default search action
Hyunsoo Yoon
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j153]Jun Kataoka, Hyunsoo Yoon:
AVATAR: Adversarial self-superVised domain Adaptation network for TARget domain. Expert Syst. Appl. 258: 125147 (2024) - [j152]Oyekanmi O. Olatunde, Kehinde S. Oyetunde, Jihun Han, Mohammad T. Khasawneh, Hyunsoo Yoon:
Multiclass classification of Alzheimer's disease prodromal stages using sequential feature embeddings and regularized multikernel support vector machine. NeuroImage 304: 120929 (2024) - [j151]Hairong Wang, Michael G. Argenziano, Hyunsoo Yoon, Deborah Boyett, Akshay Save, Petros Petridis, William Savage, Pamela R. Jackson, Andrea Hawkins-Daarud, Nhan L. Tran, Leland S. Hu, Kyle W. Singleton, Lisa E. Paulson, Osama Al Dalahmah, Jeffrey N. Bruce, Jack Grinband, Kristin R. Swanson, Peter D. Canoll, Jing Li:
Biologically informed deep neural networks provide quantitative assessment of intratumoral heterogeneity in post treatment glioblastoma. npj Digit. Medicine 7(1) (2024) - [j150]Nathan Gaw, Jing Li, Hyunsoo Yoon:
A Novel Semi-Supervised Learning Model for Smartphone-Based Health Telemonitoring. IEEE Trans Autom. Sci. Eng. 21(1): 428-441 (2024) - [i8]Yujin Lee, Seoyoon Jang, Hyunsoo Yoon:
AnoPLe: Few-Shot Anomaly Detection via Bi-directional Prompt Learning with Only Normal Samples. CoRR abs/2408.13516 (2024) - 2023
- [j149]Firas Al-Hindawi, Tejaswi Soori, Han Hu, Md Mahfuzur Rahman Siddiquee, Hyunsoo Yoon, Teresa Wu, Ying Sun:
A framework for generalizing critical heat flux detection models using unsupervised image-to-image translation. Expert Syst. Appl. 227: 120265 (2023) - [j148]Jiajing Huang, Hyunsoo Yoon, Teresa Wu, Kasim Selçuk Candan, Ojas Pradhan, Jin Wen, Zheng O'Neill:
Eigen-Entropy: A metric for multivariate sampling decisions. Inf. Sci. 619: 84-97 (2023) - [i7]Jun Kataoka, Hyunsoo Yoon:
AVATAR: Adversarial self-superVised domain Adaptation network for TARget domain. CoRR abs/2305.00082 (2023) - [i6]Joonkyo Shim, Hyunsoo Yoon:
LEAT: Towards Robust Deepfake Disruption in Real-World Scenarios via Latent Ensemble Attack. CoRR abs/2307.01520 (2023) - [i5]Yujin Lee, Harin Lim, Hyunsoo Yoon:
SelFormaly: Towards Task-Agnostic Unified Anomaly Detection. CoRR abs/2307.12540 (2023) - 2022
- [j147]Minsoo Lee, Hyun Kwon, Hyunsoo Yoon:
Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants. Secur. Commun. Networks 2022: 4714899:1-4714899:13 (2022) - [i4]Firas Al-Hindawi, Tejaswi Soori, Han Hu, Md Mahfuzur Rahman Siddiquee, Hyunsoo Yoon, Teresa Wu, Ying Sun:
A Generalized Framework for Critical Heat Flux Detection Using Unsupervised Image-to-Image Translation. CoRR abs/2212.09107 (2022) - 2021
- [j146]Moonsu Jang, Donghyun Kim, Daehee Seo, Yongmin Ju, Seungho Ryu, Hyunsoo Yoon:
An intelligent recommendation algorithm for red team strategy in edge computing powered massive Cyber Defense Exercise. Comput. Commun. 165: 141-148 (2021) - [j145]Sang-Ok Park, Ohmin Kwon, Yonggon Kim, Sang Kil Cha, Hyunsoo Yoon:
Mind control attack: Undermining deep learning with GPU memory exploitation. Comput. Secur. 102: 102115 (2021) - [j144]Hyunsoo Yoon, Nathan Gaw:
A novel multi-task linear mixed model for smartphone-based telemonitoring. Expert Syst. Appl. 164: 113809 (2021) - [j143]Hyun Kwon, Hyunsoo Yoon, Daeseon Choi:
Data Correction For Enhancing Classification Accuracy By Unknown Deep Neural Network Classifiers. KSII Trans. Internet Inf. Syst. 15(9): 3243-3257 (2021) - [j142]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Classification score approach for detecting adversarial example in deep neural network. Multim. Tools Appl. 80(7): 10339-10360 (2021) - [j141]Ohmin Kwon, Yonggon Kim, Jaehyuk Huh, Hyunsoo Yoon:
ZeroKernel: Secure Context-Isolated Execution on Commodity GPUs. IEEE Trans. Dependable Secur. Comput. 18(4): 1974-1988 (2021) - 2020
- [j140]Fei Gao, Hyunsoo Yoon, Teresa Wu, Xianghua Chu:
A feature transfer enabled multi-task deep learning model on medical imaging. Expert Syst. Appl. 143 (2020) - [j139]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods. IEICE Trans. Inf. Syst. 103-D(4): 879-882 (2020) - [j138]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks. IEICE Trans. Inf. Syst. 103-D(4): 883-887 (2020) - [j137]Yoohwa Kang, Changki Kim, Donghyeok An, Hyunsoo Yoon:
Multipath transmission control protocol-based multi-access traffic steering solution for 5G multimedia-centric network: Design and testbed system implementation. Int. J. Distributed Sens. Networks 16(2) (2020) - [j136]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
Acoustic-decoy: Detection of adversarial examples through audio modification on speech recognition system. Neurocomputing 417: 357-370 (2020) - [j135]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
CAPTCHA Image Generation: Two-Step Style-Transfer Learning in Deep Neural Networks. Sensors 20(5): 1495 (2020) - [j134]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System. IEEE Trans. Inf. Forensics Secur. 15: 526-538 (2020) - [j133]Fei Gao, Teresa Wu, Xianghua Chu, Hyunsoo Yoon, Yanzhe Xu, Bhavika Patel:
Deep Residual Inception Encoder-Decoder Network for Medical Imaging Synthesis. IEEE J. Biomed. Health Informatics 24(1): 39-49 (2020) - [c84]Hyun Kwon, Jungmin Roh, Hyunsoo Yoon, Ki-Woong Park:
TargetNet Backdoor: Attack on Deep Neural Network with Use of Different Triggers. ICIIT 2020: 140-145 - [c83]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
FriendNet Backdoor: Indentifying Backdoor Attack that is safe for Friendly Deep Neural Network. ICSIM 2020: 53-57
2010 – 2019
- 2019
- [j132]Hyun Kwon, Hyunsoo Yoon, Daeseon Choi:
Restricted Evasion Attack: Generation of Restricted-Area Adversarial Example. IEEE Access 7: 60908-60919 (2019) - [j131]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Selective Untargeted Evasion Attack: An Adversarial Example That Will Not Be Classified as Certain Avoided Classes. IEEE Access 7: 73493-73503 (2019) - [j130]Junyoung Son, Jonggyun Choi, Hyunsoo Yoon:
New Complementary Points of Cyber Security Schemes for Critical Digital Assets at Nuclear Power Plants. IEEE Access 7: 78379-78390 (2019) - [j129]Ohmin Kwon, Hyun Kwon, Hyunsoo Yoon:
Rootkit inside GPU Kernel Execution. IEICE Trans. Inf. Syst. 102-D(11): 2261-2264 (2019) - [j128]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
Selective Poisoning Attack on Deep Neural Networks †. Symmetry 11(7): 892 (2019) - [j127]Hyunsoo Yoon, Jing Li:
A Novel Positive Transfer Learning Approach for Telemonitoring of Parkinson's Disease. IEEE Trans Autom. Sci. Eng. 16(1): 180-191 (2019) - [j126]Sokjoon Lee, Hwajeong Seo, Hyeokchan Kwon, Hyunsoo Yoon:
Hybrid approach of parallel implementation on CPU-GPU for high-speed ECDSA verification. J. Supercomput. 75(8): 4329-4349 (2019) - [j125]Dohoo Pyeon, Hyunsoo Yoon:
An efficient multi-path pipeline transmission for a bulk data transfer in IEEE 802.15.4 multi-hop networks. Wirel. Networks 25(1): 117-130 (2019) - [c82]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
Selective Poisoning Attack on Deep Neural Network to Induce Fine-Grained Recognition Error. AIKE 2019: 136-139 - [c81]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
POSTER: Detecting Audio Adversarial Example through Audio Modification. CCS 2019: 2521-2523 - [c80]Hyun Kwon, Hyunsoo Yoon, Daeseon Choi:
Priority Adversarial Example in Evasion Attack on Multiple Deep Neural Networks. ICAIIC 2019: 399-404 - [c79]Hyun Kwon, Ohmin Kwon, Hyunsoo Yoon, Ki-Woong Park:
Face Friend-Safe Adversarial Example on Face Recognition System. ICUFN 2019: 547-551 - [c78]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network. WISA 2019: 234-246 - [i3]Fei Gao, Hyunsoo Yoon, Teresa Wu, Xianghua Chu:
A Feature Transfer Enabled Multi-Task Deep Learning Model on Medical Imaging. CoRR abs/1906.01828 (2019) - 2018
- [b1]Hyunsoo Yoon:
New Statistical Transfer Learning Models for Health Care Applications. Arizona State University, Tempe, USA, 2018 - [j124]Hyun Kwon, Yongchul Kim, Ki-Woong Park, Hyunsoo Yoon, Daeseon Choi:
Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network. IEEE Access 6: 46084-46096 (2018) - [j123]Hyun Kwon, Yongchul Kim, Ki-Woong Park, Hyunsoo Yoon, Daeseon Choi:
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier. Comput. Secur. 78: 380-397 (2018) - [j122]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
CAPTCHA Image Generation Systems Using Generative Adversarial Networks. IEICE Trans. Inf. Syst. 101-D(2): 543-546 (2018) - [j121]Hyungkyu Lee, Younho Lee, Changho Seo, Hyunsoo Yoon:
Efficient Approach for Mitigating Mobile Phishing Attacks. IEICE Trans. Commun. 101-B(9): 1982-1996 (2018) - [j120]Hyun Kwon, Yongchul Kim, Ki-Woong Park, Hyunsoo Yoon, Daeseon Choi:
Advanced Ensemble Adversarial Example on Unknown Deep Neural Network Classifiers. IEICE Trans. Inf. Syst. 101-D(10): 2485-2500 (2018) - [j119]Yongjae Lee, Seunghyeon Lee, Hyunmin Seo, Changhoon Yoon, Seungwon Shin, Hyunsoo Yoon:
Duo: Software Defined Intrusion Tolerant System Using Dual Cluster. Secur. Commun. Networks 2018: 6751042:1-6751042:13 (2018) - [j118]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Random Untargeted Adversarial Example on Deep Neural Network. Symmetry 10(12): 738 (2018) - [j117]Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Junbum Shin, Sungwook Kim:
Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption. ACM Trans. Priv. Secur. 21(4): 17:1-17:30 (2018) - [j116]Yun-kyung Lee, Jeong-Nyeo Kim, Kyung-Soo Lim, Hyunsoo Yoon:
Secure mobile device structure for trust IoT. J. Supercomput. 74(12): 6646-6664 (2018) - [j115]Byungjin Jeong, Namgi Kim, Byoung-Dai Lee, Hyunsoo Yoon:
A Simple and Enriched Closed-Form Formula for Cell Residence Time in 5G Heterogeneous Networks. Wirel. Pers. Commun. 101(1): 491-509 (2018) - [c77]Hyun Kwon, Hyunsoo Yoon, Daeseon Choi:
POSTER: Zero-Day Evasion Attack Analysis on Race between Attack and Defense. AsiaCCS 2018: 805-807 - [c76]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Fooling a Neural Network in Military Environments: Random Untargeted Adversarial Example. MILCOM 2018: 456-461 - [c75]Sokjoon Lee, Hwajeong Seo, Byungho Chunng, Joongyong Choi, Hyeokchan Kwon, Hyunsoo Yoon:
OpenCL Based Implementation of ECDSA Signature Verification for V2X Communication. MUE/FutureTech 2018: 711-716 - [c74]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
One-Pixel Adversarial Example that Is Safe for Friendly Deep Neural Networks. WISA 2018: 42-54 - 2017
- [j114]Seondong Heo, Soojin Lee, Bumsoon Jang, Hyunsoo Yoon:
Designing and Implementing a Diversity Policy for Intrusion-Tolerant Systems. IEICE Trans. Inf. Syst. 100-D(1): 118-129 (2017) - [c73]Hyun Kwon, Hyunsoo Yoon, Daeseon Choi:
Friend-Safe Adversarial Examples in an Evasion Attack on a Deep Neural Network. ICISC 2017: 351-367 - [c72]Namsup Lee, Hyunsoo Yoon, Daeseon Choi:
Detecting Online Game Chargeback Fraud Based on Transaction Sequence Modeling Using Recurrent Neural Network. WISA 2017: 297-309 - 2016
- [j113]Yonggon Kim, Ohmin Kwon, Jin Soo Jang, Seongwook Jin, Hyeongboo Baek, Brent ByungHoon Kang, Hyunsoo Yoon:
On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators. Comput. Secur. 62: 33-48 (2016) - [j112]Seungjae Shin, Uichin Lee, Falko Dressler, Hyunsoo Yoon:
Analysis of Cell Sojourn Time in Heterogeneous Networks With Small Cells. IEEE Commun. Lett. 20(4): 788-791 (2016) - [j111]Bumsoon Jang, Seokjoo Doo, Soojin Lee, Hyunsoo Yoon:
Hybrid Recovery-Based Intrusion Tolerant System for Practical Cyber-Defense. IEICE Trans. Inf. Syst. 99-D(4): 1081-1091 (2016) - [j110]Pyung Kim, Younho Lee, Hyunsoo Yoon:
Sorting Method for Fully Homomorphic Encrypted Data Using the Cryptographic Single-Instruction Multiple-Data Operation. IEICE Trans. Commun. 99-B(5): 1070-1086 (2016) - [j109]Hyeongboo Baek, Jaewoo Lee, Yongjae Lee, Hyunsoo Yoon:
Preemptive Real-Time Scheduling Incorporating Security Constraint for Cyber Physical Systems. IEICE Trans. Inf. Syst. 99-D(8): 2121-2130 (2016) - [j108]Taesung Kim, Seungkwang Lee, Dooho Choi, Hyunsoo Yoon:
Protecting secret keys in networked devices with table encoding against power analysis attacks. J. High Speed Networks 22(4): 293-307 (2016) - [j107]Seungjae Shin, Uichin Lee, Falko Dressler, Hyunsoo Yoon:
Motion-MiX DHT for Wireless Mobile Networks. IEEE Trans. Mob. Comput. 15(12): 3100-3113 (2016) - [j106]Ingook Jang, Dohoo Pyeon, Hyunsoo Yoon, Dongwook Kim:
Channel-quality-aware multihop broadcast for asynchronous multi-channel wireless sensor networks. Wirel. Networks 22(7): 2143-2158 (2016) - [j105]Dohoo Pyeon, Ingook Jang, Hyunsoo Yoon, Dongwook Kim:
RM-MAC: a reservation based multi-channel MAC protocol for wireless sensor networks. Wirel. Networks 22(8): 2727-2739 (2016) - [c71]Sungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Jun-Bum Shin:
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract. AsiaCCS 2016: 617-628 - [i2]Sungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Jun-Bum Shin:
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2016: 232 (2016) - 2015
- [j104]Soo-Hyung Kim, Daeseon Choi, Seung-Hun Jin, Hyunsoo Yoon, JinWoo Son, MyungKeun Yoon:
Customer Data Scanner for Hands-Free Mobile Payment. IEICE Trans. Commun. 98-B(11): 2291-2299 (2015) - [j103]Do-hyung Kim, Jong-Hwan Kim, Yusung Kim, Hyunsoo Yoon, Ikjun Yeom:
End-to-end mobility support in content centric networks. Int. J. Commun. Syst. 28(6): 1151-1167 (2015) - [j102]Younghoon Kim, Yusung Kim, Hyunsoo Yoon, Ikjun Yeom:
Peer-assisted multimedia delivery using periodic multicast. Inf. Sci. 298: 425-446 (2015) - [j101]Cheoleun Moon, Yusung Kim, Do-hyung Kim, Hyunsoo Yoon, Ikjun Yeom:
Efficient Packet Routing in Highly Mobile Wireless Networks. Wirel. Pers. Commun. 84(2): 1265-1284 (2015) - [c70]Se Hwan Kim, Yonggon Kim, Ohmin Kwon, Hyunsoo Yoon:
Fully Batch Processing Enabled Memory Integrity Verification Algorithm Based on Merkle Tree. WISA 2015: 386-398 - 2014
- [j100]Yongjoo Shin, Sihu Song, Yunho Lee, Hyunsoo Yoon:
A Novel Intrusion Tolerant System Using Live Migration. IEICE Trans. Inf. Syst. 97-D(4): 984-988 (2014) - [j99]Seungjae Shin, Namgi Kim, Byoung-Dai Lee, Yoon-Ho Choi, Hyunsoo Yoon:
On the Design of Delay based Admission Control in Hierarchical Networks. KSII Trans. Internet Inf. Syst. 8(3): 997-1010 (2014) - [j98]Sunwoo Kim, Dohoo Pyeon, Ingook Jang, Hyunsoo Yoon:
A Novel Routing Protocol for Cognitive Radio Networks with Cooperation Process. KSII Trans. Internet Inf. Syst. 8(11): 3860-3875 (2014) - [j97]Seondong Heo, Soojin Lee, Seokjoo Doo, Hyunsoo Yoon:
Design of a Secure System Considering Quality of Service. Symmetry 6(4): 938-953 (2014) - [j96]Donghyeok An, Yusung Kim, Hyunsoo Yoon, Ikjun Yeom:
Partition and Cooperation for Crowded Multi-rate WLANs. Wirel. Pers. Commun. 79(2): 1511-1538 (2014) - [c69]Ohmin Kwon, Dongyoung Koo, Yongjoo Shin, Hyunsoo Yoon:
An Efficient Audit Scheme for Cloud Storage. FCC 2014: 185-192 - [c68]Dongyoung Koo, Junbeom Hur, Hyunsoo Yoon:
Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage. FCC 2014: 229-235 - [i1]Yongdae Kim, Hyunsoo Yoon:
First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA. IACR Cryptol. ePrint Arch. 2014: 999 (2014) - 2013
- [j95]Dongyoung Koo, Junbeom Hur, Hyunsoo Yoon:
Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comput. Electr. Eng. 39(1): 34-46 (2013) - [j94]Donghyeok An, Honguk Woo, Hyunsoo Yoon, Ikjun Yeom:
Enhanced cooperative communication MAC for mobile wireless networks. Comput. Networks 57(1): 99-116 (2013) - [j93]Hyunsoo Yoon, Cheong-Sool Park, Jun-Seok Kim, Jun-Geol Baek:
Algorithm learning based neural network integrating feature selection and classification. Expert Syst. Appl. 40(1): 231-241 (2013) - [j92]Ingook Jang, Dohoo Pyeon, Sunwoo Kim, Hyunsoo Yoon:
A Survey on Communication Protocols for Wireless Sensor Networks. J. Comput. Sci. Eng. 7(4): 231-241 (2013) - [j91]Seondong Heo, Pyeong Kim, Yongjoo Shin, Jungmin Lim, Dongyoung Koo, Yonggon Kim, Ohmin Kwon, Hyunsoo Yoon:
A Survey on Intrusion-Tolerant System. J. Comput. Sci. Eng. 7(4): 242-250 (2013) - [j90]Jungmin Lim, Yongki Kim, Dongyoung Koo, Soojin Lee, Seokjoo Doo, Hyunsoo Yoon:
A novel Adaptive Cluster Transformation (ACT)-based intrusion tolerant architecture for hybrid information technology. J. Supercomput. 66(2): 918-935 (2013) - [j89]Ingook Jang, Suho Yang, Hyunsoo Yoon, Dongwook Kim:
EMBA: An Efficient Multihop Broadcast Protocol for Asynchronous Duty-Cycled Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 12(4): 1640-1650 (2013) - [j88]Nak Woon Sung, Ngoc-Thai Pham, Hyunsoo Yoon, Sookjin Lee, Won-Joo Hwang:
Base station association schemes to reduce unnecessary handovers using location awareness in femtocell networks. Wirel. Networks 19(5): 741-753 (2013) - [c67]Jungmin Lim, Yongjoo Shin, Seokjoo Doo, Hyunsoo Yoon:
The Design of a Policy-based Attack-Resilient Intrusion Tolerant System. ITCS 2013: 435-443 - [c66]Jungmin Lim, Seokjoo Doo, Hyunsoo Yoon:
The Design of a Robust Intrusion Tolerance System through Advanced Adaptive Cluster Transformation and Vulnerability-Based VM Selection. MILCOM 2013: 1422-1428 - 2012
- [j87]Euiyul Ko, Donghyeok An, Ikjun Yeom, Hyunsoo Yoon:
Congestion control for sudden bandwidth changes in TCP. Int. J. Commun. Syst. 25(12): 1550-1567 (2012) - [j86]Chanil Park, Junbeom Hur, Seongoun Hwang, Hyunsoo Yoon:
Authenticated public key broadcast encryption scheme secure against insiders' attack. Math. Comput. Model. 55(1-2): 113-122 (2012) - [c65]Do-hyung Kim, Jong-Hwan Kim, Yusung Kim, Hyunsoo Yoon, Ikjun Yeom:
Mobility support in content centric networks. ICN 2012: 13-18 - [c64]Seondong Heo, Jungmin Lim, Minsoo Lee, Soojin Lee, Hyunsoo Yoon:
A Novel Intrusion Tolerant System Based on Adaptive Recovery Scheme (ARS). ICITCS 2012: 71-78 - [c63]Yongjoo Shin, Seungjae Shin, Minsoo Kim, Hyunsoo Yoon:
A Secure Self-Encryption Scheme for Resource Limited Mobile Devices. ICITCS 2012: 121-129 - [c62]Yongki Kim, Jungmin Lim, Seokjoo Doo, Hyunsoo Yoon:
The design of adaptive intrusion tolerant system(ITS) based on historical data. ICITST 2012: 662-667 - 2011
- [j85]Do-hyung Kim, Jong-Hwan Kim, Hyunsoo Yoon, Ikjun Yeom:
AQM for Weighted Fairness in Wireless LANs. IEEE Commun. Lett. 15(11): 1199-1201 (2011) - [j84]Joobeom Yun, Young-joo Shin, HyoungChun Kim, Hyunsoo Yoon:
MiGuard : Detecting and Guarding against Malicious Iframe through API Hooking. IEICE Electron. Express 8(7): 460-465 (2011) - [j83]Seunghak Lee, Namgi Kim, Heeyoul Kim, Younho Lee, Hyunsoo Yoon:
Sensor Node Localization by Three Mobile Anchors in the Wireless Sensor Networks. IEICE Trans. Inf. Syst. 94-D(10): 1981-1988 (2011) - [j82]Jong-Hwan Kim, Hyunsoo Yoon, Ikjun Yeom:
Active Queue Management for Flow Fairness and Stable Queue Length. IEEE Trans. Parallel Distributed Syst. 22(4): 571-579 (2011) - [c61]Donghyeok An, Yusung Kim, Hyunsoo Yoon, Ikjun Yeom:
Multi-rate aware partition and cooperation in WLANs. StudentWorkshop@CoNEXT 2011: 22:1-22:2 - [c60]Byungjin Jeong, Seungjae Shin, Ingook Jang, Nak Woon Sung, Hyunsoo Yoon:
A Smart Handover Decision Algorithm Using Location Prediction for Hierarchical Macro/Femto-Cell Networks. VTC Fall 2011: 1-5 - 2010
- [j81]Junbeom Hur, Chanil Park, Hyunsoo Yoon:
Chosen ciphertext secure authenticated group communication using identity-based signcryption. Comput. Math. Appl. 60(2): 362-375 (2010) - [j80]Sungwon Han, Euiyul Ko, Hyunsoo Yoon, Ikjun Yeom:
Providing forwarding assurance in multi-hop wireless networks. Comput. Commun. 33(3): 293-301 (2010) - [j79]Hanjin Lee, Jaeyoung Hong, Suho Yang, Ingook Jang, Hyunsoo Yoon:
A pseudo-random asynchronous duty cycle MAC protocol in wireless sensor networks. IEEE Commun. Lett. 14(2): 136-138 (2010) - [j78]Jaeyoung Hong, Ingook Jang, Hanjin Lee, Suho Yang, Hyunsoo Yoon:
MRMAC: Medium Reservation MAC Protocol for Reducing End-to-End Delay and Energy Consumption in Wireless Sensor Networks. IEEE Commun. Lett. 14(7): 614-616 (2010) - [j77]Hojin Ghim, Namgi Kim, Dongwook Kim, Min Choi, Hyunsoo Yoon:
An energy-efficient dispersion method for deployment of mobile sensor networks. IEICE Electron. Express 7(10): 722-727 (2010) - [j76]