Showing results 81 to 140 of 164
Fault-Tolerant Multicasting in MIN's for ATM Switches Kim, Jinsoo; Park, Jaehyung; Yoon, Hyunsoo; Cho, Jung Wan, IEEE COMMUNICATIONS LETTERS, v.2, no.12, pp.331 - 333, 1998-12 |
Free submesh list strategy: A best fit submesh allocation in mesh connected multicomputers Kim, G.; Yoon, Hyunsoo, PARALLEL PROCESSING LETTERS, v.6, no.1, pp.75 - 86, 1996 |
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; Yoon, Hyunsoo; Choi, Daeseon, COMPUTERS & SECURITY, v.78, pp.380 - 397, 2018-08 |
Handoff procedure for seamless service in IP and OFDM based 4G mobile systems Kim, N; Yoon, Hyunsoo, IEICE TRANSACTIONS ON ELECTRONICS, v.E88C, pp.2338 - 2340, 2005-12 |
HEURISTIC SUBCUBE ALLOCATION IN HYPERCUBE SYSTEMS KANG, OH; YOON, SY; Yoon, Hyunsoo; Cho, Jung Wan, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E75D, no.4, pp.517 - 526, 1992-07 |
Heuristic Subcube Allocation with Task Migration in Hypercube Systems Kang, O; Kim, BM; Yoon, Hyunsoo; Maeng, SeungRyoul; Cho, Jung Wan, INTERNATIONAL JOURNAL OF HIGH SPEED COMPUTING, v.4, no.2, pp.121 - 142, 1992 |
Hybrid approach of parallel implementation on CPU-GPU for high-speed ECDSA verification Lee, Sokjoon; Seo, Hwajeong; Kwon, Hyeokchan; Yoon, Hyunsoo, JOURNAL OF SUPERCOMPUTING, v.75, no.8, pp.4329 - 4349, 2019-08 |
Hybrid Recovery-Based Intrusion Tolerant System for Practical Cyber-Defense Jang, Bum Soon; Doo, Seokjoo; Lee, Soojin; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E99D, no.4, pp.1081 - 1091, 2016-04 |
IEEE 802.11b WLAN performance with variable transmission rates: In view of high level throughput Kim, N; Choi, S; Yoon, Hyunsoo, NETWORKING - ICN 2005, PT 2 Book Series: LECTURE NOTES IN COMPUTER SCIENCE, v.3421, pp.1080 - 1087, 2005 |
Improved base-phi expansion method for Koblitz curves over optimal extension fields Chung, B; Kim, H; Yoon, Hyunsoo, IET INFORMATION SECURITY, v.1, pp.19 - 26, 2007-03 |
Improved batch exponentiation Chung, Byungchun; Hur, Junbeom; Kim, Heeyoul; Hong, Seong-Min; Yoon, Hyunsoo, INFORMATION PROCESSING LETTERS, v.109, no.15, pp.832 - 837, 2009-07 |
Improving handover quality in 4G mobile systems Kim, D; Lee, H; Kim, N; Yoon, Hyunsoo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E91A, pp.1686 - 1688, 2008-07 |
INDIRECT STAR-TYPE NETWORKS FOR LARGE MULTIPROCESSOR SYSTEMS LEE, KY; Yoon, Hyunsoo, IEEE TRANSACTIONS ON COMPUTERS, v.40, no.11, pp.1277 - 1282, 1991-11 |
Intelligent memory: An architecture for lock-free synchronization Seong, N; Jung, N; Kim, B; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E80D, no.4, pp.441 - 447, 1997-04 |
L-ASTERISK LEARNING - A FAST SELF-ORGANIZING FEATURE MAP LEARNING ALGORITHM-BASED ON INCREMENTAL ORDERING JUN, YP; Yoon, Hyunsoo; Cho, Jung Wan, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E76D, no.6, pp.698 - 706, 1993-06 |
Long-Term Flow Fairness with Fixed Memory Space Kim, Jong-hwan; Yoon, Hyunsoo; Yeom, Ikjun, IEEE COMMUNICATIONS LETTERS, v.13, no.12, pp.998 - 1000, 2009-12 |
Mind control attack: Undermining deep learning with GPU memory exploitation Park, Sang-Ok; Kwon, Ohmin; Kim, Yonggon; Cha, Sang Kil; Yoon, Hyunsoo, COMPUTERS & SECURITY, v.102, 2021-03 |
Motion-MiX DHT for Wireless Mobile Networks Shin, Seung Jae; Lee, Uichin; Dressler, Falko; Yoon, Hyunsoo, IEEE TRANSACTIONS ON MOBILE COMPUTING, v.15, no.12, pp.3100 - 3113, 2016-12 |
Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network Kwon, Hyun; Kim, Yongchul; Park, Ki-Woong; Yoon, Hyunsoo; Choi, Daeseon, IEEE ACCESS, v.6, pp.46084 - 46096, 2018-08 |
Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.4, 2020-04 |
Multipath transmission control protocol-based multi-access traffic steering solution for 5G multimedia-centric network: Design and testbed system implementation Kang, Yoohwa; Kim, Changki; An, Donghyeok; Yoon, Hyunsoo, INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, v.16, no.2, 2020-02 |
New Complementary Points of Cyber Security Schemes for Critical Digital Assets at Nuclear Power Plants Son, Junyoung; Choi, Jonggyun; Yoon, Hyunsoo, IEEE ACCESS, v.7, pp.78379 - 78390, 2019-06 |
New hardware-based clock synchronisation for the Byzantine fault Baek, Yunju; Lee, Heung-Kyu; Yoon, Hyunsoo, Electronics Letters, Vol. 28, No. 21, P.2018 - 2019, 1992-10 |
NEW HARDWARE-BASED CLOCK SYNCHRONISATION FOR THE BYZANTINE FAULT Baek, Yunju; Lee, Heung-Kyu; Yoon, Hyunsoo, Electronics Letters- IEE, Vol.28, No.21, pp.2018-2019, 1992-10-08 |
NEW HARDWARE-BASED CLOCK SYNCHRONIZATION FOR THE BYZANTINE FAULT BAEK, YJ; LEE, HK; Yoon, Hyunsoo, ELECTRONICS LETTERS, v.28, no.21, pp.2018 - 2019, 1992-10 |
Nonuniform output traffic distributions in the multipath crossbar network Kim, B; Kwon, B; Yoon, Hyunsoo; Cho, JW, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E80D, no.4, pp.417 - 424, 1997-04 |
On submesh allocation for mesh multicomputers: A best-fit allocation and a virtual submesh allocation for faulty meshes Kim, G; Yoon, Hyunsoo, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, v.9, no.2, pp.175 - 185, 1998-02 |
On the best fit submesh allocation strategy in mesh-connected multicomputers Kim, GM; Yoon, Hyunsoo, INTERNATIONAL JOURNAL OF HIGH SPEED COMPUTING, v.8, no.2, pp.115 - 136, 1996-06 |
On the construction of a powerful distributed authentication server without additional key management Hong, SM; Lee, S; Park, Y; Cho, Y; Yoon, Hyunsoo, COMPUTER COMMUNICATIONS, v.23, no.17, pp.1638 - 1644, 2000-11 |
On the correctness of inside-out routing algorithm Kim, MK; Yoon, Hyunsoo; Maeng, SeungRyoul, IEEE TRANSACTIONS ON COMPUTERS, v.46, no.7, pp.820 - 823, 1997-07 |
On the Design of Delay based Admission Control in Hierarchical Networks Shin, Seungjae; Kim, Namgi; Lee, Byoung-Dai; Choi, Yoon-Ho; Yoon, Hyunsoo, KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, v.8, no.3, pp.997 - 1010, 2014-03 |
ON THE MODULO-M TRANSLATORS FOR THE PRIME MEMORY SYSTEM Yoon, Hyunsoo; LEE, KY; BAHIRI, A, JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, v.8, no.1, pp.72 - 76, 1990-01 |
On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators Kim, Yonggon; Kwon, Ohmin; Jang, Jinsoo; Jin, Seongwook; Baek, Hyeongboo; Kang, Brent Byunghoon; Yoon, Hyunsoo, COMPUTERS & SECURITY, v.62, pp.33 - 48, 2016-09 |
Optimal Cluster Expansion-Based Intrusion Tolerant System to Prevent Denial of Service Attacks Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, APPLIED SCIENCES-BASEL, v.7, no.11, 2017-11 |
Optimal Modulation and Coding Scheme Selection in Cellular Networks with Hybrid-ARQ Error Control Kim, Dongwook; Jung, Bang Chul; Lee, Hanjin; Sung, Dan Keun; Yoon, Hyunsoo, IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, v.7, no.12, pp.5195 - 5201, 2008-12 |
Packet Fair Queueing Algorithms for Wireless Networks with Link Level Retransmission Kim, Namgi; Yoon, Hyunsoo, Consumer Communications and Networking Conference, 2004. CCNC 2004. First IEEE, pp.122-127, 2004 |
PARALLEL SIMULATION OF MULTILAYERED NEURAL NETWORKS ON DISTRIBUTED-MEMORY MULTIPROCESSORS Yoon, Hyunsoo; NANG, JH; Maeng, SeungRyoul, MICROPROCESSING AND MICROPROGRAMMING, v.29, no.3, pp.185 - 195, 1990-10 |
Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field Jaewon Lee; Heeyoul Kim; Younho Lee; Seong-Min Hong; Yoon, Hyunsoo, INTERNATIONAL JOURNAL OF NETWORK SECURITY, v.4, no.1, pp.99 - 106, 2007-01 |
PERFORMANCE ANALYSIS OF MULTIBUFFERED PACKET-SWITCHING NETWORKS IN MULTIPROCESSOR SYSTEMS Yoon, Hyunsoo; LEE, KY; LIU, MT, IEEE TRANSACTIONS ON COMPUTERS, v.39, no.3, pp.319 - 327, 1990-03 |
Performance Evaluation of a Class of Multipath Packet Switching Interconnection Networks Lee, K.Y.; Yoon, Hyunsoo; Liu, M.T., JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, v.17, no.4, pp.353 - 359, 1993-04 |
Power Control in Wireless Ad Hoc Networks for Energy Efficient Routing with Capacity Maximization Kichan Bae; Geunhwi Lim; Namgi Kim; Yoon, Hyunsoo, JOURNAL ON SYSTEMICS, CYBERNETICS AND INFORMATICS, v.2, no.4, pp.329 - 334, 2005-08 |
Preemptive Real-Time Scheduling Incorporating Security Constraint for Cyber Physical Systems Baek, Hyeongboo; Lee, Jaewoo; Lee, Yongjae; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E99D, no.8, pp.2121 - 2130, 2016-08 |
Protecting secret keys in networked devices with table encoding against power analysis attacks Kim, Taesung; Lee, Seungkwang; Choi, Dooho; Yoon, Hyunsoo, JOURNAL OF HIGH SPEED NETWORKS, v.22, no.4, pp.293 - 307, 2016 |
Providing forwarding assurance in multi-hop wireless networks Han, Sungwon; Ko, Euiyul; Yoon, Hyunsoo; Yeom, Ikjun, Computer Communications, Vol.33, pp.293-301, 2010-02 |
Punctuated Equilibria in Simple Genetic Algorithms for Functions of Unitation Sangyeop Oh; Yoon, Hyunsoo, COMPLEX SYSTEMS, v.12, 2000-01 |
Random Untargeted Adversarial Example on Deep Neural Network Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, SYMMETRY-BASEL, v.10, no.12, 2018-12 |
Reactive key management scheme for access control in group communications Kim, H; Lee, Y; Park, Y; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E90B, pp.982 - 986, 2007-04 |
Reliability measure for sound source localization Jeon, Hyejeong; Kim, Seungil; Kim, Lag-Yong; Lee, Hee-Youn; Yoon, Hyunsoo, IEICE ELECTRONICS EXPRESS, v.5, no.6, pp.192 - 197, 2008-03 |
Restricted Evasion Attack: Generation of Restricted-Area Adversarial Example Kwon, Hyun; Yoon, Hyunsoo; Choi, Daeseon, IEEE ACCESS, v.7, pp.60908 - 60919, 2019-05 |
RESTRICTION-FREE ADAPTIVE WORMHOLE ROUTING IN MULTICOMPUTER NETWORKS CHUNG, JH; Yoon, Hyunsoo; Maeng, SeungRyoul, INTERNATIONAL JOURNAL OF HIGH SPEED COMPUTING, v.7, no.1, pp.89 - 107, 1995-03 |
A Retransmission-Enhanced Duty-Cycle MAC Protocol Based on the Channel Quality for Wireless Sensor Networks Kweon, Kisuk; Lee, Hanjin; Yoon, Hyunsoo, IEICE Transactions on Communications, Vol.E93-B, No.11, pp.3156-3160, 2010-11 |
RM-MAC: a reservation based multi-channel MAC protocol for wireless sensor networks Pyeon, Dohoo; Jang, Ingook; Yoon, Hyunsoo; Kim, Dongwook, WIRELESS NETWORKS, v.22, no.8, pp.2727 - 2739, 2016-11 |
Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.4, 2020-04 |
Rogue public key registration attack and the importance of proof of possession in the PKI environment Lee, Younho; Park, Yongsu; Kim, Heeyoul; Hong, Seong-Min; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E89D, no.8, pp.2452 - 2455, 2006-08 |
Rootkit inside GPU Kernel Execution Kwon, Ohmin; Kwon, Hyun; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E102D, no.11, pp.2261 - 2264, 2019-11 |
Scalable IP lookup scheme with small forwarding table for gigabit routers Jean, S; Chung, SH; Kim, J; Yoon, Hyunsoo, ELECTRONICS LETTERS, v.38, no.6, pp.298 - 300, 2002-03 |
Secure group communication with low communication complexity Kim, H; Lee, J; Yoon, Hyunsoo; Cho, JW, PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3320, pp.586 - 590, 2004 |
Secure mobile device structure for trust IoT Lee, Yun Kyung; Kim, J.-N.; Lim, K.-S.; Yoon, Hyunsoo, JOURNAL OF SUPERCOMPUTING, v.74, no.12, pp.6646 - 6664, 2018-12 |
Securing mobile agents by integrity-based encryption Lee, JW; Hong, SM; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E88D, pp.2102 - 2104, 2005-09 |
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.15, pp.526 - 538, 2020-01 |
Discover