Lee, Soohwan; Hwang, Seoyeong; Oakley, Ian; Lee, Kyungho, DIS '24: Designing Interactive Systems Conference, 2024-07-04
Lee, Jaewhan; Lee, Jae-Hoon; Kim, Sangsik, 25th European Conference on Integrated Optics, ECIO 2024, pp.540 - 544, 2024-06-19
Choi, Jeongsoo; Park, Se Jin; Kim, Minsu; Ro, Yong Man, IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2024, 2024-06-19
Taeheon Kim; Sebin Shin; Hak Gu Kim; Ro, Yong Man, IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2024, 2024-06-19
Choi, Yoojin; Kang, Minhee; Ahn, Heejin, 2024 IEEE Intelligent Vehicle Symposium (IV), 2024-06-02
YEON, INMO; Jeong, Iljoo; Lee, Seungchul; Choi, Jung-Woo, 2024년도 한국음향학회 춘계학술발표대회, pp.335 - 336, 2024-05-30
Choi, Da Yun; Choi, Jung-Woo, 2024년도 한국음향학회 춘계학술발표대회, pp.335 - 336, 2024-05-30
Choi, Soonhyeon; Choi, Jung-Woo, 2024년도 춘계 소음진동 학술대회, 2024-05-23
Choi, Jihoon; Choi, Jung-Woo, 2024년도 춘계 소음진동 학술대회, 2024-05-23
Lee, Dong Heon; Choi, Jung-Woo, 2024년도 춘계 소음진동 학술대회, 2024-05-22
가시광 LED를 이용한 무선통신 시스템 이권형; 박현철, 제18회 통신정보합동학술대회, 한국통신학회, 대한전자공학회, 한국정보과학회, 한국정보보호학회, 한국정보처리학회, 2008-04-23 |
Effects of Antenna Correlation on Spatial Diversity and Multiuser Diversity Kim, Haelyong; Choi, Wan; Park, Hyuncheol, IEEE Wireless Communications and Networking Conference (WCNC 2008), IEEE, 2008-03-31 |
Precoding Scheme for Multiuser MIMO Downlink System in IEEE 802.16m Lim, Bomi; Ahn, Kyungsul; Kim, Haelyong; Park, Hyuncheol, Triangle Symposium on Advanced ICT (TriSAI 2009), UEC, 2009-10-28 |
Why Kad Lookup Fails Kang, Hun J.; Chan-Tin, Eric; Hopper, Nicholas; Kim, Yongdae, IEEE International Conference on Peer-to-Peer Computing (P2P), 2009 , IEEE, 2009-09 |
Towards Complete Node Enumeration in a Peer-to-Peer Botnet Kang, B; Chan-Tin, E; Lee, C; Tyra, J; Kang, H; Nunnery, C; Wadler, Z; et al, ACM Symposium on Information, Computer & Communication Security (ASIACCS 2009) , ACM, 2009-03 |
The Frogboiling attack: limitations of anomaly detection for secure network coordinates Chan-Tin, E; Feldman, D.; Hopper, N.; Kim, Yongdae, SecureComm, 2009, ICST, 2009-09 |
Secure Localization with Phantom Node Detection Hwang, J; He, T; Kim, Yongdae, 7th International Conference on AD-HOC Networks & Wireless , 2008-09 |
Scalable onion routing with Torsk McLachlan, Jon; Tran, Andrew; Hopper, Nicholas; Kim, Yongdae, ACM Conference on Computer and Communications Security (CCS), 2009 , ACM, 2009-11 |
Realistic Sensing Area Modeling Hwang, J; Gu, Y; He, T; Kim, Yongdae, IEEE Infocom 2007 Minisymposia, IEEE, 2007-05 |
On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage, Yun, A; Shi, C; Kim, Yongdae, The ACM Cloud Computing Security Workshop (CCSW), 2009 , ACM, 2009-11-13 |
Membership-concealing overlay networks Vasserman, Eugene; Jansen, Rob; Tyra, James; Hopper, Nicholas; Kim, Yongdae, ACM Conference on Computer and Communications Security (CCS), 2009 , ACM, 2009-11 |
In-Situ Sensing Area Modeling for Wireless Sensor Networks Hwang, J; He, T; Kim, Yongdae, ACM Conference on Embedded Networked Sensor Systems (SenSys), ACM, 2007-11 |
Hashing it out in public: Common failure modes of DHT-based anonymity schemes Tran, A; Hopper, N; Kim, Yongdae, Workshop on Privacy in the Electronic Society (WPES), 2009 , ACM, 2009-11-09 |
Detecting Phantom Nodes in Wireless Sensor Networks Hwang, J; He, T; Kim, Yongdae, IEEE Infocom2007 Minisymposia, IEEE, 2007-05 |
Combating doublespending using cooperative P2P systems Osipkov, I; Vasserman, E; Hopper, N; Kim, Yongdae, 2007 IEEE Conference on Distributed Computing Systems (ICDCS), IEEE, 2007-06 |
Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage, Kher, V; Kim, Yongdae, IEEE International Symposium on Reliable Distributed Systems (SRDS), 2007 , IEEE, 2007-10 |
Attacking the Kad Network Wang, P; Tyra, J; Chan-Tin, E; Malchow, T; Foo Kune, D; Hopper, N; Kim, Yongdae, SecureComm 2008. , ICST, 2008-09 |
Attacking the Kad Network - Real World Evaluation and High Fidelity Simulation using DVN - Chan-Tin, Eric; Wang, Peng; Tyra, James; Malchow, Tyson; Kune, Denis Foo; Hopper, Nicholas; Kim, Yongdae, Wiley Security and Communication Networks, 2009 , IEEE, 2009-05 |
릴레이 채널에서 터보 부호를 이용한 전송 방법 김재홍; 김남식; 김해룡; 박현철, 제17회 통신정보합동학술대회, 한국통신학회, 대한전자공학회, 한국정보과학회, 한국정보보호학회, 한국정보처리학회, 2007-05-02 |
다중 사용자 OFDM 을 위한 규격 최적화 연구 김광훈; 이현범; 유흥렬; 박현철, 한국통신학회 2007년 추계종합학술대회, 한국통신학회, 2007-11-17 |
Discover