Jeonghyeon Kim

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2025
ABDM: Anonymity-Based Big Data Management for Protecting Healthcare Data from Privacy Breach.
IEEE Netw., January, 2025

2024
SPT: Security Policy Translator for Network Security Functions in Cloud-Based Security Services.
IEEE Trans. Dependable Secur. Comput., 2024

Concurrent Immediate Reference Counting.
Proc. ACM Program. Lang., 2024

Understanding active learning of molecular docking and its applications.
CoRR, 2024

Expediting Hazard Pointers with Bounded RCU Critical Sections.
Proceedings of the 36th ACM Symposium on Parallelism in Algorithms and Architectures, 2024

Exploring Modal Switch in Metamaterial-Based Robots.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2024

Concurrent Immediate Reference Counting (Abstract).
Proceedings of the 2024 ACM Workshop on Highlights of Parallel Computing, 2024

Comparison of Out-of-Distribution Detection Performance of CLIP-based Fine-Tuning Methods.
Proceedings of the International Conference on Electronics, Information, and Communication, 2024

2023
Deep Active Learning with Contrastive Learning Under Realistic Data Pool Assumptions.
CoRR, 2023

Effects of Vibrotactile Feedback on Aim-and-Throw Tasks in Virtual Environments.
Proceedings of the 29th ACM Symposium on Virtual Reality Software and Technology, 2023

Applying Hazard Pointers to More Concurrent Data Structures.
Proceedings of the 35th ACM Symposium on Parallelism in Algorithms and Architectures, 2023

2022
A Face Pre-Processing Approach to Evade Deepfake Detector.
Proceedings of the WDC@AsiaCCS '22: Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes, 2022

Evading Deepfake Detectors via High Quality Face Pre-Processing Methods.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

2021
Automatic Data Model Mapper for Security Policy Translation in Interface to Network Security Functions Framework.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021

2016
Recovery method of deleted records and tables from ESE database.
Digit. Investig., 2016


  Loading...