Hongil Kim

According to our database1, Hongil Kim authored at least 8 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
VITA: 'Carefully Chosen and Weighted Less' Is Better in Medication Recommendation.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2019
Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE.
Proceedings of the 28th USENIX Security Symposium, 2019

Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
Peeking Over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -.
IEEE Trans. Mob. Comput., 2018

2017
When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

2016
Pay as You Want: Bypassing Charging System in Operational Cellular Networks.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

2015
Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2012
A Study of Non-photorealistic Rendering Method Using Orientation Sensor in Mobile Devices.
Proceedings of the International Conference on IT Convergence and Security, 2012


  Loading...