Hyungsub Kim

According to our database1, Hyungsub Kim authored at least 15 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Distributed DQN-based network-wide energy efficiency maximization for 5G NR-U and Wi-Fi coexistence environments.
ICT Express, 2024

Enhancing LLM-based Autonomous Driving Agents to Mitigate Perception Attacks.
CoRR, 2024

A Systematic Study of Physical Sensor Attack Hardness.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Hybrid LoRa Network Architecture: Automatic Switching between LoRaWAN and LoRa Mesh Network in Environments with Dynamic Obstacle Variations.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

2023
Low-Complexity Q-Learning for Energy-Aware Small-Cell Networks With Integrated Access and Backhaul.
IEEE Access, 2023

Discovering Adversarial Driving Maneuvers against Autonomous Vehicles.
Proceedings of the 32nd USENIX Security Symposium, 2023

PatchVerif: Discovering Faulty Patches in Robotic Vehicles.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Multi-agent Q-learning based cell breathing considering SBS collaboration for maximizing energy efficiency in B5G heterogeneous networks.
ICT Express, 2022

Optimal Resource Allocation Considering Non-Uniform Spatial Traffic Distribution in Ultra-Dense Networks: A Multi-Agent Reinforcement Learning Approach.
IEEE Access, 2022

PGPatch: Policy-Guided Logic Bug Patching for Robotic Vehicles.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles.
Proceedings of the 30th USENIX Security Symposium, 2021

PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2016
Inferring browser activity and status through remote monitoring of storage usage.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Identifying Cross-origin Resource Status Using Application Cache.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Exploring and mitigating privacy threats of HTML5 geolocation API.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014


  Loading...