Jihye Kim
Orcid: 0000-0003-2953-7883
According to our database1,
Jihye Kim
authored at least 107 papers
between 2002 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Development of an inclusive, scalable, and flexible hydrologic modeling system: Establishing integrated flood simulation system at agricultural watersheds.
Environ. Model. Softw., 2025
2024
IEEE Trans. Instrum. Meas., 2024
IEEE Trans. Dependable Secur. Comput., 2024
zkVoting : Zero-knowledge proof based coercion-resistant and E2E verifiable e-voting system.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Competition between group interactions and nonlinearity in voter dynamics on hypergraphs.
CoRR, 2024
IEEE Access, 2024
Proceedings of the ACM SIGOPS 30th Symposium on Operating Systems Principles, 2024
The Information Billboard: Effects of Popular Search Terms on Search Behaviors and Digital Divide.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Proceedings of the IEEE International Conference on Blockchain, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., September, 2023
Radar Signal Decomposition of Multi-Human Respiration Signs with Reduced Antenna Array.
Proceedings of the 9th IEEE World Forum on Internet of Things, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2023
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Enhancing Clinical Outcome Predictions through Auxiliary Loss and Sentence-Level Self-Attention.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023
2022
How exhibitionism and voyeurism contribute to engagement in SNS use: The mediating effects of content production and consumption.
Telematics Informatics, 2022
Correction of I/Q Imbalance in FMCW Radar System Using Geometric Sequence Decomposition.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022
Proceedings of the 19th International SoC Design Conference, 2022
Enhanced Velocity Estimation Based on Joint Doppler Frequency and Range Rate Measurements.
Proceedings of the Thirteenth International Conference on Ubiquitous and Future Networks, 2022
Joint Estimation of Vehicle's Position and Velocity With Distributed RSUs for OFDM Radar System.
Proceedings of the IEEE Global Communications Conference, 2022
2021
Low-Power Scan Correlation-Aware Scan Cluster Reordering for Wireless Sensor Networks.
Sensors, 2021
A 16-GB 640-GB/s HBM2E DRAM With a Data-Bus Window Extension Technique and a Synergetic On-Die ECC Scheme.
IEEE J. Solid State Circuits, 2021
The impact of a sense of virtual community on online community: does online privacy concern matter?
Internet Res., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the IEEE Security and Privacy Workshops, 2021
Proceedings of the Nurses and Midwives in the Digital Age - Selected Papers, Posters and Panels from the 15th International Congress in Nursing Informatics, Virtual Event, 23 August, 2021
2020
Combinatorial Subset Difference - IoT-Friendly Subset Representation and Broadcast Encryption.
Sensors, 2020
IACR Cryptol. ePrint Arch., 2020
How does a celebrity make fans happy? Interaction between celebrities and fans in the social media context.
Comput. Hum. Behav., 2020
Practical Verifiable Computation by Using a Hardware-Based Correct Execution Environment.
IEEE Access, 2020
Proceedings of the International SoC Design Conference, 2020
2019
IEEE Trans. Very Large Scale Integr. Syst., 2019
AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems.
ACM Trans. Embed. Comput. Syst., 2019
Inf. Sci., 2019
IACR Cryptol. ePrint Arch., 2019
SIMS : Self Sovereign Identity Management System with Preserving Privacy in Blockchain.
IACR Cryptol. ePrint Arch., 2019
SAVER: Snark-friendly, Additively-homomorphic, and Verifiable Encryption and decryption with Rerandomization.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Exploring the molecular mechanisms of Traditional Chinese Medicine components using gene expression signatures and connectivity map.
Comput. Methods Programs Biomed., 2019
Proceedings of the ICT Systems Security and Privacy Protection, 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Proceedings of the 20th ACM SIGPLAN/SIGBED International Conference on Languages, 2019
Proceedings of the 2019 International SoC Design Conference, 2019
A New Scan Chain Reordering Method for Low Power Consumption based on Care Bit Density.
Proceedings of the 2019 International SoC Design Conference, 2019
2018
Forward-secure ID based digital signature scheme with forward-secure private key generator.
Inf. Sci., 2018
Int. J. Web Based Learn. Teach. Technol., 2018
AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems.
IACR Cryptol. ePrint Arch., 2018
The effects of perceived online justice on relational bonds and engagement intention: Evidence from an online game community.
Comput. Hum. Behav., 2018
Proceedings of the Nursing Informatics 2018, 2018
Secure non-volatile memory with scratch pad memory using dual encryption mode: work-in-progress.
Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, 2018
2017
INFORMS Trans. Educ., 2017
Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast.
IACR Cryptol. ePrint Arch., 2017
Forward-Secure Digital Signature Schemes with Optimal Computation and Storage of Signers.
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Comparing Inpatient Falls Guidelines to Develop an ICNP<sup>®</sup>-Based Nursing Catalogue for ENRs.
Proceedings of the MEDINFO 2017: Precision Healthcare through Informatics, 2017
Proceedings of the 14th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2017
2016
IMPACT: a whole-exome sequencing analysis pipeline for integrating molecular profiles with actionable therapeutics in clinical samples.
J. Am. Medical Informatics Assoc., 2016
Locally adaptive 2D-3D registration using vascular structure model for liver catheterization.
Comput. Biol. Medicine, 2016
2015
Identifying kinase dependency in cancer cells by integrating high-throughput drug screening and kinase inhibition data.
Bioinform., 2015
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015
Proceedings of the 2015 International 3D Systems Integration Conference, 2015
2014
IEEE Trans. Computers, 2014
Bioinformatics-driven discovery of rational combination for overcoming EGFR-mutant lung cancer resistance to EGFR therapy.
Bioinform., 2014
Proceedings of the IEEE 23rd North Atlantic Test Workshop, 2014
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Fourth International Conference on Ubiquitous and Future Networks, 2012
2011
KSII Trans. Internet Inf. Syst., 2011
2010
Int. J. Appl. Cryptogr., 2010
Some Like It Private: Sharing Confidential Information Based on Oblivious Authorization.
IEEE Secur. Priv., 2010
IACR Cryptol. ePrint Arch., 2010
2009
Ad Hoc Networks, 2009
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009
Analysis of Cis-Regulatory Motifs in Cassette Exons by Incorporating Exon Skipping Rates.
Proceedings of the Bioinformatics Research and Applications, 5th International Symposium, 2009
Mining of cis-Regulatory Motifs Associated with Tissue-Specific Alternative Splicing.
Proceedings of the Bioinformatics Research and Applications, 5th International Symposium, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Topics in Cryptology, 2008
Logit-transformation Based Confidence Intervals for the Sensitivity of a Continuous-scale Diagnostic Test.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008
2007
Proceedings of the Topics in Cryptology, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, 2007
Finding association rules of <i>cis</i>-regulatory elements involved in alternative splicing.
Proceedings of the 45th Annual Southeast Regional Conference, 2007
2006
Comput. Networks, 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005
2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
2002
Efficient Dynamic Load Balancing for Association Rule Mining.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002
Proceedings of the Advanced Internet Services and Applications, 2002