Browse "CS-Journal Papers(저널논문)" by Author Yoon, Hyunsoo

Showing results 102 to 161 of 164

102
New Complementary Points of Cyber Security Schemes for Critical Digital Assets at Nuclear Power Plants

Son, Junyoung; Choi, Jonggyun; Yoon, Hyunsoo, IEEE ACCESS, v.7, pp.78379 - 78390, 2019-06

103
New hardware-based clock synchronisation for the Byzantine fault

Baek, Yunju; Lee, Heung-Kyu; Yoon, Hyunsoo, Electronics Letters, Vol. 28, No. 21, P.2018 - 2019, 1992-10

104
NEW HARDWARE-BASED CLOCK SYNCHRONISATION FOR THE BYZANTINE FAULT

Baek, Yunju; Lee, Heung-Kyu; Yoon, Hyunsoo, Electronics Letters- IEE, Vol.28, No.21, pp.2018-2019, 1992-10-08

105
NEW HARDWARE-BASED CLOCK SYNCHRONIZATION FOR THE BYZANTINE FAULT

BAEK, YJ; LEE, HK; Yoon, Hyunsoo, ELECTRONICS LETTERS, v.28, no.21, pp.2018 - 2019, 1992-10

106
Nonuniform output traffic distributions in the multipath crossbar network

Kim, B; Kwon, B; Yoon, Hyunsoo; Cho, JW, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E80D, no.4, pp.417 - 424, 1997-04

107
On submesh allocation for mesh multicomputers: A best-fit allocation and a virtual submesh allocation for faulty meshes

Kim, G; Yoon, Hyunsoo, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, v.9, no.2, pp.175 - 185, 1998-02

108
On the best fit submesh allocation strategy in mesh-connected multicomputers

Kim, GM; Yoon, Hyunsoo, INTERNATIONAL JOURNAL OF HIGH SPEED COMPUTING, v.8, no.2, pp.115 - 136, 1996-06

109
On the construction of a powerful distributed authentication server without additional key management

Hong, SM; Lee, S; Park, Y; Cho, Y; Yoon, Hyunsoo, COMPUTER COMMUNICATIONS, v.23, no.17, pp.1638 - 1644, 2000-11

110
On the correctness of inside-out routing algorithm

Kim, MK; Yoon, Hyunsoo; Maeng, SeungRyoul, IEEE TRANSACTIONS ON COMPUTERS, v.46, no.7, pp.820 - 823, 1997-07

111
On the Design of Delay based Admission Control in Hierarchical Networks

Shin, Seungjae; Kim, Namgi; Lee, Byoung-Dai; Choi, Yoon-Ho; Yoon, Hyunsoo, KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, v.8, no.3, pp.997 - 1010, 2014-03

112
ON THE MODULO-M TRANSLATORS FOR THE PRIME MEMORY SYSTEM

Yoon, Hyunsoo; LEE, KY; BAHIRI, A, JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, v.8, no.1, pp.72 - 76, 1990-01

113
On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators

Kim, Yonggon; Kwon, Ohmin; Jang, Jinsoo; Jin, Seongwook; Baek, Hyeongboo; Kang, Brent Byunghoon; Yoon, Hyunsoo, COMPUTERS & SECURITY, v.62, pp.33 - 48, 2016-09

114
Optimal Cluster Expansion-Based Intrusion Tolerant System to Prevent Denial of Service Attacks

Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, APPLIED SCIENCES-BASEL, v.7, no.11, 2017-11

115
Optimal Modulation and Coding Scheme Selection in Cellular Networks with Hybrid-ARQ Error Control

Kim, Dongwook; Jung, Bang Chul; Lee, Hanjin; Sung, Dan Keun; Yoon, Hyunsoo, IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, v.7, no.12, pp.5195 - 5201, 2008-12

116
Packet Fair Queueing Algorithms for Wireless Networks with Link Level Retransmission

Kim, Namgi; Yoon, Hyunsoo, Consumer Communications and Networking Conference, 2004. CCNC 2004. First IEEE, pp.122-127, 2004

117
PARALLEL SIMULATION OF MULTILAYERED NEURAL NETWORKS ON DISTRIBUTED-MEMORY MULTIPROCESSORS

Yoon, Hyunsoo; NANG, JH; Maeng, SeungRyoul, MICROPROCESSING AND MICROPROGRAMMING, v.29, no.3, pp.185 - 195, 1990-10

118
Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field

Jaewon Lee; Heeyoul Kim; Younho Lee; Seong-Min Hong; Yoon, Hyunsoo, INTERNATIONAL JOURNAL OF NETWORK SECURITY, v.4, no.1, pp.99 - 106, 2007-01

119
PERFORMANCE ANALYSIS OF MULTIBUFFERED PACKET-SWITCHING NETWORKS IN MULTIPROCESSOR SYSTEMS

Yoon, Hyunsoo; LEE, KY; LIU, MT, IEEE TRANSACTIONS ON COMPUTERS, v.39, no.3, pp.319 - 327, 1990-03

120
Performance Evaluation of a Class of Multipath Packet Switching Interconnection Networks

Lee, K.Y.; Yoon, Hyunsoo; Liu, M.T., JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, v.17, no.4, pp.353 - 359, 1993-04

121
Power Control in Wireless Ad Hoc Networks for Energy Efficient Routing with Capacity Maximization

Kichan Bae; Geunhwi Lim; Namgi Kim; Yoon, Hyunsoo, JOURNAL ON SYSTEMICS, CYBERNETICS AND INFORMATICS, v.2, no.4, pp.329 - 334, 2005-08

122
Preemptive Real-Time Scheduling Incorporating Security Constraint for Cyber Physical Systems

Baek, Hyeongboo; Lee, Jaewoo; Lee, Yongjae; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E99D, no.8, pp.2121 - 2130, 2016-08

123
Protecting secret keys in networked devices with table encoding against power analysis attacks

Kim, Taesung; Lee, Seungkwang; Choi, Dooho; Yoon, Hyunsoo, JOURNAL OF HIGH SPEED NETWORKS, v.22, no.4, pp.293 - 307, 2016

124
Providing forwarding assurance in multi-hop wireless networks

Han, Sungwon; Ko, Euiyul; Yoon, Hyunsoo; Yeom, Ikjun, Computer Communications, Vol.33, pp.293-301, 2010-02

125
Punctuated Equilibria in Simple Genetic Algorithms for Functions of Unitation

Sangyeop Oh; Yoon, Hyunsoo, COMPLEX SYSTEMS, v.12, 2000-01

126
Random Untargeted Adversarial Example on Deep Neural Network

Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, SYMMETRY-BASEL, v.10, no.12, 2018-12

127
Reactive key management scheme for access control in group communications

Kim, H; Lee, Y; Park, Y; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E90B, pp.982 - 986, 2007-04

128
Reliability measure for sound source localization

Jeon, Hyejeong; Kim, Seungil; Kim, Lag-Yong; Lee, Hee-Youn; Yoon, Hyunsoo, IEICE ELECTRONICS EXPRESS, v.5, no.6, pp.192 - 197, 2008-03

129
Restricted Evasion Attack: Generation of Restricted-Area Adversarial Example

Kwon, Hyun; Yoon, Hyunsoo; Choi, Daeseon, IEEE ACCESS, v.7, pp.60908 - 60919, 2019-05

130
RESTRICTION-FREE ADAPTIVE WORMHOLE ROUTING IN MULTICOMPUTER NETWORKS

CHUNG, JH; Yoon, Hyunsoo; Maeng, SeungRyoul, INTERNATIONAL JOURNAL OF HIGH SPEED COMPUTING, v.7, no.1, pp.89 - 107, 1995-03

131
A Retransmission-Enhanced Duty-Cycle MAC Protocol Based on the Channel Quality for Wireless Sensor Networks

Kweon, Kisuk; Lee, Hanjin; Yoon, Hyunsoo, IEICE Transactions on Communications, Vol.E93-B, No.11, pp.3156-3160, 2010-11

132
RM-MAC: a reservation based multi-channel MAC protocol for wireless sensor networks

Pyeon, Dohoo; Jang, Ingook; Yoon, Hyunsoo; Kim, Dongwook, WIRELESS NETWORKS, v.22, no.8, pp.2727 - 2739, 2016-11

133
Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods

Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.4, 2020-04

134
Rogue public key registration attack and the importance of proof of possession in the PKI environment

Lee, Younho; Park, Yongsu; Kim, Heeyoul; Hong, Seong-Min; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E89D, no.8, pp.2452 - 2455, 2006-08

135
Rootkit inside GPU Kernel Execution

Kwon, Ohmin; Kwon, Hyun; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E102D, no.11, pp.2261 - 2264, 2019-11

136
Scalable IP lookup scheme with small forwarding table for gigabit routers

Jean, S; Chung, SH; Kim, J; Yoon, Hyunsoo, ELECTRONICS LETTERS, v.38, no.6, pp.298 - 300, 2002-03

137
Secure group communication with low communication complexity

Kim, H; Lee, J; Yoon, Hyunsoo; Cho, JW, PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3320, pp.586 - 590, 2004

138
Secure mobile device structure for trust IoT

Lee, Yun Kyung; Kim, J.-N.; Lim, K.-S.; Yoon, Hyunsoo, JOURNAL OF SUPERCOMPUTING, v.74, no.12, pp.6646 - 6664, 2018-12

139
Securing mobile agents by integrity-based encryption

Lee, JW; Hong, SM; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E88D, pp.2102 - 2104, 2005-09

140
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System

Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.15, pp.526 - 538, 2020-01

141
Selective Poisoning Attack on Deep Neural Networks

Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, SYMMETRY-BASEL, v.11, no.7, 2019-07

142
Selective Untargeted Evasion Attack: An Adversarial Example That Will Not Be Classified as Certain Avoided Classes

Kwon, Hyun; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, IEEE ACCESS, v.7, pp.73493 - 73503, 2019-06

143
Self-firing cell scheduler for input queueing ATM switches

Kwon, B; Kim, B; Yoon, Hyunsoo, ELECTRONICS LETTERS, v.32, no.17, pp.1552 - 1554, 1996-08

144
Sensor Node Localization by Three Mobile Anchors in the Wireless Sensor Networks

Lee, Seunghak; Kim, Namgi; Kim, Heeyoul; Lee, Younho; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E94D, no.10, pp.1981 - 1988, 2011-10

145
Signal strength-based link stability estimation in ad hoc wireless networks

Lim, G; Shin, K; Kim, JS; Yoon, Hyunsoo, ELECTRONICS LETTERS, v.39, no.5, pp.485 - 486, 2003-03

146
Sorting Method for Fully Homomorphic Encrypted Data Using the Cryptographic Single-Instruction Multiple-Data Operation

Kim, Pyung; Lee, Younho; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E99B, no.5, pp.1070 - 1086, 2016-05

147
SYSTOLIC ARRAY ALGORITHM FOR THE HOPFIELD NEURAL-NETWORK GUARANTEEING CONVERGENCE

EUN, S; KIM, JS; Maeng, SeungRyoul; Yoon, Hyunsoo, ELECTRONICS LETTERS, v.29, no.7, pp.609 - 611, 1993-04

148
Tamper resistant software by integrity-based encryption

Lee, J; Kim, H; Yoon, Hyunsoo, PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3320, pp.608 - 612, 2004

149
THE B-NETWORK - A MULTISTAGE INTERCONNECTION NETWORK WITH BACKWARD LINKS

LEE, KY; Yoon, Hyunsoo, IEEE TRANSACTIONS ON COMPUTERS, v.39, no.7, pp.966 - 969, 1990-07

150
The deflection self-routing Banyan network: A large-scale ATM switch using the fully adaptive self-routing and its performance analyses

Park, JH; Yoon, Hyunsoo; Lee, Heung-Kyu, IEEE-ACM TRANSACTIONS ON NETWORKING, v.7, no.4, pp.588 - 604, 1999-08

151
THE KNOCKOUT SWITCH UNDER NONUNIFORM TRAFFIC

Yoon, Hyunsoo; LIU, MTM; LEE, KY; KIM, YM, IEEE TRANSACTIONS ON COMMUNICATIONS, v.43, no.6, pp.2149 - 2156, 1995-06

152
THE PM221 INTERCONNECTION NETWORK

LEE, KY; Yoon, Hyunsoo, IEEE TRANSACTIONS ON COMPUTERS, v.38, no.2, pp.302 - 307, 1989-02

153
The Ring-Banyan Network : A Fault Tolerant Multistage Interconnection Network for Multiprocessor Systems

J. Park; Yoon, Hyunsoo; Lee, Heung-Kyu; S.B. Eun, INTERNATIONAL JOURNAL OF HIGH SPEED COMPUTING, v.6, no.4, pp.557 - 577, 1994-06

154
Throttle and preempt: A flow control policy for real-time traffic in wormhole networks

Song, H; Kwon, B; Yoon, Hyunsoo, JOURNAL OF SYSTEMS ARCHITECTURE, v.45, no.8, pp.633 - 649, 1999-02

155
Towards a ubiquitous robotic companion: Design and implementation of ubiquitous robotic service framework

Ha, YG; Sohn, JC; Cho, YJ; Yoon, Hyunsoo, ETRI JOURNAL, v.27, no.6, pp.666 - 676, 2005-12

156
Trust management for resilient wireless sensor networks

Hur, Junbeom; Lee, Younho; Hong, Seong-Min; Yoon, Hyunsoo, INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3935, pp.56 - 68, 2006

157
Two real-time flow controls in wormhole networks

Song, H; Kwon, B; Kim, JY; Yoon, Hyunsoo, INTERNATIONAL JOURNAL OF HIGH SPEED COMPUTING, v.9, no.3, pp.237 - 255, 1997-09

158
User-perceived QoS in a wireless packet network with multiple channel conditions

Cho, M; Kim, N; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E89B, pp.342 - 349, 2006-02

159
VAMSD: Voronoi Diagram Based Autonomous Mobile Sensor Deployment for Maximizing Coverage

Hong, Jaeyoung; Lee, Hanjin; Yang, Suho; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E93B, no.3, pp.732 - 735, 2010-03

160
Weakness of the Synchro-Difference LKH scheme for secure multicast

Kim, H; Chung, B; Lee, Y; Park, Y; Yoon, Hyunsoo, IEEE COMMUNICATIONS LETTERS, v.11, no.9, pp.765 - 767, 2007-09

161
Wireless packet fair queueing algorithms with link level retransmission

Kim, N; Yoon, Hyunsoo, COMPUTER COMMUNICATIONS, v.28, no.7, pp.713 - 725, 2005-05

Discover

Type

Open Access

Date issued

. next

rss_1.0 rss_2.0 atom_1.0