Jong Kim
Orcid: 0000-0002-0484-0790Affiliations:
- Pohang University of Science and Technology, South Korea
According to our database1,
Jong Kim
authored at least 138 papers
between 1989 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ACM Trans. Priv. Secur., May, 2024
IEEE Access, 2024
2023
Proceedings of the Information Security Applications - 24th International Conference, 2023
2022
J. Syst. Softw., 2022
Comput. Vis. Image Underst., 2022
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022
Proceedings of the Computer Vision - ECCV 2022 Workshops, 2022
Proceedings of the IEEE International Conference on Blockchain, 2022
2021
ACM Trans. Embed. Comput. Syst., 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
A comparative assessment of Wi-Fi and acoustic signal-based HCI methods on the practicality.
J. Multimodal User Interfaces, 2020
Proceedings of the Information Security Applications - 21st International Conference, 2020
2019
WearAuth: Wristwear-Assisted User Authentication for Smartphones Using Wavelet-Based Multi-Resolution Analysis.
IEICE Trans. Inf. Syst., 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 28th International Conference on Compiler Construction, 2019
2018
Reliable Rowhammer Attack and Mitigation Based on Reverse Engineering Memory Address Mapping Algorithms.
Proceedings of the Information Security Applications - 19th International Conference, 2018
Security Analysis of Mobile Web Browser Hardware Accessibility: Study with Ambient Light Sensors.
Proceedings of the Information Security Applications - 19th International Conference, 2018
Proceedings of the 51st Annual IEEE/ACM International Symposium on Microarchitecture, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
2017
Proceedings of the Information Security Applications - 18th International Conference, 2017
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
RT-IFTTT: Real-Time IoT Framework with Trigger Condition-Aware Flexible Polling Intervals.
Proceedings of the 2017 IEEE Real-Time Systems Symposium, 2017
Proceedings of the International Symposium on Rapid System Prototyping, 2017
Proceedings of the 18th ACM SIGPLAN/SIGBED Conference on Languages, 2017
2016
Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata.
IEEE Trans. Dependable Secur. Comput., 2016
IEEE Micro, 2016
Comput. Sci. Inf. Syst., 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the 14th IEEE/ACM International Symposium on Cluster, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Telecommun. Syst., 2013
WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream.
IEEE Trans. Dependable Secur. Comput., 2013
J. Comput. Sci. Eng., 2013
Comput. Commun., 2013
I know the shortened URLs you clicked on Twitter: inference attack using public click analytics and Twitter metadata.
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the Information Security Applications - 14th International Workshop, 2013
Proceedings of the International Conference for High Performance Computing, 2013
Distributed certificate authority scheme with weighted secret sharing for mobile ad-hoc networks.
Proceedings of the Fourth International Conference on the Network of the Future, 2013
2012
IEEE Trans. Veh. Technol., 2012
DRMFS: A file system layer for transparent access semantics of DRM-protected contents.
J. Syst. Softw., 2012
IEICE Trans. Commun., 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011
2010
IEICE Trans. Inf. Syst., 2010
IEICE Trans. Inf. Syst., 2010
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
2009
J. Syst. Softw., 2009
Redistributing time-based rights between consumer devices for content sharing in DRM system.
Int. J. Inf. Sec., 2009
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
Dynamic Two-Tier Cell Structure for Bandwidth Reservation of Handoffs in Cellular Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Copyright Protection for Modifiable Digital Content Based on Distributed Environment.
IEICE Trans. Inf. Syst., 2008
Energy-Aware Error Correction for QoS-Provisioning Real-Time Communications in Wireless Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
FileTrust: Reputation Management for Reliable Resource Sharing in Structured Peer-to-Peer Networks.
IEICE Trans. Commun., 2007
An Adaptive DVS Checkpointing Scheme for Fixed-Priority Tasks with Reliability Constraints in Dependable Real-Time Embedded Systems.
Proceedings of the Embedded Software and Systems, [Third] International Conference, 2007
Power Aware Scheduling of Bag-of-Tasks Applications with Deadline Constraints on DVS-enabled Clusters.
Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), 2007
2006
IEICE Trans. Commun., 2006
Proceedings of the Information Security Applications, 7th International Workshop, 2006
An Energy-Efficient FEC Scheme for Weakly Hard Real-Time Communications in Wireless Networks.
Proceedings of the 12th IEEE Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2006), 2006
Dual-Mode <i>r</i>-Reliable Task Model for Flexible Scheduling in Reliable Real-Time Systems.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006
Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
Imprecise Computation Grid Application Model for Flexible Market-Based Resource Allocation.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006
Proceedings of the Agents and Peer-to-Peer Computing - 5th International Workshop, 2006
Mitigating the Impact of Liars by Reflecting Peer's Credibility on P2P File Reputation Systems.
Proceedings of the Agents and Peer-to-Peer Computing - 5th International Workshop, 2006
2005
An Adaptive FEC Scheme for Firm Real-Time Multimedia Communications in Wireless Networks.
IEICE Trans. Commun., 2005
Proceedings of the 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 2005
Proceedings of the 3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 2005
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005
Parallely testable design for detection of neighborhood pattern sensitive faults in high density DRAMs.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005
HackSim: An Automation of Penetration Testing for Remote Buffer Overflow Vulnerabilities.
Proceedings of the Information Networking, 2005
Mobile Multicast Routing Protocol Using Prediction of Dwelling Time of a Mobile Host.
Proceedings of the Networking, 2005
Proceedings of the Advances in Grid Computing, 2005
Proceedings of the Agents and Peer-to-Peer Computing, 4th International Workshop, 2005
2004
Proceedings of the 1st ACM Workshop On Secure Web Services, 2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
Proceedings of the Information Security, 7th International Conference, 2004
Best-Effort Scheduling (m, k)-Firm Real-Time Tasks Based on the (m, k)-Firm Constraint Meeting Probability.
Proceedings of the International Conference on Embedded Systems and Applications, 2004
2003
Processor Allocation and Task Scheduling of Matrix Chain Products on Parallel Systems.
IEEE Trans. Parallel Distributed Syst., 2003
Task scheduling using a block dependency DAG for block-oriented sparse Cholesky factorization.
Parallel Comput., 2003
J. Parallel Distributed Comput., 2003
J. Parallel Distributed Comput., 2003
Proceedings of the 2003 IEEE / WIC International Conference on Web Intelligence, 2003
PCMHoDC. A Scheme to Protect Copyright & Modification History of Digital Contents.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the 4th International Workshop on Grid Computing (GRID 2003), 2003
2001
Proceedings of the 8th Pacific Rim International Symposium on Dependable Computing (PRDC 2001), 2001
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001
2000
J. Interconnect. Networks, 2000
1999
J. Parallel Distributed Comput., 1999
Int. J. High Speed Comput., 1999
Proceedings of the 1999 Pacific Rim International Symposium on Dependable Computing (PRDC 1999), 1999
1998
IEEE J. Solid State Circuits, 1998
J. Parallel Distributed Comput., 1998
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998
1997
Replicated Process Allocation for Load Distribution in Fault-Tolerant Multicomputers.
IEEE Trans. Computers, 1997
Int. J. High Speed Comput., 1997
Proceedings of the 1997 International Conference on Parallel Processing (ICPP '97), 1997
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997
1996
IEEE Trans. Computers, 1996
J. Parallel Distributed Comput., 1996
1995
Proceedings of the 2nd International Workshop on Real-Time Computing Systems and Applications, October 25, 1995
Adaptive Virutal Cut-through as an Alternative to Wormhole Routing.
Proceedings of the 1995 International Conference on Parallel Processing, 1995
DTN: A New Partitionable Torus Topology.
Proceedings of the 1995 International Conference on Parallel Processing, 1995
Proceedings of the Digest of Papers: FTCS-25, 1995
1994
IEEE Trans. Parallel Distributed Syst., 1994
Proceedings of the 1994 International Conference on Parallel Processing, 1994
1993
IEEE Trans. Computers, 1993
Proceedings of the 1993 International Conference on Parallel Processing, 1993
1992
IEEE Trans. Parallel Distributed Syst., 1992
1991
IEEE Trans. Parallel Distributed Syst., 1991
Proceedings of the 1991 ACM SIGMETRICS conference on Measurement and modeling of computer systems, 1991
Proceedings of the 10th International Conference on Distributed Computing Systems (ICDCS 1991), 1991
1989
A Processor Allocation Scheme for Hypercube Computers.
Proceedings of the International Conference on Parallel Processing, 1989
Proceedings of the Nineteenth International Symposium on Fault-Tolerant Computing, 1989