


default search action
Yoohwan Kim
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c74]Sangmin Oh, Taeyoung Jeong, Junghwan Yum, Minhyuk Lim, Yoohwan Kim, Bongyong Jeong, Jeongmin Jo, Hyewon Shim, Shin-Young Chung, Paul Jung:
An Analysis of CDM-induced BTI-like Degradation using VF-TLP in Advanced FinFET Technology. IRPS 2024: 1-5 - 2022
- [c73]Mina Esmail Zadeh Nojoo Kambar
, Armin Esmaeilzadeh, Yoohwan Kim, Kazem Taghva:
A Survey on Mobile Malware Detection Methods using Machine Learning. CCWC 2022: 215-221 - [c72]Silafu Yiliyaer, Yoohwan Kim:
Secure Access Service Edge: A Zero Trust Based Framework For Accessing Data Securely. CCWC 2022: 586-591 - [c71]Junyan Liang, Yoohwan Kim:
Evolution of Firewalls: Toward Securer Network Using Next Generation Firewall. CCWC 2022: 752-759 - [c70]Mathew David Salcedo, Mehdi Abid, Yoohwan Kim, Ju-Yeon Jo:
Evil-Twin Browsers: Using Open-Source Code to Clone Browsers for Malicious Purposes. CCWC 2022: 776-784 - [c69]Ki Chan, Yoohwan Kim, Ju-Yeon Jo:
DER Communication Networks and Their Security Issues. CCWC 2022: 785-790 - [c68]Samuel Black
, Yoohwan Kim:
An Overview on Detection and Prevention of Application Layer DDoS Attacks. CCWC 2022: 791-800 - [c67]Chol Hyun Park, Phillipe Austria
, Yoohwan Kim, Ju-Yeon Jo:
MPTCP Performance Simulation in Multiple LEO Satellite Environment. CCWC 2022: 895-899 - [c66]Phillipe Austria
, Chol Hyun Park, Ju-Yeon Jo, Yoohwan Kim, Rahul Sundaresan, Khanh D. Pham:
BBR Congestion Control Analysis with Multipath TCP (MPTCP) and Asymmetrical Latency Subflow. CCWC 2022: 1065-1069 - 2021
- [j19]Tejaswini Goli, Yoohwan Kim:
A Survey on Securing IoT Ecosystems and Adaptive Network Vision. Int. J. Networked Distributed Comput. 9(2-3): 75-85 (2021) - [j18]Alex Hoffman
, Phillipe Austria
, Chol Hyun Park, Yoohwan Kim:
Bountychain: Toward Decentralizing a Bug Bounty Program with Blockchain and IPFS. Int. J. Networked Distributed Comput. 9(2-3): 86-93 (2021) - [c65]Phillipe Austria
, Chol Hyun Park
, Alex Hoffman
, Yoohwan Kim
:
Performance and Cost Analysis of Sia, a Blockchain-Based Storage Platform. BCD 2021: 98-103 - [c64]Benjamin Cisneros, Jiani Ye, Chol Hyun Park, Yoohwan Kim:
CoviReader: Using IOTA and QR Code Technology to Control Epidemic Diseases across the US. CCWC 2021: 610-618 - [c63]Deeksha Anniappa, Yoohwan Kim:
Security and Privacy Issues with Virtual Private Voice Assistants. CCWC 2021: 702-708 - [c62]Chol Hyun Park, Yoohwan Kim, Ju-Yeon Jo:
A Secure Communication Method for CANBus. CCWC 2021: 773-778 - [c61]Xingwei Liang, Yoohwan Kim:
A Survey on Security Attacks and Solutions in the IoT Network. CCWC 2021: 853-859 - [c60]Daniel Alvarez, Yoohwan Kim:
Survey of the Development of Quantum Cryptography and Its Applications. CCWC 2021: 1074-1080 - [c59]Kasra Goravanchi, Ju-Yeon Jo, Yoohwan Kim:
A Divide and Conquer method with Semi-Global Failover for Software Defined Networks. CCWC 2021: 1388-1397 - 2020
- [c58]Alex Hoffman
, Eric Becerril-Blas, Kevin Moreno, Yoohwan Kim:
Decentralized Security Bounty Management on Blockchain and IPFS. CCWC 2020: 241-247 - [c57]Vinay Kumar Calastry Ramesh, Yoohwan Kim, Ju-Yeon Jo:
Secure IoT Data Management in a Private Ethereum Blockchain. COMPSAC 2020: 369-375 - [c56]Russell Harkanson, Carter Chiu
, Yoohwan Kim, Ju-Yeon Jo:
A Framework for Decentralized Private Random State Generation and Maintenance for Multiplayer Gaming Over Blockchain. COMPSAC 2020: 483-488 - [c55]Jin-Ki Kim, Yoohwan Kim, Ju-Yeon Jo, Jae-Hyun Kim:
Proportional Fair Secondary Receiver Selection Algorithm for Full-duplex WLAN. ICTC 2020: 317-319 - [c54]Hai Jiang
, Hyun-Chul Sagong, Jinju Kim, Hyewon Shim, Yoohwan Kim, Junekyun Park, Taiki Uemura, Yongsung Ji, Taeyoung Jeong, Dongkyun Kwon, Hwasung Rhee, Sangwoo Pae, Brandon Lee:
Advanced Self-heating Model and Methodology for Layout Proximity Effect in FinFET Technology. IRPS 2020: 1-5
2010 – 2019
- 2019
- [j17]Sungchul Lee, Ju-Yeon Jo, Yoohwan Kim:
Hadoop Performance Analysis Model with Deep Data Locality. Inf. 10(7): 222 (2019) - [c53]Sungchul Lee, Ju-Yeon Jo, Yoohwan Kim:
Survey of Data Locality in Apache Hadoop. BCD 2019: 46-53 - [c52]Marc Dinh, Brendan Morris, Yoohwan Kim:
UAS-based object tracking via Deep Learning. CCWC 2019: 217-275 - [c51]Tralyn Le, Yoohwan Kim, Ju-Yeon Jo:
Implementation of a Blockchain-Based Event Reselling System. CSII 2019: 50-55 - [c50]Binay Dahal, Yoohwan Kim:
AutoEncoded Domains with Mean Activation for DGA Botnet Detection. ICGS3 2019 - [c49]Hyewon Shim, Jeongmin Jo, Yoohwan Kim, Bongyong Jeong, Minji Shon, Hai Jiang, Sangwoo Pae:
Aging-Aware Design Verification Methods Under Real Product Operating Conditions. IRPS 2019: 1-4 - [c48]Qi Zhao, Xin Tian, Genshe Chen, Russell Harkanson, Yoohwan Kim, Khanh D. Pham:
Understanding the Effects of TCP Tunneling on Approaching High Performance HAIPE-Encrypted Satellite Communication Systems. MILCOM 2019: 1-6 - 2018
- [j16]Yoohwan Kim, Ju-Yeon Jo:
Dynamically Adjusting the Mining Capacity in Cryptocurrency with Binary Blockchain. Int. J. Networked Distributed Comput. 6(1): 43-52 (2018) - [j15]Minjung Jin, Kangjung Kim, Yoohwan Kim, Hyewon Shim, Jinju Kim, Gunrae Kim, Sangwoo Pae:
Investigation of BTI characteristics and its behavior on 10 nm SRAM with high-k/metal gate FinFET technology having multi-VT gate stack. Microelectron. Reliab. 81: 201-209 (2018) - [c47]Sungchul Lee, Ju-Yeon Jo, Yoohwan Kim:
Key based Deep Data Locality on Hadoop. IEEE BigData 2018: 3889-3898 - [c46]Yoohwan Kim, Ju-Yeon Jo, Russell Harkanson, Khanh D. Pham:
TCP-GEN Framework to Achieve High Performance for HAIPE-Encrypted TCP Traffic in a Satellite Communication Environment. ICC 2018: 1-7 - [c45]Wei Guo, Qiang Chen, Zhaoxuan Gong, Jing Bi, Yoohwan Kim, Guodong Zhang:
Automatic Rib Detection and Segmentation Based on Spatial Distance Constraints Particle Filter Method. ICIGP 2018: 22-25 - [c44]Zhaoxuan Gong, Wei Guo, Jia Guo, Zhenyu Zhu, Yoohwan Kim, Guodong Zhang:
Level Set Framework of Multi Labels Fusion for Multiple Sclerosis Lesion Segmentation. ISICDM 2018: 12-15 - [c43]Guodong Zhang, Lingchuang Kong, Wei Guo, Jia Guo, Zhenyu Zhu, Yoohwan Kim, Zhaoxuan Gong:
Gaussian Highpass Filters-based Convolutional Neural Network for Pulmonary Nodules Detection in CT Images. ISICDM 2018: 60-63 - 2017
- [c42]Priyanka Thota, Yoohwan Kim:
Implementation and Comparison of M2M Protocols for Internet of Things. ACIT/CSII/BCD 2017: 43-48 - [c41]Shahab Tayeb, Shahram Latifi, Yoohwan Kim:
A survey on IoT communication and computation frameworks: An industrial perspective. CCWC 2017: 1-6 - [c40]Russell Harkanson, Yoohwan Kim:
Applications of elliptic curve cryptography: a light introduction to elliptic curves and a survey of their applications. CISRC 2017: 6:1-6:7 - 2016
- [j14]Sungchul Lee, Eunmin Hwang, Ju-Yeon Jo, Yoohwan Kim:
Big Data Analysis with Hadoop on Personalized Incentive Model with Statistical Hotel Customer Data. Int. J. Softw. Innov. 4(3): 1-21 (2016) - [c39]Candace Suh-Lee, Ju-Yeon Jo, Yoohwan Kim:
Text mining for security threat detection discovering hidden information in unstructured log messages. CNS 2016: 252-260 - [c38]Sungchul Lee, Ju-Yeon Jo, Yoohwan Kim:
Performance Improvement of MapReduce Process by Promoting Deep Data Locality. DSAA 2016: 292-301 - [c37]Guodong Zhang, Ying Shao, Yoohwan Kim, Wei Guo:
Vertebrae Detection Algorithm in CT Scout Images. IGTA 2016: 230-237 - [c36]Haysam Selim, Shahab Tayeb, Yoohwan Kim, Justin Zhan, Matin Pirouz:
Vulnerability Analysis of Iframe Attacks on Websites. MISNC 2016: 45 - 2015
- [j13]Sungchul Lee, Ju-Yeon Jo, Yoohwan Kim:
Restful Web Service and Web-Based Data Visualization for Environmental Monitoring. Int. J. Softw. Innov. 3(1): 75-94 (2015) - [c35]Sungchul Lee, Ju-Yeon Jo, Yoohwan Kim:
Method for secure RESTful web service. ICIS 2015: 77-81 - [c34]Robert Gripentog, Yoohwan Kim:
Utilizing NFC to secure identification. ICIS 2015: 101-105 - [c33]Changze Liu, Hyun-Chul Sagong, Hyejin Kim, Seungjin Choo, Hyunwoo Lee, Yoohwan Kim, Hyunjin Kim, Bisung Jo, Minjung Jin, Jinjoo Kim, Sangsu Ha, Sangwoo Pae, Jongwoo Park:
Systematical study of 14nm FinFET reliability: From device level stress to product HTOL. IRPS 2015: 2 - [c32]Tara Baniya, Dipesh Gautam, Yoohwan Kim:
Safeguarding Web Surfing with URL Blacklisting. ITNG 2015: 157-162 - [c31]Sai Ram Ganti, Yoohwan Kim:
Design of Low-Cost On-board Auto-tracking Antenna for Small UAS. ITNG 2015: 273-279 - [c30]Sweta Gurung, Yoohwan Kim:
Healthcare Privacy: How Secure Are the VOIP/Video-Conferencing Tools for PHI Data? ITNG 2015: 574-579 - 2014
- [c29]Sungchul Lee, Ju-Yeon Jo, Yoohwan Kim, Haroon Stephen:
A Framework for Environmental Monitoring with Arduino-Based Sensors Using Restful Web Service. IEEE SCC 2014: 275-282 - [c28]Jinho Ahn, Yoohwan Kim:
Effective SBML Protocol for Tolerating Concurrent Failures Based on Broadcast Networks. DASC 2014: 20-25 - [c27]Amritha Puliadi Premnath, Ju-Yeon Jo, Yoohwan Kim:
Application of NTRU Cryptographic Algorithm for SCADA Security. ITNG 2014: 341-346 - [c26]Sungchul Lee, Ju-Yeon Jo, Yoohwan Kim:
Performance testing of web-based data visualization. SMC 2014: 1648-1653 - [c25]Ju-Yeon Jo, Yoohwan Kim, Sungchul Lee:
Mindmetrics: Identifying users without their login IDs. SMC 2014: 2121-2126 - 2013
- [c24]Yoohwan Kim, Hye-Rim Cheon, Jae-Hyun Kim:
New power saving algorithm considering associated STAs and consecutive traffics in WLAN AP. ICUIMC 2013: 29 - 2012
- [j12]Jungwoo Ryoo, Yoohwan Kim, Yoonsuck Choe, Bongjun Ko, Taek Jin Kwon:
Preface to KOCSEA Special Issue. J. Comput. Sci. Eng. 6(4): 279-279 (2012) - [c23]Ju-Yeon Jo, Yoohwan Kim, Kyu-Hwan Lee
, Sung Hyun Cho, Jae-Hyun Kim:
The energy saving strategy using the network coding in the wireless mesh network. ICUIMC 2012: 127:1-127:4 - 2011
- [j11]Jung Eun Kim, Yoohwan Kim:
A Secure Credit Card Transaction Method Based on Kerberos. J. Comput. Sci. Eng. 5(1): 51-70 (2011) - [c22]Kevin Benton, Ju-Yeon Jo, Yoohwan Kim:
SignatureCheck: a protocol to detect man-in-the-middle attack in SSL. CSIIRW 2011: 60 - [c21]Yoohwan Kim, Frederick T. Sheldon
:
Anomaly detection in multiple scale for insider threat analysis. CSIIRW 2011: 77 - 2010
- [j10]Yan Jin, Ling Wang, Yoohwan Kim, Xiao-Zong Yang:
Coverage And Connectivity Problems Under Border Effects In Wireless Sensor Networks. Intell. Autom. Soft Comput. 16(3): 419-432 (2010)
2000 – 2009
- 2009
- [j9]Yan Jin, Ling Wang, Ju-Yeon Jo, Yoohwan Kim, Mei Yang, Yingtao Jiang:
EECCR: An Energy-Efficient -Coverage and -Connectivity Routing Algorithm Under Border Effects in Heterogeneous Sensor Networks. IEEE Trans. Veh. Technol. 58(3): 1429-1442 (2009) - [c20]Yan Jin, Ju-Yeon Jo, Mei Yang, Yoohwan Kim, Yingtao Jiang, John Gowens:
HTSMA: A Hybrid Temporal-Spatial Multi-Channel Assignment Scheme in Heterogeneous Wireless Mesh Networks. GLOBECOM 2009: 1-6 - 2008
- [j8]Yan Jin, Ling Wang, Yoohwan Kim, Xiaozong Yang:
EEMC: An energy-efficient multi-level clustering algorithm for large-scale wireless sensor networks. Comput. Networks 52(3): 542-562 (2008) - [j7]Yan Jin, Ju-Yeon Jo, Ling Wang, Yoohwan Kim, Xiaozong Yang:
ECCRA: An energy-efficient coverage and connectivity preserving routing algorithm under border effects in wireless sensor networks. Comput. Commun. 31(10): 2398-2407 (2008) - [j6]Yoohwan Kim, Ju-Yeon Jo, Kyunghee Kim Suh:
Baseline Profile Stability for Network Anomaly Detection. Int. J. Netw. Secur. 6(1): 60-66 (2008) - [j5]Yan Jin, Ling Wang, Yoohwan Kim, Xiao-Zong Yang:
Energy Efficient Non-uniform Clustering Division Scheme in Wireless Sensor Networks. Wirel. Pers. Commun. 45(1): 31-43 (2008) - [c19]Yan Jin, Ju-Yeon Jo, Yoohwan Kim, Yingtao Jiang, Mei Yang:
EECCP: an energy-efficient coverage- and connectivity preserving algorithm under border effects in wireless sensor networks. WTS 2008: 310-315 - 2007
- [c18]Mei Yang, Shupeng Wang, Ahmed Abdelal, Yingtao Jiang, Yoohwan Kim:
An Improved Multi-Layered Architecture and its Rotational Scheme for Large-Scale Wireless Sensor Networks. CCNC 2007: 855-859 - [c17]Yoohwan Kim, Wei Ren
, Ju-Yeon Jo, Yingtao Jiang, Jun Zheng
:
SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography. ICC 2007: 1570-1575 - [c16]Wei Ren
, Yoohwan Kim, Ju-Yeon Jo, Mei Yang, Yingtao Jiang:
IdSRF: ID-based Secure Routing Framework for Wireless Ad-Hoc Networks. ITNG 2007: 102-110 - [c15]Gopinath Balakrishnan, Mei Yang, Yingtao Jiang, Yoohwan Kim:
Performance Analysis of Error Control Codes for Wireless Sensor Networks. ITNG 2007: 876-879 - 2006
- [j4]Yoohwan Kim, Wing Cheong Lau, Mooi Choo Chuah, H. Jonathan Chao:
PacketScore: A Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks. IEEE Trans. Dependable Secur. Comput. 3(2): 141-155 (2006) - [c14]Yoohwan Kim, Ahmed Abd El Al, Ju-Yeon Jo, Mei Yang, Yingtao Jiang:
An Efficient Defense against Distributed Denial-of-Service Attacks using Congestion Path Marking. ICC 2006: 2159-2164 - [c13]Yoohwan Kim, Ju-Yeon Jo, Kyunghee Kim Suh:
Baseline Profile Stability for Network Anomaly Detection. ITNG 2006: 720-725 - 2005
- [j3]Lihong Zhang, Rabin Raut, Yingtao Jiang, Ulrich Kleine, Yoohwan Kim:
Macro-cell placement for analog physical designs using a hybrid genetic algorithm with simulated annealing. Integr. Comput. Aided Eng. 12(4): 379-396 (2005) - [j2]Lihong Zhang, Rabin Raut, Yingtao Jiang, Ulrich Kleine, Yoohwan Kim:
A hybrid evolutionary analogue module placement algorithm for integrated circuit layout designs. Int. J. Circuit Theory Appl. 33(6): 487-501 (2005) - [c12]Mei Yang, Jianping Wang
, Zhenguo Gao, Yingtao Jiang, Yoohwan Kim:
Coordinated Robust Routing by Dual Cluster Heads in Layered Wireless Sensor Networks. ISPAN 2005: 454-461 - 2004
- [c11]Mooi Choo Chuah, Wing Cheong Lau, Yoohwan Kim, H. Jonathan Chao:
Transient performance of PacketScore for blocking DDoS attacks. ICC 2004: 1892-1896 - [c10]Yoohwan Kim, Wing Cheong Lau, Mooi Choo Chuah, H. Jonathan Chao:
PacketScore: Statistical-based overload control against Distributed Denial-of-Service Attacks. INFOCOM 2004: 2594-2604 - [c9]Ju-Yeon Jo, Yoohwan Kim:
Hash-based Internet Traffic Load Balancing. IRI 2004: 204-209 - 2003
- [c8]Yoohwan Kim, Ju-Yeon Jo, Frank L. Merat:
Defeating distributed denial-of-service attack with deterministic bit marking. GLOBECOM 2003: 1363-1367 - [c7]Yoohwan Kim, H. Jonathan Chao:
Performance of exhaustive matching for input-queued switches. ICC 2003: 1817-1822 - [c6]Yoohwan Kim, Ju-Yeon Jo, H. Jonathan Chao, Francis L. Merat:
High-speed router filter for blocking TCP flooding under DDoS attack. IPCCC 2003: 183-190 - 2000
- [j1]Wyatt S. Newman
, Andy Podgurski, Roger D. Quinn, Frank L. Merat, Michael S. Branicky
, Nick A. Barendt, Greg C. Causey, Erin L. Haaser, Yoohwan Kim, Jayendran Swaminathan, Virgilio B. Velasco Jr.:
Design lessons for building agile manufacturing systems. IEEE Trans. Robotics Autom. 16(3): 228-238 (2000)
1990 – 1999
- 1997
- [c5]Ju-Yeon Jo, Yoohwan Kim, Scott A. Ameduri, Andy Podgurski:
A New Role of Graphical Simulation: Software Testing. Annual Simulation Symposium 1997: 216-225 - [c4]Frank L. Merat, Nick A. Barendt, Roger D. Quinn, Greg C. Causey, Wyatt S. Newman, Virgilio B. Velasco Jr., Andy Podgurski, Yoohwan Kim, Gultekin Özsoyoglu, Ju-Yeon Jo:
Advances in agile manufacturing. ICRA 1997: 1216-1222 - [c3]Ju-Yeon Jo, Yoohwan Kim, Andy Podgurski, Wyatt S. Newman:
Virtual testing of agile manufacturing software using 3D graphical simulation. ICRA 1997: 1223-1228 - [c2]Yoohwan Kim, Ju-Yeon Jo, Virgilio B. Velasco Jr., Nicholas A. Barendt, Andy Podgurski, Gultekin Özsoyoglu, Frank L. Merat:
A flexible software architecture for agile manufacturing. ICRA 1997: 3043-3047 - 1996
- [c1]Roger D. Quinn, Greg C. Causey, Frank L. Merat, David Sargent, Nicholas A. Barendt, Wyatt S. Newman, Virgilio B. Velasco Jr., Andy Podgurski, Ju-Yeon Jo, Leon Sterling, Yoohwan Kim:
Design of an agile manufacturing workcell for light mechanical applications. ICRA 1996: 858-863
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-05 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint