Jiye Kim

According to our database1, Jiye Kim authored at least 27 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Adaptive Time-Scale Modification for Improving Speech Intelligibility Based On Phoneme Clustering For Streaming Services.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
Substructure-Atom Cross Attention for Molecular Representation Learning.
CoRR, 2022

2021
Deep reinforcement learning-designed radiofrequency waveform in MRI.
Nat. Mach. Intell., 2021

DeepRF: Deep Reinforcement Learning Designed RadioFrequency Waveform in MRI.
CoRR, 2021

Zero-Shot Voice Cloning Using Variational Embedding with Attention Mechanism.
Proceedings of the 7th IEEE International Conference on Network Intelligence and Digital Content, 2021

2017
Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User.
Secur. Commun. Networks, 2017

Software Birthmark Method Using Combined Structure-Based and API-Based.
J. Softw., 2017

Personal identification number entry for Google glass.
Comput. Electr. Eng., 2017

Cryptanalysis and improvement of a biometric and smart card based remote user authentication scheme.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

An enhanced unlinkable anonymous payment scheme based on near field commnication.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Cryptanalysis and Improvement of an Advanced Anonymous and Biometrics-Based Multi-server Authentication Scheme Using Smart Cards.
Proceedings of the Advances in Human Factors in Cybersecurity, 2017

Security Enhancement of Robust Anonymous Two-Factor Authenticated Key Exchange Scheme for Mobile Client-Server Environment.
Proceedings of the 4th Intl Conf on Applied Computing and Information Technology/3rd Intl Conf on Computational Science/Intelligence and Applied Informatics/1st Intl Conf on Big Data, 2017

2016
An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.
Sensors, 2016

Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks.
J. Sensors, 2016

An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.
J. Medical Syst., 2016

An Improvement of User Authentication Framework for Cloud Computing.
J. Comput., 2016

API-Based Software Birthmarking Method Using Fuzzy Hashing.
IEICE Trans. Inf. Syst., 2016

Performance and security enhanced authentication and key agreement protocol for SAE/LTE network.
Comput. Networks, 2016

Cryptanalysis and Improvement of Efficient Password-Based User Authentication Scheme using Hash Function.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

2015
Cryptanalysis of biometric-based multi-server authentication scheme using smart card.
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015

Security Improvement of Portable Key Management Using a Mobile Phone.
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015

Cryptanalysis of Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

Secure Deletion for Flash-Based Self-Encrypting Drives.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

Cryptanalysis of Dynamic ID-Based User Authentication Scheme Using Smartcards Without Verifier Tables.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

Mingle: Wearable Devices for Enhancing Communications and Activities between the Blind and Ordinary People through a Waltz.
Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, 2015

2014
Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks.
Sensors, 2014

Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography.
Sensors, 2014


  Loading...