Jihye Kim

Orcid: 0000-0003-2953-7883

According to our database1, Jihye Kim authored at least 97 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
zkVoting : Zero-knowledge proof based coercion-resistant and E2E verifiable e-voting system.
IACR Cryptol. ePrint Arch., 2024

Hadamard Product Arguments and Their Applications.
IACR Cryptol. ePrint Arch., 2024

The Information Billboard: Effects of Popular Search Terms on Search Behaviors and Digital Divide.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

zkLogis: Scalable, Privacy-Enhanced, and Traceable Logistics on Public Blockchain.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
STRAIT: Self-Test and Self-Recovery for AI Accelerator.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., September, 2023

Azeroth: Auditable Zero-Knowledge Transactions in Smart Contracts.
IEEE Access, 2023

Radar Signal Decomposition of Multi-Human Respiration Signs with Reduced Antenna Array.
Proceedings of the 9th IEEE World Forum on Internet of Things, 2023

CrossSplit: Mitigating Label Noise Memorization through Data Splitting.
Proceedings of the International Conference on Machine Learning, 2023

CORE: Co-planarity Regularized Monocular Geometry Estimation with Weak Supervision.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Illegal 3D Content Distribution Tracking System based on DNN Forensic Watermarking.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2023

Analysis of Recent IIoT Security Technology Trends in a Smart Factory Environment.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2023

Efficient Transparent Polynomial Commitments for zk-SNARKs.
Proceedings of the Computer Security - ESORICS 2023, 2023

Enhancing Clinical Outcome Predictions through Auxiliary Loss and Sentence-Level Self-Attention.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

2022
How exhibitionism and voyeurism contribute to engagement in SNS use: The mediating effects of content production and consumption.
Telematics Informatics, 2022

Correction of I/Q Imbalance in FMCW Radar System Using Geometric Sequence Decomposition.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

ZOS: Zero Overhead Scan for Systolic Array-based AI accelerator.
Proceedings of the 19th International SoC Design Conference, 2022

Enhanced Velocity Estimation Based on Joint Doppler Frequency and Range Rate Measurements.
Proceedings of the Thirteenth International Conference on Ubiquitous and Future Networks, 2022

Joint Estimation of Vehicle's Position and Velocity With Distributed RSUs for OFDM Radar System.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Low-Power Scan Correlation-Aware Scan Cluster Reordering for Wireless Sensor Networks.
Sensors, 2021

A 16-GB 640-GB/s HBM2E DRAM With a Data-Bus Window Extension Technique and a Synergetic On-Die ECC Scheme.
IEEE J. Solid State Circuits, 2021

The impact of a sense of virtual community on online community: does online privacy concern matter?
Internet Res., 2021

Privacy-preserving Identity Management System.
IACR Cryptol. ePrint Arch., 2021

Succinct Zero-Knowledge Batch Proofs for Set Accumulators.
IACR Cryptol. ePrint Arch., 2021

Forward-Secure Multi-User Aggregate Signatures Based on zk-SNARKs.
IEEE Access, 2021

Mirroring Vector Space Embedding for New Words.
IEEE Access, 2021

Reconfigurable Scan Architecture for High Diagnostic Resolution.
IEEE Access, 2021

User Identification in Dynamic Web Traffic via Deep Temporal Features.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Pattern Analysis of Inpatient Falls in a Tertiary Hospital.
Proceedings of the Nurses and Midwives in the Digital Age - Selected Papers, Posters and Panels from the 15th International Congress in Nursing Informatics, Virtual Event, 23 August, 2021

2020
Combinatorial Subset Difference - IoT-Friendly Subset Representation and Broadcast Encryption.
Sensors, 2020

vCNN: Verifiable Convolutional Neural Network.
IACR Cryptol. ePrint Arch., 2020

Efficient Verifiable Image Redacting based on zk-SNARKs.
IACR Cryptol. ePrint Arch., 2020

How does a celebrity make fans happy? Interaction between celebrities and fans in the social media context.
Comput. Hum. Behav., 2020

Practical Verifiable Computation by Using a Hardware-Based Correct Execution Environment.
IEEE Access, 2020

Simulation-Extractable zk-SNARK With a Single Verification.
IEEE Access, 2020

Fine-Grained Defect Diagnosis for CMOL FPGA Circuits.
IEEE Access, 2020

Memory-like Defect Diagnosis for CMOL FPGAs.
Proceedings of the International SoC Design Conference, 2020

2019
Test-Friendly Data-Selectable Self-Gating (DSSG).
IEEE Trans. Very Large Scale Integr. Syst., 2019

AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems.
ACM Trans. Embed. Comput. Syst., 2019

FAS: Forward secure sequential aggregate signatures for secure logging.
Inf. Sci., 2019

BESTIE: Broadcast Encryption Scheme for Tiny IoT Equipments.
IACR Cryptol. ePrint Arch., 2019

SIMS : Self Sovereign Identity Management System with Preserving Privacy in Blockchain.
IACR Cryptol. ePrint Arch., 2019

SAVER: Snark-friendly, Additively-homomorphic, and Verifiable Encryption and decryption with Rerandomization.
IACR Cryptol. ePrint Arch., 2019

QAP-based Simulation-Extractable SNARK with a Single Verification.
IACR Cryptol. ePrint Arch., 2019

Scalable Wildcarded Identity-Based Encryption.
IACR Cryptol. ePrint Arch., 2019

Exploring the molecular mechanisms of Traditional Chinese Medicine components using gene expression signatures and connectivity map.
Comput. Methods Programs Biomed., 2019

Forward Secure Identity-Based Signature Scheme with RSA.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

AILocker: authenticated image locker for video.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

SA-SPM: an efficient compiler for security aware scratchpad memory (invited paper).
Proceedings of the 20th ACM SIGPLAN/SIGBED International Conference on Languages, 2019

Transition-delay Test Methodology for Designs with Self-gating.
Proceedings of the 2019 International SoC Design Conference, 2019

A New Scan Chain Reordering Method for Low Power Consumption based on Care Bit Density.
Proceedings of the 2019 International SoC Design Conference, 2019

2018
Forward-secure ID based digital signature scheme with forward-secure private key generator.
Inf. Sci., 2018

An Examination of High School Students' Online Engagement in Mathematics Problems.
Int. J. Web Based Learn. Teach. Technol., 2018

AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems.
IACR Cryptol. ePrint Arch., 2018

The effects of perceived online justice on relational bonds and engagement intention: Evidence from an online game community.
Comput. Hum. Behav., 2018

Information Completeness and Consistency of Inpatient Fall-Event Reports.
Proceedings of the Nursing Informatics 2018, 2018

Secure non-volatile memory with scratch pad memory using dual encryption mode: work-in-progress.
Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, 2018

2017
Creating Online Quizzes with Multiple Attempts with Microsoft Excel and Word.
INFORMS Trans. Educ., 2017

Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast.
IACR Cryptol. ePrint Arch., 2017

Forward-Secure Digital Signature Schemes with Optimal Computation and Storage of Signers.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Comparing Inpatient Falls Guidelines to Develop an ICNP<sup>®</sup>-Based Nursing Catalogue for ENRs.
Proceedings of the MEDINFO 2017: Precision Healthcare through Informatics, 2017

PASS: Privacy aware secure signature scheme for surveillance systems.
Proceedings of the 14th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2017

2016
IMPACT: a whole-exome sequencing analysis pipeline for integrating molecular profiles with actionable therapeutics in clinical samples.
J. Am. Medical Informatics Assoc., 2016

Locally adaptive 2D-3D registration using vascular structure model for liver catheterization.
Comput. Biol. Medicine, 2016

2015
DSigDB: drug signatures database for gene set analysis.
Bioinform., 2015

Identifying kinase dependency in cancer cells by integrating high-throughput drug screening and kinase inhibition data.
Bioinform., 2015

Exploring Smartphones as WAVE Devices.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

Mediated aggregate signature schemes in wireless sensor networks.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

Noise coupling modeling and analysis of through glass via(TGV).
Proceedings of the 2015 International 3D Systems Integration Conference, 2015

2014
An Efficient Non-Linear Cost Compression Algorithm for Multi Level Cell Memory.
IEEE Trans. Computers, 2014

Bioinformatics-driven discovery of rational combination for overcoming EGFR-mutant lung cancer resistance to EGFR therapy.
Bioinform., 2014

Test Compression Improvement with EDT Channel Sharing in SoC Designs.
Proceedings of the IEEE 23rd North Atlantic Test Workshop, 2014

2012
Compress Multiple Ciphertexts Using ElGamal Encryption Schemes.
IACR Cryptol. ePrint Arch., 2012

Privacy-preserving web search.
Proceedings of the Fourth International Conference on Ubiquitous and Future Networks, 2012

2011
Flexible Robust Group Key Agreement.
IEEE Trans. Parallel Distributed Syst., 2011

The Syllable Frequency Effect in Semantic Categorization Tasks in Korean.
KSII Trans. Internet Inf. Syst., 2011

Constant-Round Privacy Preserving Multiset Union.
IACR Cryptol. ePrint Arch., 2011

Threshold signature schemes for ElGamal variants.
Comput. Stand. Interfaces, 2011

2010
Fair threshold decryption with semi-trusted third parties.
Int. J. Appl. Cryptogr., 2010

Some Like It Private: Sharing Confidential Information Based on Oblivious Authorization.
IEEE Secur. Priv., 2010

Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model.
IACR Cryptol. ePrint Arch., 2010

2009
SRDP: Secure route discovery for dynamic source routing in MANETs.
Ad Hoc Networks, 2009

Privacy-Preserving Policy-Based Information Transfer.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

Analysis of Cis-Regulatory Motifs in Cassette Exons by Incorporating Exon Skipping Rates.
Proceedings of the Bioinformatics Research and Applications, 5th International Symposium, 2009

Mining of cis-Regulatory Motifs Associated with Tissue-Specific Alternative Splicing.
Proceedings of the Bioinformatics Research and Applications, 5th International Symposium, 2009

2008
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks.
IACR Cryptol. ePrint Arch., 2008

Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange.
Proceedings of the Topics in Cryptology, 2008

Logit-transformation Based Confidence Intervals for the Sensitivity of a Continuous-scale Diagnostic Test.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

2007
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement.
Proceedings of the Topics in Cryptology, 2007

Robust group key agreement using short broadcasts.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Large-scale Discovery of Regulatory Motifs Involved in Alternative Splicing.
Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, 2007

Finding association rules of <i>cis</i>-regulatory elements involved in alternative splicing.
Proceedings of the 45th Annual Southeast Regional Conference, 2007

2006
Secure acknowledgment aggregation and multisignatures with limited robustness.
Comput. Networks, 2006

Authentication for Paranoids: Multi-party Secret Handshakes.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
SRDP: Securing Route Discovery in DSR.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

2004
A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

2002
Efficient Dynamic Load Balancing for Association Rule Mining.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002

An Efficient On-Line Monitoring BIST for Remote Service System.
Proceedings of the Advanced Internet Services and Applications, 2002


  Loading...