Kwangho Kim

According to our database1, Kwangho Kim authored at least 14 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Causal K-Means Clustering.
CoRR, 2024

2023
Fair and Robust Estimation of Heterogeneous Treatment Effects for Policy Learning.
Proceedings of the International Conference on Machine Learning, 2023

2022
Doubly Robust Counterfactual Classification.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

A 0.65V 1316µm<sup>2</sup>Fully Synthesizable Digital Temperature Sensor Using Wire Metal Achieving O.16nJ.%2-Accuracy FoM in 5nm FinFET CMOS.
Proceedings of the IEEE International Solid-State Circuits Conference, 2022

2021
29.6 A Distributed Digital LDO with Time-Multiplexing Calibration Loop Achieving 40A/mm2 Current Density and 1mA-to-6.4A Ultra-Wide Load Range in 5nm FinFET CMOS.
Proceedings of the IEEE International Solid-State Circuits Conference, 2021

2020
Analysis of Antenna Performance Degradation due to Coupled Electromagnetic Interference from Nearby Circuits.
IEICE Trans. Electron., 2020

Efficient Topological Layer based on Persistent Landscapes.
CoRR, 2020

PLLay: Efficient Topological Layer based on Persistent Landscapes.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

2018
Time Series Featurization via Topological Data Analysis: an Application to Cryptocurrency Trend Forecasting.
CoRR, 2018

Causal effects based on distributional distances.
CoRR, 2018

2017
National cyber security enhancement scheme for intelligent surveillance capacity with public IoT environment.
J. Supercomput., 2017

2015
Changes of Cybersecurity Legal System in East Asia: Focusing on Comparison Between Korea and Japan.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Cyber Security Considerations for Designing IoT-Based Control Systems.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

2008
Fault-Tolerance for the Mobile Ad-Hoc Environment.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008


  Loading...