Hyunsoo Yoon
Orcid: 0000-0002-6371-7055
According to our database1,
Hyunsoo Yoon
authored at least 241 papers
between 1987 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans Autom. Sci. Eng., January, 2024
Biologically informed deep neural networks provide quantitative assessment of intratumoral heterogeneity in post treatment glioblastoma.
npj Digit. Medicine, 2024
Expert Syst. Appl., 2024
AnoPLe: Few-Shot Anomaly Detection via Bi-directional Prompt Learning with Only Normal Samples.
CoRR, 2024
2023
A framework for generalizing critical heat flux detection models using unsupervised image-to-image translation.
Expert Syst. Appl., October, 2023
LEAT: Towards Robust Deepfake Disruption in Real-World Scenarios via Latent Ensemble Attack.
CoRR, 2023
2022
Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants.
Secur. Commun. Networks, 2022
A Generalized Framework for Critical Heat Flux Detection Using Unsupervised Image-to-Image Translation.
CoRR, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
Classification score approach for detecting adversarial example in deep neural network.
Multim. Tools Appl., 2021
Data Correction For Enhancing Classification Accuracy By Unknown Deep Neural Network Classifiers.
KSII Trans. Internet Inf. Syst., 2021
Expert Syst. Appl., 2021
Comput. Secur., 2021
An intelligent recommendation algorithm for red team strategy in edge computing powered massive Cyber Defense Exercise.
Comput. Commun., 2021
2020
IEEE J. Biomed. Health Informatics, 2020
IEEE Trans. Inf. Forensics Secur., 2020
Sensors, 2020
Acoustic-decoy: Detection of adversarial examples through audio modification on speech recognition system.
Neurocomputing, 2020
Multipath transmission control protocol-based multi-access traffic steering solution for 5G multimedia-centric network: Design and testbed system implementation.
Int. J. Distributed Sens. Networks, 2020
Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks.
IEICE Trans. Inf. Syst., 2020
IEICE Trans. Inf. Syst., 2020
Expert Syst. Appl., 2020
FriendNet Backdoor: Indentifying Backdoor Attack that is safe for Friendly Deep Neural Network.
Proceedings of the ICSIM '20: The 3rd International Conference on Software Engineering and Information Management, 2020
Proceedings of the ICIIT 2020: 5th International Conference on Intelligent Information Technology, 2020
2019
An efficient multi-path pipeline transmission for a bulk data transfer in IEEE 802.15.4 multi-hop networks.
Wirel. Networks, 2019
Hybrid approach of parallel implementation on CPU-GPU for high-speed ECDSA verification.
J. Supercomput., 2019
A Novel Positive Transfer Learning Approach for Telemonitoring of Parkinson's Disease.
IEEE Trans Autom. Sci. Eng., 2019
New Complementary Points of Cyber Security Schemes for Critical Digital Assets at Nuclear Power Plants.
IEEE Access, 2019
IEEE Access, 2019
Selective Untargeted Evasion Attack: An Adversarial Example That Will Not Be Classified as Certain Avoided Classes.
IEEE Access, 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Selective Poisoning Attack on Deep Neural Network to Induce Fine-Grained Recognition Error.
Proceedings of the 2nd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2019
2018
PhD thesis, 2018
A Simple and Enriched Closed-Form Formula for Cell Residence Time in 5G Heterogeneous Networks.
Wirel. Pers. Commun., 2018
Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption.
ACM Trans. Priv. Secur., 2018
Secur. Commun. Networks, 2018
IEICE Trans. Commun., 2018
IEICE Trans. Inf. Syst., 2018
IEICE Trans. Inf. Syst., 2018
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier.
Comput. Secur., 2018
IEEE Access, 2018
Proceedings of the Information Security Applications - 19th International Conference, 2018
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018
Fooling a Neural Network in Military Environments: Random Untargeted Adversarial Example.
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
IEICE Trans. Inf. Syst., 2017
Detecting Online Game Chargeback Fraud Based on Transaction Sequence Modeling Using Recurrent Neural Network.
Proceedings of the Information Security Applications - 18th International Conference, 2017
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
2016
Wirel. Networks, 2016
Channel-quality-aware multihop broadcast for asynchronous multi-channel wireless sensor networks.
Wirel. Networks, 2016
Protecting secret keys in networked devices with table encoding against power analysis attacks.
J. High Speed Networks, 2016
Sorting Method for Fully Homomorphic Encrypted Data Using the Cryptographic Single-Instruction Multiple-Data Operation.
IEICE Trans. Commun., 2016
IEICE Trans. Inf. Syst., 2016
Preemptive Real-Time Scheduling Incorporating Security Constraint for Cyber Physical Systems.
IEICE Trans. Inf. Syst., 2016
IEEE Commun. Lett., 2016
IACR Cryptol. ePrint Arch., 2016
On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators.
Comput. Secur., 2016
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Wirel. Pers. Commun., 2015
Fully Batch Processing Enabled Memory Integrity Verification Algorithm Based on Merkle Tree.
Proceedings of the Information Security Applications - 16th International Workshop, 2015
2014
KSII Trans. Internet Inf. Syst., 2014
KSII Trans. Internet Inf. Syst., 2014
IEICE Trans. Inf. Syst., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014
Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014
2013
Base station association schemes to reduce unnecessary handovers using location awareness in femtocell networks.
Wirel. Networks, 2013
EMBA: An Efficient Multihop Broadcast Protocol for Asynchronous Duty-Cycled Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2013
A novel Adaptive Cluster Transformation (ACT)-based intrusion tolerant architecture for hybrid information technology.
J. Supercomput., 2013
J. Comput. Sci. Eng., 2013
Algorithm learning based neural network integrating feature selection and classification.
Expert Syst. Appl., 2013
Comput. Networks, 2013
Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage.
Comput. Electr. Eng., 2013
The Design of a Robust Intrusion Tolerance System through Advanced Adaptive Cluster Transformation and Vulnerability-Based VM Selection.
Proceedings of the 32th IEEE Military Communications Conference, 2013
Proceedings of the Information Technology Convergence, 2013
2012
Authenticated public key broadcast encryption scheme secure against insiders' attack.
Math. Comput. Model., 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Proceedings of the International Conference on IT Convergence and Security, 2012
Proceedings of the International Conference on IT Convergence and Security, 2012
2011
IEEE Trans. Parallel Distributed Syst., 2011
IEICE Trans. Inf. Syst., 2011
IEICE Electron. Express, 2011
A Smart Handover Decision Algorithm Using Location Prediction for Hierarchical Macro/Femto-Cell Networks.
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011
Proceedings of The ACM CoNEXT Student Workshop, 2011
2010
IEEE Trans. Veh. Technol., 2010
A Multi-service Group Key Management Scheme for Stateless Receivers in Wireless Mesh Networks.
Mob. Networks Appl., 2010
A Retransmission-Enhanced Duty-Cycle MAC Protocol Based on the Channel Quality for Wireless Sensor Networks.
IEICE Trans. Commun., 2010
VAMSD: Voronoi Diagram Based Autonomous Mobile Sensor Deployment for Maximizing Coverage.
IEICE Trans. Commun., 2010
IEICE Electron. Express, 2010
IEICE Electron. Express, 2010
IEICE Electron. Express, 2010
IEEE Commun. Lett., 2010
MRMAC: Medium Reservation MAC Protocol for Reducing End-to-End Delay and Energy Consumption in Wireless Sensor Networks.
IEEE Commun. Lett., 2010
Chosen ciphertext secure authenticated group communication using identity-based signcryption.
Comput. Math. Appl., 2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
2009
Int. J. Pervasive Comput. Commun., 2009
A Resilient and Efficient Replication Attack Detection Scheme for Wireless Sensor Networks.
IEICE Trans. Inf. Syst., 2009
IEICE Trans. Commun., 2009
IEEE Commun. Lett., 2009
Bandwidth efficient key distribution for secure multicast in dynamic wireless mesh networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009
A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks.
Proceedings of the Communication and Networking, 2009
2008
Optimal modulation and coding scheme selection in cellular networks with hybrid-ARQ error control.
IEEE Trans. Wirel. Commun., 2008
An efficient delegation protocol with delegation traceability in the X.509 proxy certificate environment for computational grids.
Inf. Sci., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Commun., 2008
Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks.
IEICE Trans. Commun., 2008
IEEE Commun. Lett., 2008
Comput. Commun., 2008
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
2007
Wirel. Commun. Mob. Comput., 2007
A robotic service framework supporting automated integration of ubiquitous sensors and devices.
Inf. Sci., 2007
Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field.
Int. J. Netw. Secur., 2007
An effective traffic management scheme using adaptive handover time in next-generation cellular networks.
Int. J. Netw. Manag., 2007
IET Inf. Secur., 2007
A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables.
IEICE Trans. Commun., 2007
A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates.
IEICE Trans. Commun., 2007
IEICE Trans. Commun., 2007
IEEE Commun. Lett., 2007
Adaptive Resource Reservation for Efficient Resource Utilization in the Wireless Multimedia Network.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2007
Proceedings of the Q2SWinet'07, 2007
Proceedings of the Advances in Information and Computer Security, 2007
An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007
Proceedings of the Euro-Par 2007, 2007
2006
Int. J. Netw. Secur., 2006
Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment.
IEICE Trans. Inf. Syst., 2006
IEICE Trans. Commun., 2006
Comput. Secur., 2006
Proceedings of the Information Security Applications, 7th International Workshop, 2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
2005
IEICE Trans. Electron., 2005
Autonomous Clustering Scheme for Wireless Sensor Networks Using Coverage Estimation-Based Self-Pruning.
IEICE Trans. Commun., 2005
Comput. Commun., 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Proceedings of the Innovations in Applied Artificial Intelligence, 2005
IEEE 802.11b WLAN Performance with Variable Transmission Rates: In View of High Level Throughput.
Proceedings of the Networking, 2005
Proceedings of the Information Security and Cryptology, 2005
2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
A Smart Handoff Procedure in 4G Networks.
Proceedings of the ICETE 2004, 2004
Packet fair queueing algorithms for wireless networks with link level retransmission.
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004
2002
Grapes: Topology-Based Hierarchical Virtual Network for Peer-to-Peer Lookup Services.
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002
2001
IEEE J. Sel. Areas Commun., 2001
A new call admission control scheme using the user conformity for non-uniform wireless systems.
Proceedings of the 54th IEEE Vehicular Technology Conference, 2001
2000
Complex Syst., 2000
On the construction of a powerful distributed authentication server without additional key management.
Comput. Commun., 2000
Movement-based Location Tracking with Extended Spatial Localities.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000
Handling Camera Anchors in Distributed Surveillance Systems.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000
1999
The deflection self-routing Banyan network: a large-scale ATM switch using the fully adaptive self-routing and its performance analyses.
IEEE/ACM Trans. Netw., 1999
Throttle and preempt: A flow control policy for real-time traffic in wormhole networks.
J. Syst. Archit., 1999
Novel recursive multicast algorithms in multistage interconnection networks for ATM switches.
J. High Speed Networks, 1999
Design and analysis of the virtual-time-based round robin fair scheduling algorithm for QoS guarantees.
Comput. Commun., 1999
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
1998
On Submesh Allocation for Mesh Multicomputers: A Best-Fit Allocation and a Virtual Submesh Allocation for Faulty Meshes.
IEEE Trans. Parallel Distributed Syst., 1998
Cost-effective algorithms for multicast connection in ATM switches based on self-routing multistage networks.
Comput. Commun., 1998
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998
A new appraoch to server-aided secret computation.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998
Design and analysis of a fair scheduling algorithm for QoS guarantees in high-speed packet-switched networks.
Proceedings of the 1998 IEEE International Conference on Communications, 1998
1997
Virtual-Time-Based Round Robin: A Hardware-Eflicient Fair Scheduling Algorithm for High-Speed Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1997
Performance Analysis of a Multicast Switch Based on Multistage Interconnection Networks.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997
Proceedings of the 1997 International Conference on Parallel Processing (ICPP '97), 1997
Throttle and Preempt: A New Flow Control for Real-Time Communications in Wormhole Networks.
Proceedings of the 1997 International Conference on Parallel Processing (ICPP '97), 1997
Proceedings of the 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 1997
Proceedings of the Artificial Evolution, Third European Conference, 1997
1996
Free Submesh List Strategy: a Best Fit Submesh Allocation in Mesh Connected Multicomputers.
Parallel Process. Lett., 1996
J. Syst. Archit., 1996
Design and Performance Analysis of Multistage Interconnection Networks Using a Recursive Multicast Algorithm.
Int. J. High Speed Comput., 1996
Int. J. High Speed Comput., 1996
Performance Analysis of Multipath Multistage Interconnection Networks with Nonuniform Output Traffic Distribution.
Proceedings of the 4th Euromicro Workshop on Parallel and Distributed Processing (PDP '96), 1996
Proceedings of the 4th Euromicro Workshop on Parallel and Distributed Processing (PDP '96), 1996
Proceedings of the 1996 International Conference on Network Protocols, 1996
Proceedings of the Euro-Par '96 Parallel Processing, 1996
Proceedings of the Advances in Cryptology, 1996
1995
Microprocess. Microprogramming, 1995
Int. J. High Speed Comput., 1995
The cyclic banyan network: a fault tolerant multistage interconnection network with the fully-adaptive self-routing.
Proceedings of the Seventh IEEE Symposium on Parallel and Distributed Processing, 1995
Performance analysis of output buffers in multistage interconnection networks with multiple paths.
Proceedings of the Seventh IEEE Symposium on Parallel and Distributed Processing, 1995
Proceedings of the 1995 International Conference on Network Protocols, 1995
Nonpreemptive scheduling algorithms for multimedia communication in local area networks.
Proceedings of the 1995 International Conference on Network Protocols, 1995
1994
Multim. Syst., 1994
Microprocess. Microprogramming, 1994
The Ring-Banyan Network: a Fault Tolerant Multistage Interconnection Network for Multiprocessor Systems.
Int. J. High Speed Comput., 1994
1993
Microprocess. Microprogramming, 1993
Performance Evaluation of a Class of Multipath Packet Switching Interconnection Networks.
J. Parallel Distributed Comput., 1993
Proceedings of the Fifth IEEE Symposium on Parallel and Distributed Processing, 1993
Mode Based Type Inference for Prolog Programs.
Proceedings of the SEKE'93, 1993
Proceedings of the First ACM International Conference on Multimedia '93, 1993
1992
An efficient mapping of Boltzmann machine computations onto distributed-memory multiprocessors.
Microprocess. Microprogramming, 1992
Microprocess. Microprogramming, 1992
Int. J. High Speed Comput., 1992
1991
IEEE Trans. Computers, 1991
Proceedings of the Third IEEE Symposium on Parallel and Distributed Processing, 1991
Proceedings of the 1991 International Conference on Acoustics, 1991
1990
Performance Analysis of Multibuffered Packet-Switching Networks in Multiprocessor Systems.
IEEE Trans. Computers, 1990
IEEE Trans. Computers, 1990
Parallel simulation of multilayered neural networks on distributed-memory multiprocessors.
Microprocessing and Microprogramming, 1990
J. Parallel Distributed Comput., 1990
Proceedings of the First International Conference on Spoken Language Processing, 1990
Proceedings of the First International Conference on Spoken Language Processing, 1990
1989
J. Parallel Distributed Comput., 1989
1987
Performance Analysis of Multi-Buffered Packet-Switching Networks in Multiprocessor Systems.
Proceedings of the Supercomputing, 1987
Performance Analysis and Comparison of Packet Switching Interconnection Networks.
Proceedings of the International Conference on Parallel Processing, 1987
A New Approach to Internetworking of Integrated Services Local Networks.
Proceedings of the 7th International Conference on Distributed Computing Systems, 1987