Jong Kim

Orcid: 0000-0002-0484-0790

Affiliations:
  • Pohang University of Science and Technology, South Korea


According to our database1, Jong Kim authored at least 138 papers between 1989 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Toward Robust ASR System against Audio Adversarial Examples using Agitated Logit.
ACM Trans. Priv. Secur., May, 2024

Gem5-AVX: Extension of the Gem5 Simulator to Support AVX Instruction Sets.
IEEE Access, 2024

2023
Mutation Methods for Structured Input to Enhance Path Coverage of Fuzzers.
Proceedings of the Information Security Applications - 24th International Conference, 2023

2022
Fuzzing with automatically controlled interleavings to detect concurrency bugs.
J. Syst. Softw., 2022

Defending against attacks tailored to transfer learning via feature distancing.
Comput. Vis. Image Underst., 2022

The Ticket Price Matters in Sharding Blockchain.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022

Unrestricted Black-Box Adversarial Attack Using GAN with Limited Queries.
Proceedings of the Computer Vision - ECCV 2022 Workshops, 2022

Enhancing Scalability with Payment Requests Aggregation in Lightning Network.
Proceedings of the IEEE International Conference on Blockchain, 2022

2021
Precise Correlation Extraction for IoT Fault Detection With Concurrent Activities.
ACM Trans. Embed. Comput. Syst., 2021

Detecting Audio Adversarial Examples with Logit Noising.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
A comparative assessment of Wi-Fi and acoustic signal-based HCI methods on the practicality.
J. Multimodal User Interfaces, 2020

CAPTCHAs Are Still in Danger: An Efficient Scheme to Bypass Adversarial CAPTCHAs.
Proceedings of the Information Security Applications - 21st International Conference, 2020

2019
WearAuth: Wristwear-Assisted User Authentication for Smartphones Using Wavelet-Based Multi-Resolution Analysis.
IEICE Trans. Inf. Syst., 2019

Low-Noise LLC Side-Channel Attack with Perf.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Pinpoint Rowhammer: Suppressing Unwanted Bit Flips on Rowhammer Attacks.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Spinal code: automatic code extraction for near-user computation in fogs.
Proceedings of the 28th International Conference on Compiler Construction, 2019

2018
Prevention of cross-update privacy leaks on android.
Comput. Sci. Inf. Syst., 2018

SSD Performance Modeling Using Bottleneck Analysis.
IEEE Comput. Archit. Lett., 2018

Reliable Rowhammer Attack and Mitigation Based on Reverse Engineering Memory Address Mapping Algorithms.
Proceedings of the Information Security Applications - 19th International Conference, 2018

Security Analysis of Mobile Web Browser Hardware Accessibility: Study with Ambient Light Sensors.
Proceedings of the Information Security Applications - 19th International Conference, 2018

SSDcheck: Timely and Accurate Prediction of Irregular Behaviors in Black-Box SSDs.
Proceedings of the 51st Annual IEEE/ACM International Symposium on Microarchitecture, 2018

Detecting and Identifying Faulty IoT Devices in Smart Home with Context Extraction.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
Holistic Tracking of Products on the Blockchain Using NFC and Verified Users.
Proceedings of the Information Security Applications - 18th International Conference, 2017

FACT: Functionality-centric Access Control System for IoT Programming Frameworks.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

RT-IFTTT: Real-Time IoT Framework with Trigger Condition-Aware Flexible Polling Intervals.
Proceedings of the 2017 IEEE Real-Time Systems Symposium, 2017

Rapid prototyping of IoT applications with Esperanto compiler.
Proceedings of the International Symposium on Rapid System Prototyping, 2017

Integrated IoT programming with selective abstraction.
Proceedings of the 18th ACM SIGPLAN/SIGBED Conference on Languages, 2017

2016
Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata.
IEEE Trans. Dependable Secur. Comput., 2016

Heterogeneous Distributed Shared Memory for Lightweight Internet of Things Devices.
IEEE Micro, 2016

Preserving source- and sink-location privacy in sensor networks.
Comput. Sci. Inf. Syst., 2016

SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDN.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Inferring browser activity and status through remote monitoring of storage usage.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Publishing Graph Data with Subgraph Differential Privacy.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Identifying Cross-origin Resource Status Using Application Cache.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Location Privacy via Differential Private Perturbation of Cloaking Area.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Early filtering of ephemeral malicious accounts on Twitter.
Comput. Commun., 2014

Detection of Heap-Spraying Attacks Using String Trace Graph.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

CMcloud: Cloud Platform for Cost-Effective Offloading of Mobile Applications.
Proceedings of the 14th IEEE/ACM International Symposium on Cluster, 2014

Exploring and mitigating privacy threats of HTML5 geolocation API.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
A distributed energy-efficient clustering scheme for deploying IDS in MANETs.
Telecommun. Syst., 2013

WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream.
IEEE Trans. Dependable Secur. Comput., 2013

Differential Privacy in Practice.
J. Comput. Sci. Eng., 2013

A Survey of Security Mechanisms with Direct Sequence Spread Spectrum Signals.
J. Comput. Sci. Eng., 2013

Fluxing botnet command and control channels with URL shortening services.
Comput. Commun., 2013

I know the shortened URLs you clicked on Twitter: inference attack using public click analytics and Twitter metadata.
Proceedings of the 22nd International World Wide Web Conference, 2013

Punobot: Mobile Botnet Using Push Notification Service in Android.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

Guide-copy: fast and silent migration of virtual machine for datacenters.
Proceedings of the International Conference for High Performance Computing, 2013

Distributed certificate authority scheme with weighted secret sharing for mobile ad-hoc networks.
Proceedings of the Fourth International Conference on the Network of the Future, 2013

2012
A Hybrid Sonar Algorithm for Submersible Cars to Verify the Location of Senders.
IEEE Trans. Veh. Technol., 2012

DRMFS: A file system layer for transparent access semantics of DRM-protected contents.
J. Syst. Softw., 2012

Security Condition for Exact Localization in Wireless Ad Hoc Networks.
IEICE Trans. Commun., 2012

Distance Bounding with Delayed Responses.
IEEE Commun. Lett., 2012

WarningBird: Detecting Suspicious URLs in Twitter Stream.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

LT-OLSR: Attack-tolerant OLSR against link spoofing.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

2011
Spam Filtering in Twitter Using Sender-Receiver Relationship.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Protecting location privacy using location semantics.
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011

A batch rekeying time decision algorithm for IPTV systems.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
AdaFF: Adaptive Failure-Handling Framework for Composite Web Services.
IEICE Trans. Inf. Syst., 2010

SLA-Based Scheduling of Bag-of-Tasks Applications on Power-Aware Cluster Systems.
IEICE Trans. Inf. Syst., 2010

A secure and mutual-profitable DRM interoperability scheme.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

binOb+: a framework for potent and stealthy binary obfuscation.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Security weakness of Tseng's fault-tolerant conference-key agreement protocol.
J. Syst. Softw., 2009

Redistributing time-based rights between consumer devices for content sharing in DRM system.
Int. J. Inf. Sec., 2009

Exclusion of Forged Files from Multi-source Downloadable P2P Systems.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Dynamic Two-Tier Cell Structure for Bandwidth Reservation of Handoffs in Cellular Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Copyright Protection for Modifiable Digital Content Based on Distributed Environment.
IEICE Trans. Inf. Syst., 2008

Energy-Aware Error Correction for QoS-Provisioning Real-Time Communications in Wireless Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Allowing user-specified failure handling in web services composition.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

Annulling SYN Flooding Attacks with Whitelist.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
FileTrust: Reputation Management for Reliable Resource Sharing in Structured Peer-to-Peer Networks.
IEICE Trans. Commun., 2007

An Adaptive DVS Checkpointing Scheme for Fixed-Priority Tasks with Reliability Constraints in Dependable Real-Time Embedded Systems.
Proceedings of the Embedded Software and Systems, [Third] International Conference, 2007

Power Aware Scheduling of Bag-of-Tasks Applications with Deadline Constraints on DVS-enabled Clusters.
Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), 2007

2006
Resiliency of Network Topologies under Path-Based Attacks.
IEICE Trans. Commun., 2006

PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

An Energy-Efficient FEC Scheme for Weakly Hard Real-Time Communications in Wireless Networks.
Proceedings of the 12th IEEE Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2006), 2006

Dual-Mode <i>r</i>-Reliable Task Model for Flexible Scheduling in Reliable Real-Time Systems.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006

Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

Imprecise Computation Grid Application Model for Flexible Market-Based Resource Allocation.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

The Exclusion of Malicious Routing Peers in Structured P2P Systems.
Proceedings of the Agents and Peer-to-Peer Computing - 5th International Workshop, 2006

Mitigating the Impact of Liars by Reflecting Peer's Credibility on P2P File Reputation Systems.
Proceedings of the Agents and Peer-to-Peer Computing - 5th International Workshop, 2006

2005
An Adaptive FEC Scheme for Firm Real-Time Multimedia Communications in Wireless Networks.
IEICE Trans. Commun., 2005

A Reputation Management System in Structured Peer-to-Peer Networks.
Proceedings of the 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 2005

Adaptive Location Management Scheme for Mobile IP.
Proceedings of the 3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 2005

Energy-saving design technique achieved by latched pass-transistor adiabatic logic.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

Parallely testable design for detection of neighborhood pattern sensitive faults in high density DRAMs.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

HackSim: An Automation of Penetration Testing for Remote Buffer Overflow Vulnerabilities.
Proceedings of the Information Networking, 2005

Mobile Multicast Routing Protocol Using Prediction of Dwelling Time of a Mobile Host.
Proceedings of the Networking, 2005

Ticket-Based Grid Services Architecture for Dynamic Virtual Organizations.
Proceedings of the Advances in Grid Computing, 2005

A Trust Management Scheme in Structured P2P Systems.
Proceedings of the Agents and Peer-to-Peer Computing, 4th International Workshop, 2005

2004
Workflow-Based Authorization Service in the Grid.
J. Grid Comput., 2004

Ticket-based fine-grained authorization service in the dynamic VO environment.
Proceedings of the 1st ACM Workshop On Secure Web Services, 2004

Attack Resiliency of Network Topologies.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

Modifiable Digital Content Protection in P2P.
Proceedings of the Information Security, 7th International Conference, 2004

Best-Effort Scheduling (m, k)-Firm Real-Time Tasks Based on the (m, k)-Firm Constraint Meeting Probability.
Proceedings of the International Conference on Embedded Systems and Applications, 2004

2003
Processor Allocation and Task Scheduling of Matrix Chain Products on Parallel Systems.
IEEE Trans. Parallel Distributed Syst., 2003

Task scheduling using a block dependency DAG for block-oriented sparse Cholesky factorization.
Parallel Comput., 2003

Secure checkpointing.
J. Syst. Archit., 2003

Dynamic load balancing for switch-based networks.
J. Parallel Distributed Comput., 2003

On-line scheduling of scalable real-time tasks on multiprocessor systems.
J. Parallel Distributed Comput., 2003

Web Prefetching Using Display-Based Prediction.
Proceedings of the 2003 IEEE / WIC International Conference on Web Intelligence, 2003

PCMHoDC. A Scheme to Protect Copyright & Modification History of Digital Contents.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Workflow-based Authorization Service in Grid.
Proceedings of the 4th International Workshop on Grid Computing (GRID 2003), 2003

2001
A Secure Checkpointing System.
Proceedings of the 8th Pacific Rim International Symposium on Dependable Computing (PRDC 2001), 2001

Performance Evaluation of Dependable Real-Time Communication with Elastic QoS.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

2000
On the Configuration of Switch-Based Networks with Wormhole Routing.
J. Interconnect. Networks, 2000

1999
Design and Analysis of the Dual-Torus Network.
New Gener. Comput., 1999

Synchronous Load Balancing in Hypercube Multicomputers with Faulty Nodes.
J. Parallel Distributed Comput., 1999

Path Selection for Real-Time Communication in Wormhole Networks.
Int. J. High Speed Comput., 1999

Reliable Probabilistic Checkpointing.
Proceedings of the 1999 Pacific Rim International Symposium on Dependable Computing (PRDC 1999), 1999

1998
Design of a built-in current sensor for I<sub>DDQ</sub> testing.
IEEE J. Solid State Circuits, 1998

Adaptive Virtual Cut-Through as a Viable Routing Method.
J. Parallel Distributed Comput., 1998

A Real-Time Communication Method for Wormhole Switching Networks.
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998

1997
Replicated Process Allocation for Load Distribution in Fault-Tolerant Multicomputers.
IEEE Trans. Computers, 1997

Dynamic Load Distribution on Meshes with Broadcasting.
Int. J. High Speed Comput., 1997

Real-Time Job Scheduling in Hypercube Systems.
Proceedings of the 1997 International Conference on Parallel Processing (ICPP '97), 1997

A Performance Modeling Technique for Mesh-Connected Multicomputers.
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997

Synchronous Load Balancing in Hypercube Multicomputers with Faulty Nodes.
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997

Dynamic Load Distribution on a Mesh with a Single Bus.
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997

Probabilistic Checkpointing.
Proceedings of the Digest of Papers: FTCS-27, 1997

1996
Execution Time Analysis of Communicating Tasks in Distributed Systems.
IEEE Trans. Computers, 1996

Path Selection for Message Passing in a Circuit-Switched Multicomputer.
J. Parallel Distributed Comput., 1996

1995
Performance comparison of real-time architectures using simulation.
Proceedings of the 2nd International Workshop on Real-Time Computing Systems and Applications, October 25, 1995

Adaptive Virutal Cut-through as an Alternative to Wormhole Routing.
Proceedings of the 1995 International Conference on Parallel Processing, 1995

DTN: A New Partitionable Torus Topology.
Proceedings of the 1995 International Conference on Parallel Processing, 1995

Process Allocation for Load Distribution in Fault-Tolerant Multicomputers.
Proceedings of the Digest of Papers: FTCS-25, 1995

1994
Operationally Enhanced Folded Hypercubes.
IEEE Trans. Parallel Distributed Syst., 1994

Hypercube Communication Delay with Wormhole Routing.
IEEE Trans. Computers, 1994

Path Selection for Communicating Tasks in a Wormhole-Routed Multicomputer.
Proceedings of the 1994 International Conference on Parallel Processing, 1994

1993
Deadlock-Free Fault-Tolerant Routing in Injured Hypercubes.
IEEE Trans. Computers, 1993

A Lazy Scheduling Scheme for Improving Hypercube Performance.
Proceedings of the 1993 International Conference on Parallel Processing, 1993

1992
A Unified Task-Based Dependability Model for Hypercube Computers.
IEEE Trans. Parallel Distributed Syst., 1992

1991
A Top-Down Processor Allocation Scheme for Hypercube Computers.
IEEE Trans. Parallel Distributed Syst., 1991

On Subcube Dependability in a Hypercube.
Proceedings of the 1991 ACM SIGMETRICS conference on Measurement and modeling of computer systems, 1991

Modeling wormhole routing in a hypercube.
Proceedings of the 10th International Conference on Distributed Computing Systems (ICDCS 1991), 1991

1989
A Processor Allocation Scheme for Hypercube Computers.
Proceedings of the International Conference on Parallel Processing, 1989

An analytical model for computing hypercube availability.
Proceedings of the Nineteenth International Symposium on Fault-Tolerant Computing, 1989


  Loading...