Jinsu Kim

Orcid: 0000-0003-1009-3928

According to our database1, Jinsu Kim authored at least 48 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Supervised Low-Rank Semi-nonnegative Matrix Factorization with Frequency Regularization for Forecasting Spatio-temporal Data.
J. Sci. Comput., August, 2024

Thermal conductivity estimation using Physics-Informed Neural Networks with limited data.
Eng. Appl. Artif. Intell., 2024

Design Optimization of Nuclear Fusion Reactor through Deep Reinforcement Learning.
CoRR, 2024

2023
Proposal of a Token-Based Node Selection Mechanism for Node Distribution of Mobility IoT Blockchain Nodes.
Sensors, October, 2023

Computational Translation Framework Identifies Biochemical Reaction Networks with Special Topologies and Their Long-Term Dynamics.
SIAM J. Appl. Math., June, 2023

2022
De-Identification Mechanism of User Data in Video Systems According to Risk Level for Preventing Leakage of Personal Healthcare Information.
Sensors, 2022

Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing.
Pers. Ubiquitous Comput., 2022

Role-based Access Control Video Surveillance Mechanism Modeling in Smart Contract Environment.
Trans. Emerg. Telecommun. Technol., 2022

PyNET-QxQ: A Distilled PyNET for QxQ Bayer Pattern Demosaicing in CMOS Image Sensor.
CoRR, 2022

2021
Preemptive Prediction-Based Automated Cyberattack Framework Modeling.
Symmetry, 2021

Web-Browsing Application Using Web Scraping Technology in Korean Network Separation Application.
Symmetry, 2021

Accuracy of Multiscale Reduction for Stochastic Reaction Systems.
Multiscale Model. Simul., 2021

IronMask: Modular Architecture for Protecting Deep Face Template.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

2020
A Face Image Virtualization Mechanism for Privacy Intrusion Prevention in Healthcare Video Surveillance Systems.
Symmetry, 2020

CCTV-RFID enabled multifactor authentication model for secure differential level video access control.
Multim. Tools Appl., 2020

Stochastically modeled weakly reversible reaction networks with a single linkage class.
J. Appl. Probab., 2020

2019
A new approach to practical function-private inner product encryption.
Theor. Comput. Sci., 2019

2018
Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption.
ACM Trans. Priv. Secur., 2018

Some Network Conditions for Positive Recurrence of Stochastically Modeled Reaction Networks.
SIAM J. Appl. Math., 2018

A new scale-invariant homomorphic encryption scheme.
Inf. Sci., 2018

Fast Korean Text Detection and Recognition in Traffic Guide Signs.
Proceedings of the IEEE Visual Communications and Image Processing, 2018

2017
A New Approach for Practical Function-Private Inner Product Encryption.
IACR Cryptol. ePrint Arch., 2017

Report on work in progress of small insect tracking system using autonomous UAV.
Proceedings of the 14th International Conference on Ubiquitous Robots and Ambient Intelligence, 2017

A Robust Ensemble of ResNets for Character Level End-to-end Text Detection in Natural Scene Images.
Proceedings of the 15th International Workshop on Content-Based Multimedia Indexing, 2017

Robust template matching using scale-adaptive deep convolutional features.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

2016
A Bootstrap Metropolis-Hastings Algorithm for Bayesian Analysis of Big Data.
Technometrics, 2016

Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2016

A Practical Post-Quantum Public-Key Cryptosystem Based on spLWE.
IACR Cryptol. ePrint Arch., 2016

A Practical Post-Quantum Public-Key Cryptosystem Based on \textsf spLWE.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption.
IEEE Trans. Inf. Forensics Secur., 2015

CRT-based fully homomorphic encryption over the integers.
Inf. Sci., 2015

Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency.
IACR Cryptol. ePrint Arch., 2015

Demo: Human-Interactive Hardware-In-the-Loop Simulator for Cooperative Intelligent Transportation Systems and services.
Proceedings of the 2015 IEEE Vehicular Networking Conference, 2015

2013
An Approach to Reduce Storage for Homomorphic Computations.
IACR Cryptol. ePrint Arch., 2013

Batch Fully Homomorphic Encryption over the Integers.
Proceedings of the Advances in Cryptology, 2013

2012
A Public Shuffle without Private Permutations.
IACR Cryptol. ePrint Arch., 2012

2010
Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks.
Proceedings of the Advances in Computer Science and Information Technology, 2010

A Fault-Tolerant and Energy Efficient Routing in a Dense and Large Scale Wireless Sensor Network.
Proceedings of the Communication and Networking, 2010

2009
3DE: selective cluster head selection scheme for energy efficiency in wireless sensor networks.
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009

3DE_var: Energy-Efficient Cluster-Based Routing Scheme in Wireless Sensor Networks.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2009

Secure and Energy Efficient Key Management Scheme Using Authentication in Cluster Based Routing Protocol.
Proceedings of the Future Generation Information Technology, 2009

Dynamic Routing Algorithm for Reliability and Energy Efficiency in Wireless Sensor Networks.
Proceedings of the Future Generation Information Technology, 2009

2008
Opportunistic Cooperation Based on Delayed Retransmissions for a Multi-User Uplink System.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

2007
RISA: A Real-Time Interactive Shadow Avatar.
Proceedings of the Ninth IEEE International Symposium on Multimedia, 2007

A Context-Aware Framework for Mobile Navigation Service.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

2005
Neuron Operation Using Controlled Chaotic Instabilities in Brillouin-Active Fiber Based Neural Network in Smart Structures.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

2004
Probabilistic map of blood flow distribution in the brain from the internal carotid artery.
NeuroImage, 2004


  Loading...