Jinsu Kim
Orcid: 0000-0003-1009-3928
According to our database1,
Jinsu Kim
authored at least 48 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Supervised Low-Rank Semi-nonnegative Matrix Factorization with Frequency Regularization for Forecasting Spatio-temporal Data.
J. Sci. Comput., August, 2024
Thermal conductivity estimation using Physics-Informed Neural Networks with limited data.
Eng. Appl. Artif. Intell., 2024
CoRR, 2024
2023
Proposal of a Token-Based Node Selection Mechanism for Node Distribution of Mobility IoT Blockchain Nodes.
Sensors, October, 2023
Computational Translation Framework Identifies Biochemical Reaction Networks with Special Topologies and Their Long-Term Dynamics.
SIAM J. Appl. Math., June, 2023
2022
De-Identification Mechanism of User Data in Video Systems According to Risk Level for Preventing Leakage of Personal Healthcare Information.
Sensors, 2022
Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing.
Pers. Ubiquitous Comput., 2022
Role-based Access Control Video Surveillance Mechanism Modeling in Smart Contract Environment.
Trans. Emerg. Telecommun. Technol., 2022
CoRR, 2022
2021
Web-Browsing Application Using Web Scraping Technology in Korean Network Separation Application.
Symmetry, 2021
Multiscale Model. Simul., 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
2020
A Face Image Virtualization Mechanism for Privacy Intrusion Prevention in Healthcare Video Surveillance Systems.
Symmetry, 2020
CCTV-RFID enabled multifactor authentication model for secure differential level video access control.
Multim. Tools Appl., 2020
Stochastically modeled weakly reversible reaction networks with a single linkage class.
J. Appl. Probab., 2020
2019
Theor. Comput. Sci., 2019
2018
Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption.
ACM Trans. Priv. Secur., 2018
Some Network Conditions for Positive Recurrence of Stochastically Modeled Reaction Networks.
SIAM J. Appl. Math., 2018
Proceedings of the IEEE Visual Communications and Image Processing, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 14th International Conference on Ubiquitous Robots and Ambient Intelligence, 2017
A Robust Ensemble of ResNets for Character Level End-to-end Text Detection in Natural Scene Images.
Proceedings of the 15th International Workshop on Content-Based Multimedia Indexing, 2017
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017
2016
Technometrics, 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
IACR Cryptol. ePrint Arch., 2015
Demo: Human-Interactive Hardware-In-the-Loop Simulator for Cooperative Intelligent Transportation Systems and services.
Proceedings of the 2015 IEEE Vehicular Networking Conference, 2015
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Advances in Cryptology, 2013
2012
2010
Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks.
Proceedings of the Advances in Computer Science and Information Technology, 2010
A Fault-Tolerant and Energy Efficient Routing in a Dense and Large Scale Wireless Sensor Network.
Proceedings of the Communication and Networking, 2010
2009
3DE: selective cluster head selection scheme for energy efficiency in wireless sensor networks.
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2009
Secure and Energy Efficient Key Management Scheme Using Authentication in Cluster Based Routing Protocol.
Proceedings of the Future Generation Information Technology, 2009
Dynamic Routing Algorithm for Reliability and Energy Efficiency in Wireless Sensor Networks.
Proceedings of the Future Generation Information Technology, 2009
2008
Opportunistic Cooperation Based on Delayed Retransmissions for a Multi-User Uplink System.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008
2007
Proceedings of the Ninth IEEE International Symposium on Multimedia, 2007
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007
2005
Neuron Operation Using Controlled Chaotic Instabilities in Brillouin-Active Fiber Based Neural Network in Smart Structures.
Proceedings of the Advances in Natural Computation, First International Conference, 2005
2004
Probabilistic map of blood flow distribution in the brain from the internal carotid artery.
NeuroImage, 2004