Ki-Woong Park
Orcid: 0000-0002-3377-223X
According to our database1,
Ki-Woong Park
authored at least 74 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
5
10
15
4
1
3
1
7
3
5
4
1
2
1
1
1
1
2
3
7
6
1
2
1
1
4
1
7
1
3
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
OOSP: Opportunistic Optimization Scheme for Pod Deployment Enhanced with Multilayered Sensing.
Sensors, October, 2024
MTD-Diorama: Moving Target Defense Visualization Engine for Systematic Cybersecurity Strategy Orchestration.
Sensors, July, 2024
LazyFrog: Advancing Security and Efficiency in Commercial Wireless Charging with Adaptive Frequency Hopping.
Sensors, April, 2024
CoRR, 2024
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024
Poster: Clipped Quantization and Huffman Coding for Efficient Secure Transfer in Federated Learning.
Proceedings of the IEEE/ACM Symposium on Edge Computing, 2024
2023
Pwnable-Sherpa: An interactive coaching system with a case study of pwnable challenges.
Comput. Secur., 2023
CO-TRIS: Container Orchestration - Transforming container using Resource Inspection System.
Proceedings of the Sixth IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2023
Proceedings of the Sixth IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2023
Side-Channel Based Device Authentication in Wireless Charging: An Experimental Study.
Proceedings of the Sixth IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2023
2022
<i>iContainer</i>: Consecutive checkpointing with rapid resilience for immortal container-based services.
J. Netw. Comput. Appl., 2022
KSII Trans. Internet Inf. Syst., 2022
<i>Cloud-BlackBox</i>: Toward practical recording and tracking of VM swarms for multifaceted cloud inspection.
Future Gener. Comput. Syst., 2022
2021
FLEX-IoT: Secure and Resource-Efficient Network Boot System for Flexible-IoT Platform.
Sensors, 2021
2020
Compression-Assisted Adaptive ECC and RAID Scattering for NAND Flash Storage Devices.
Sensors, 2020
Sensors, 2020
Sensors, 2020
Inf. Syst., 2020
Acoustic-decoy: Detection of adversarial examples through audio modification on speech recognition system.
Neurocomputing, 2020
Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks.
IEICE Trans. Inf. Syst., 2020
IEICE Trans. Inf. Syst., 2020
Proceedings of the Information Security Applications - 21st International Conference, 2020
FriendNet Backdoor: Indentifying Backdoor Attack that is safe for Friendly Deep Neural Network.
Proceedings of the ICSIM '20: The 3rd International Conference on Software Engineering and Information Management, 2020
Proceedings of the ICIIT 2020: 5th International Conference on Intelligent Information Technology, 2020
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020
Blueprint for a Secure Container to Protect Data in Edge Cloud Computing Environment.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020
Toward Software-Defined Moving Target Defense for Secure Service Deployment Enhanced with a User-Defined Orchestration.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020
2019
UAV-Undertaker: Securely Verifiable Remote Erasure Scheme with a Countdown-Concept for UAV via Randomized Data Synchronization.
Wirel. Commun. Mob. Comput., 2019
Anomaly Detection Technology Using Potential Difference Displacement Detection of Data Bus.
J. Internet Serv. Inf. Secur., 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019
Developing an OpenSHMEM Model Over a Switchless PCIe Non-Transparent Bridge Interface.
Proceedings of the IEEE International Parallel and Distributed Processing Symposium Workshops, 2019
Proceedings of the Eleventh International Conference on Ubiquitous and Future Networks, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Selective Poisoning Attack on Deep Neural Network to Induce Fine-Grained Recognition Error.
Proceedings of the 2nd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2019
2018
KSII Trans. Internet Inf. Syst., 2018
IEICE Trans. Inf. Syst., 2018
Comput. Stand. Interfaces, 2018
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier.
Comput. Secur., 2018
IEEE Access, 2018
Applying Time-Lapse Concepts onto Storage System for Long-Term System Trace Analysis: Technical Challenges and Blueprints.
Proceedings of the First IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2018
2017
Energy-Efficient Hosting Rich Content from Mobile Platforms with Relative Proximity Sensing.
Sensors, 2017
OPERA: A Complete Offline and Anonymous Digital Cash Transaction System with a One-Time Readable Memory.
IEICE Trans. Inf. Syst., 2017
IEICE Trans. Inf. Syst., 2017
2016
A fully persistent and consistent read/write cache using flash-based general SSDs for desktop workloads.
Inf. Syst., 2016
2015
Reference Pattern-Aware Instant Memory Balancing for Consolidated Virtual Machineson Manycores.
IEEE Trans. Parallel Distributed Syst., 2015
Inf. Syst., 2015
MalCore: Toward a Practical Malware Identification System Enhanced with Manycore Technology.
Proceedings of the Information Systems Security and Privacy, 2015
Malfinder: Accelerated Malware Classification System through Filtering on Manycore System.
Proceedings of the ICISSP 2015, 2015
2014
ACM Trans. Embed. Comput. Syst., 2014
I-Filter: Identical Structured Control Flow String filter for accelerated malware variant classification.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
2013
IEEE Trans. Serv. Comput., 2013
Proceedings of the Mobile, Ubiquitous, and Intelligent Computing, 2013
2012
Resource Management of Manycores with a Hierarchical and a Hybrid Main Memory for MN-MATE Cloud Node.
Proceedings of the Eighth IEEE World Congress on Services, 2012
Efficient memory management of a hierarchical and a hybrid main memory for MN-MATE platform.
Proceedings of the 2012 PPOPP International Workshop on Programming Models and Applications for Multicores and Manycores, 2012
GHOST: GPGPU-offloaded high performance storage I/O deduplication for primary storage system.
Proceedings of the 2012 PPOPP International Workshop on Programming Models and Applications for Multicores and Manycores, 2012
OPAMP: Evaluation Framework for Optimal Page Allocation of Hybrid Main Memory Architecture.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012
2011
ACCENT: Cognitive cryptography plugged compression for SSL/TLS-based cloud computing services.
ACM Trans. Internet Techn., 2011
MN-GEMS: A Timing-Aware Simulator for a Cloud Node with Manycore, DRAM, and Non-volatile Memories.
Proceedings of the IEEE International Conference on Cloud Computing, 2011
2010
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010
Proceedings of the 2010 International IEEE Consumer Electronics Society's Games Innovations Conference, 2010
Proceedings of the 2010 International IEEE Consumer Electronics Society's Games Innovations Conference, 2010
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
THEMIS: Towards Mutually Verifiable Billing Transactions in the Cloud Computing Environment.
Proceedings of the IEEE International Conference on Cloud Computing, 2010
HyperDealer: Reference-Pattern-Aware Instant Memory Balancing for Consolidated Virtual Machines.
Proceedings of the IEEE International Conference on Cloud Computing, 2010
2009
Proceedings of the 17th International Conference on Multimedia 2009, 2009
2008
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices.
IEEE Trans. Computers, 2008
2007
U-TOPIA: A Ubiquitous Environment with a Wearable Platform, UFC and Its Security Infrastructure, pKASSO.
Proceedings of the Constructing Ambient Intelligence, 2007
pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
A Ubiquitous Fashionable Computer with an i-Throw Device on a Location-Based Service Environment.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007