
812012
You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild.
E Lee, J Woo, H Kim, A Mohaisen, HK Kim
Ndss, 1-15, 2016
772016
Hybrid spam filtering for mobile communication
JW Yoon, H Kim, JH Huh
computers & security 29 (4), 446-459, 2010
762010
Statistical application fingerprinting for DDoS attack mitigation
ME Ahmed, S Ullah, H Kim
IEEE Transactions on Information Forensics and Security 14 (6), 1471-1484, 2018
752018
Bitcoin vs. bitcoin cash: Coexistence or downfall of bitcoin cash?
Y Kwon, H Kim, J Shin, Y Kim
2019 IEEE Symposium on Security and Privacy (SP), 935-951, 2019
702019
Social network analysis of patent infringement lawsuits
H Kim, JS Song
Technological Forecasting and Social Change 80 (5), 944-955, 2013
682013
Void: A fast and light voice liveness detection system
ME Ahmed, IY Kwak, JH Huh, I Kim, T Oh, H Kim
29th USENIX Security Symposium (USENIX Security 20), 2685-2702, 2020
672020
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks
W Aiken, H Kim, S Woo, J Ryoo
Computers & Security 106, 102277, 2021
642021
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20