Heeyoul Kim
Orcid: 0000-0001-6341-580X
According to our database1,
Heeyoul Kim
authored at least 36 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Decentralized commit-reveal scheme to defend against front-running attacks on Decentralized EXchanges.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024
Proceedings of the 26th International Conference on Advanced Communications Technology, 2024
2023
Anomaly VAE-Transformer: A Deep Learning Approach for Anomaly Detection in Decentralized Finance.
IEEE Access, 2023
Surveillance System for Real-Time High-Precision Recognition of Criminal Faces From Wild Videos.
IEEE Access, 2023
Proceedings of the 25th International Conference on Advanced Communication Technology, 2023
2020
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020
2019
A Probabilistic Test based Detection Scheme against Automated Attacks on Android In-app Billing Service.
KSII Trans. Internet Inf. Syst., 2019
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
2018
KSII Trans. Internet Inf. Syst., 2018
KSII Trans. Internet Inf. Syst., 2018
Comput. Stand. Interfaces, 2018
2012
Proceedings of the Computer Applications for Communication, Networking, and Digital Contents, 2012
2011
KSII Trans. Internet Inf. Syst., 2011
IEICE Trans. Inf. Syst., 2011
2010
J. Syst. Softw., 2010
2009
A new data hiding scheme for binary image authentication with small image distortion.
Inf. Sci., 2009
2008
An efficient delegation protocol with delegation traceability in the X.509 proxy certificate environment for computational grids.
Inf. Sci., 2008
An attribute aggregation architecture with trust-based evaluation for access control.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
2007
Wirel. Commun. Mob. Comput., 2007
Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field.
Int. J. Netw. Secur., 2007
A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates.
IEICE Trans. Commun., 2007
IEICE Trans. Commun., 2007
IEEE Commun. Lett., 2007
2006
Int. J. Netw. Secur., 2006
Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment.
IEICE Trans. Inf. Syst., 2006
Comput. Secur., 2006
Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks.
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004