Andrew Kim

Orcid: 0000-0003-2379-1178

According to our database1, Andrew Kim authored at least 20 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Conversational Swarm Intelligence, a Pilot Study.
CoRR, 2023

2022
A generic battery-cycling optimization framework with learned sampling and early stopping strategies.
Patterns, 2022

2021
Non-Inclusive Online Security: Older Adults' Experience with Two-Factor Authentication.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption.
Proceedings of the Financial Cryptography and Data Security, 2021

Myolink: EMG-based Inter-human Wireless Neuroprosthetic Controller.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

2020
Change-Point Analysis of Cyberbullying-Related Twitter Discussions During COVID-19.
CoRR, 2020

MFA is A Necessary Chore!: Exploring User Mental Models of Multi-Factor Authentication Technologies.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory.
Proceedings of the Human Aspects of Information Security and Assurance, 2020

2019
Comprehensive Methodology for Multiple Spots Competing Progressive Breakdown for BEOL/FEOL Applications.
Proceedings of the IEEE International Reliability Physics Symposium, 2019

Transformation of Ramped Current Stress VBDto Constant Voltage Stress TDDB TBD.
Proceedings of the IEEE International Reliability Physics Symposium, 2019

All About Phishing: Exploring User Research through a Systematic Literature Review.
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019

Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

Study on the Optoelectronic Behavior of Zr Based MOFs Using Computational Simulations.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

Cooperation and Codenames: Understanding Natural Language Processing via Codenames.
Proceedings of the Fifteenth AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, 2019

2018
Elapsed-time statistics of successive breakdown in the presence of variability for dielectric breakdown in BEOL/MOL/FEOL applications.
Proceedings of the IEEE International Reliability Physics Symposium, 2018

Electromigration characteristics of power grid like structures.
Proceedings of the IEEE International Reliability Physics Symposium, 2018

Transient self-heating modeling and simulations of back-end-of-line interconnects.
Proceedings of the IEEE International Reliability Physics Symposium, 2018

2007
A New Framework of Measuring the Business Values of Software.
Proceedings of the Human-Computer Interaction. Interaction Design and Usability, 2007

2006
A Framework for Managing the Solution Life Cycle of Event-Driven Pervasive Applications.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006

1999
Hierarchical stochastic modeling of SAR imagery for segmentation/compression.
IEEE Trans. Signal Process., 1999


  Loading...