default search action
Yongchul Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j16]Hyun Kwon, Yongchul Kim:
Toward Selective Membership Inference Attack against Deep Learning Model. IEICE Trans. Inf. Syst. 105-D(11): 1911-1915 (2022) - [j15]Hyun Kwon, Yongchul Kim:
BlindNet backdoor: Attack on deep neural network using blind watermark. Multim. Tools Appl. 81(5): 6217-6234 (2022) - 2021
- [j14]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Classification score approach for detecting adversarial example in deep neural network. Multim. Tools Appl. 80(7): 10339-10360 (2021) - 2020
- [j13]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System. IEEE Trans. Inf. Forensics Secur. 15: 526-538 (2020)
2010 – 2019
- 2019
- [j12]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Selective Untargeted Evasion Attack: An Adversarial Example That Will Not Be Classified as Certain Avoided Classes. IEEE Access 7: 73493-73503 (2019) - 2018
- [j11]Hyun Kwon, Yongchul Kim, Ki-Woong Park, Hyunsoo Yoon, Daeseon Choi:
Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network. IEEE Access 6: 46084-46096 (2018) - [j10]Hyun Kwon, Yongchul Kim, Ki-Woong Park, Hyunsoo Yoon, Daeseon Choi:
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier. Comput. Secur. 78: 380-397 (2018) - [j9]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
CAPTCHA Image Generation Systems Using Generative Adversarial Networks. IEICE Trans. Inf. Syst. 101-D(2): 543-546 (2018) - [j8]Hyun Kwon, Yongchul Kim, Ki-Woong Park, Hyunsoo Yoon, Daeseon Choi:
Advanced Ensemble Adversarial Example on Unknown Deep Neural Network Classifiers. IEICE Trans. Inf. Syst. 101-D(10): 2485-2500 (2018) - [j7]Gabriel Anquetin, Yongchul Kim:
Hybrid Rendezvous Algorithm against Jamming Attacks for Cognitive Radio Networks. J. Commun. 13(4): 169-174 (2018) - [j6]Yongchul Kim, Young-Hyun Oh, Jungho Kang:
Asynchronous Channel-Hopping Scheme under Jamming Attacks. Mob. Inf. Syst. 2018: 5032934:1-5032934:9 (2018) - [j5]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Random Untargeted Adversarial Example on Deep Neural Network. Symmetry 10(12): 738 (2018) - [c8]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Fooling a Neural Network in Military Environments: Random Untargeted Adversarial Example. MILCOM 2018: 456-461 - [c7]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
One-Pixel Adversarial Example that Is Safe for Friendly Deep Neural Networks. WISA 2018: 42-54 - 2017
- [j4]Yongchul Kim, Mihail L. Sichitiu:
The Effect of Increasing the Number of Transceivers in an Anti-jamming Channel-Hopping Scheme. J. Commun. 12(5): 279-284 (2017) - 2013
- [j3]Yongchul Kim, Mihail L. Sichitiu:
Generalized Hybrid Scheduling Scheme for Multihop Relaying WiMAX Networks. J. Commun. 8(2): 73-81 (2013) - [c6]Sunghwan Cho, Wooyoung Hong, Yeongyoon Choi, Yongchul Kim, Wontaek Lim:
MAC prioritization scheme resolving unfairness problem. ICTC 2013: 746-751 - 2012
- [c5]Yongchul Kim, Mihail L. Sichitiu:
Hybrid resource allocation scheme in two-hop relaying WiMAX networks. ICNC 2012: 1144-1148 - 2011
- [j2]Yongchul Kim, Mihail L. Sichitiu:
Optimal Placement of Transparent Relay Stations in 802.16j Mobile Multihop Relay Networks. IEICE Trans. Commun. 94-B(9): 2582-2591 (2011) - [j1]Yongchul Kim, Mihail L. Sichitiu:
Optimal Max-Min Fair Resource Allocation in Multihop Relay-Enhanced WiMAX Networks. IEEE Trans. Veh. Technol. 60(8): 3907-3918 (2011) - [c4]Yongchul Kim, Mihail L. Sichitiu:
Optimal resource allocation in multihop relay-enhanced WiMAX networks. WCNC 2011: 737-742 - 2010
- [c3]Yongchul Kim, Mihail L. Sichitiu:
Fairness Schemes in 802.16j Mobile Multihop Relay Networks. GLOBECOM 2010: 1-5 - [c2]Yongchul Kim, Mihail L. Sichitiu:
Cost Effective Coverage Extension in 802.16j Mobile Multihop Relay Networks. WCNC 2010: 1-6
2000 – 2009
- 2000
- [c1]DongChun Lee, Byeongkuk Jeon, Yongchul Kim:
Mobile Agents for Reliable Migration in Networks. IDEAL 2000: 344-351
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint