Yuna Kim

According to our database1, Yuna Kim authored at least 16 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Graph Processing Scheme Using GPU With Value-Driven Differential Scheduling.
IEEE Access, 2024

2022
Machine learning application to spatio-temporal modeling of urban growth.
Comput. Environ. Urban Syst., 2022

2020
Capacitive Heart-Rate Sensing on Touch Screen Panel with Laterally Interspaced Electrodes.
Sensors, 2020

2018
Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption.
ACM Trans. Priv. Secur., 2018

2017
Efficient Transfer Learning Schemes for Personalized Language Modeling using Recurrent Neural Network.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2016

Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2013
A distributed energy-efficient clustering scheme for deploying IDS in MANETs.
Telecommun. Syst., 2013

2012
LT-OLSR: Attack-tolerant OLSR against link spoofing.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

2010
AdaFF: Adaptive Failure-Handling Framework for Composite Web Services.
IEICE Trans. Inf. Syst., 2010

binOb+: a framework for potent and stealthy binary obfuscation.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Exclusion of Forged Files from Multi-source Downloadable P2P Systems.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Allowing user-specified failure handling in web services composition.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

2006
PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

2003
Web Prefetching Using Display-Based Prediction.
Proceedings of the 2003 IEEE / WIC International Conference on Web Intelligence, 2003


  Loading...