default search action
Dongkwan Kim 0001
Person information
- affiliation: KAIST, Daejeon, South Korea
Other persons with the same name
- Dongkwan Kim 0002 — Yonsei University, Seoul, Korea
- Dongkwan Kim 0003 — Virginia Tech, Blacksburg, VA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Chani Jung, Dongkwan Kim, Jiho Jin, Jiseon Kim, Yeon Seonwoo, Yejin Choi, Alice Oh, Hyunwoo Kim:
Perceptions to Beliefs: Exploring Precursory Inferences for Theory of Mind in Large Language Models. EMNLP 2024: 19794-19809 - [c18]Dongkwan Kim, Alice Oh:
Translating Subgraphs to Nodes Makes Simple GNNs Strong and Efficient for Subgraph Representation Learning. ICML 2024 - [i6]Chani Jung, Dongkwan Kim, Jiho Jin, Jiseon Kim, Yeon Seonwoo, Yejin Choi, Alice Oh, Hyunwoo Kim:
Perceptions to Beliefs: Exploring Precursory Inferences for Theory of Mind in Large Language Models. CoRR abs/2407.06004 (2024) - 2023
- [j3]Dongkwan Kim, Eunsoo Kim, Sang Kil Cha, Sooel Son, Yongdae Kim:
Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned. IEEE Trans. Software Eng. 49(4): 1661-1682 (2023) - [c17]Joon-Ha Jang, ManGi Cho, Jaehoon Kim, Dongkwan Kim, Yongdae Kim:
Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels. NDSS 2023 - [c16]Jinseob Jeong, Dongkwan Kim, Joon-Ha Jang, Juhwan Noh, Changhun Song, Yongdae Kim:
Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof. NDSS 2023 - [c15]Eunsoo Kim, Min Woo Baek, CheolJun Park, Dongkwan Kim, Yongdae Kim, Insu Yun:
BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software. USENIX Security Symposium 2023: 3547-3563 - 2022
- [c14]Dongkwan Kim, Jiho Jin, Jaimeen Ahn, Alice Oh:
Models and Benchmarks for Representation Learning of Partially Observed Subgraphs. CIKM 2022: 4118-4122 - [c13]Sangwook Bae, Mincheol Son, Dongkwan Kim, CheolJun Park, Jiho Lee, Sooel Son, Yongdae Kim:
Watching the Watchers: Practical Video Identification Attack in LTE Networks. USENIX Security Symposium 2022: 1307-1324 - [i5]Dongkwan Kim, Alice Oh:
Efficient Representation Learning of Subgraphs by Subgraph-To-Node Translation. CoRR abs/2204.04510 (2022) - [i4]Dongkwan Kim, Alice Oh:
How to Find Your Friendly Neighborhood: Graph Attention Design with Self-Supervision. CoRR abs/2204.04879 (2022) - [i3]Dongkwan Kim, Jiho Jin, Jaimeen Ahn, Alice Oh:
Models and Benchmarks for Representation Learning of Partially Observed Subgraphs. CoRR abs/2209.00508 (2022) - 2021
- [j2]Dongkwan Kim, Eunsoo Kim, Mingeun Kim, Yeongjin Jang, Yongdae Kim:
Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds. IEEE Secur. Priv. 19(6): 26-35 (2021) - [c12]Dongkwan Kim, Alice Oh:
How to Find Your Friendly Neighborhood: Graph Attention Design with Self-Supervision. ICLR 2021 - [c11]Eunsoo Kim, Dongkwan Kim, CheolJun Park, Insu Yun, Yongdae Kim:
BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols. NDSS 2021 - 2020
- [c10]Mingeun Kim, Dongkwan Kim, Eunsoo Kim, Suryeon Kim, Yeongjin Jang, Yongdae Kim:
FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis. ACSAC 2020: 733-745 - [i2]Dongkwan Kim, Eunsoo Kim, Sang Kil Cha, Sooel Son, Yongdae Kim:
Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned. CoRR abs/2011.10749 (2020)
2010 – 2019
- 2019
- [c9]Yeon Seonwoo, Sungjoon Park, Dongkwan Kim, Alice Oh:
Additive Compositionality of Word Vectors. W-NUT@EMNLP 2019: 387-396 - [c8]Sangsup Lee, Daejun Kim, Dongkwan Kim, Sooel Son, Yongdae Kim:
Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO. WOOT @ USENIX Security Symposium 2019 - [c7]Jooyeon Kim, Dongkwan Kim, Alice Oh:
Homogeneity-Based Transmissive Process to Model True and False News in Social Networks. WSDM 2019: 348-356 - 2018
- [j1]Byeongdo Hong, Shinjo Park, Hongil Kim, Dongkwan Kim, Hyunwook Hong, Hyunwoo Choi, Jean-Pierre Seifert, Sung-Ju Lee, Yongdae Kim:
Peeking Over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -. IEEE Trans. Mob. Comput. 17(10): 2366-2380 (2018) - [i1]Jooyeon Kim, Dongkwan Kim, Alice Oh:
Homogeneity-Based Transmissive Process to Model True and False News in Social Networks. CoRR abs/1811.09702 (2018) - 2017
- [c6]Hyunwook Hong, Hyunwoo Choi, Dongkwan Kim, Hongil Kim, Byeongdo Hong, Jiseong Noh, Yongdae Kim:
When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks. EuroS&P 2017: 595-609 - 2016
- [c5]Hyunwook Hong, Hongil Kim, Byeongdo Hong, Dongkwan Kim, Hyunwoo Choi, Eunkyu Lee, Yongdae Kim:
Pay as You Want: Bypassing Charging System in Operational Cellular Networks. WISA 2016: 148-160 - 2015
- [c4]Hongil Kim, Dongkwan Kim, Minhee Kwon, HyungSeok Han, Yeongjin Jang, Dongsu Han, Taesoo Kim, Yongdae Kim:
Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations. CCS 2015: 328-339 - [c3]Yunmok Son, Hocheol Shin, Dongkwan Kim, Young-Seok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, Yongdae Kim:
Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors. USENIX Security Symposium 2015: 881-896 - [c2]Dongkwan Kim, Suwan Park, Kibum Choi, Yongdae Kim:
BurnFit: Analyzing and Exploiting Wearable Devices. WISA 2015: 227-239 - 2014
- [c1]Shinjo Park, Suwan Park, Insu Yun, Dongkwan Kim, Yongdae Kim:
Analyzing Security of Korean USIM-Based PKI Certificate Service. WISA 2014: 95-106
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint