default search action
Ki-Woong Park
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Sung-Kyu Ahn, HyeLim Jung, Ki-Woong Park:
LazyFrog: Advancing Security and Efficiency in Commercial Wireless Charging with Adaptive Frequency Hopping. Sensors 24(8): 2571 (2024) - [j33]Se-Han Lee, Kyungshin Kim, Youngsoo Kim, Ki-Woong Park:
MTD-Diorama: Moving Target Defense Visualization Engine for Systematic Cybersecurity Strategy Orchestration. Sensors 24(13): 4369 (2024) - [j32]Joo-Young Roh, Sang-Hoon Choi, Ki-Woong Park:
OOSP: Opportunistic Optimization Scheme for Pod Deployment Enhanced with Multilayered Sensing. Sensors 24(19): 6244 (2024) - [i1]Junho Myung, Nayeon Lee, Yi Zhou, Jiho Jin, Rifki Afina Putri, Dimosthenis Antypas, Hsuvas Borkakoty, Eunsu Kim, Carla Pérez-Almendros, Abinew Ali Ayele, Víctor Gutiérrez-Basulto, Yazmín Ibáñez-García, Hwaran Lee, Shamsuddeen Hassan Muhammad, Ki-Woong Park, Anar Sabuhi Rzayev, Nina White, Seid Muhie Yimam, Mohammad Taher Pilehvar, Nedjma Ousidhoum, José Camacho-Collados, Alice Oh:
BLEnD: A Benchmark for LLMs on Everyday Knowledge in Diverse Cultures and Languages. CoRR abs/2406.09948 (2024) - 2023
- [j31]Sung-Kyung Kim, Eun-Tae Jang, Hanjin Park, Ki-Woong Park:
Pwnable-Sherpa: An interactive coaching system with a case study of pwnable challenges. Comput. Secur. 125: 103009 (2023) - [c37]Joo-Young Roh, Sang-Hoon Choi, Ki-Woong Park:
CO-TRIS: Container Orchestration - Transforming container using Resource Inspection System. AIKE 2023: 121-124 - [c36]Sung-Kyu Ahn, Sang-Hoon Choi, Ki-Woong Park:
Side-Channel Based Device Authentication in Wireless Charging: An Experimental Study. AIKE 2023: 125-128 - [c35]HyeLim Jung, Sang-Hoon Choi, Mohsen Ali Alawami, Sung-Kyu Ahn, Ki-Woong Park:
I Know Where You Are: A Non-intrusive Geospatial-Electrical Authentication System. AIKE 2023: 129-132 - 2022
- [j30]Sang-Hoon Choi, Ki-Woong Park:
Cloud-BlackBox: Toward practical recording and tracking of VM swarms for multifaceted cloud inspection. Future Gener. Comput. Syst. 137: 219-233 (2022) - [j29]Ki-Wan Kang, Jung-Taek Seo, Sung Hoon Baek, Chul-Woo Kim, Ki-Woong Park:
SD-MTD: Software-Defined Moving-Target Defense for Cloud-System Obfuscation. KSII Trans. Internet Inf. Syst. 16(3): 1063-1075 (2022) - [j28]Sang-Hoon Choi, Ki-Woong Park:
iContainer: Consecutive checkpointing with rapid resilience for immortal container-based services. J. Netw. Comput. Appl. 208: 103494 (2022) - 2021
- [j27]Keon-Ho Park, Seong-Jin Kim, Joobeom Yun, Seung-Ho Lim, Ki-Woong Park:
FLEX-IoT: Secure and Resource-Efficient Network Boot System for Flexible-IoT Platform. Sensors 21(6): 2060 (2021) - 2020
- [j26]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods. IEICE Trans. Inf. Syst. 103-D(4): 879-882 (2020) - [j25]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks. IEICE Trans. Inf. Syst. 103-D(4): 883-887 (2020) - [j24]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
Acoustic-decoy: Detection of adversarial examples through audio modification on speech recognition system. Neurocomputing 417: 357-370 (2020) - [j23]Sung Hoon Baek, Ki-Woong Park:
Compatible byte-addressable direct I/O for peripheral memory devices in Linux. Inf. Syst. 91: 101488 (2020) - [j22]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
CAPTCHA Image Generation: Two-Step Style-Transfer Learning in Deep Neural Networks. Sensors 20(5): 1495 (2020) - [j21]Sung Hoon Baek, Ki-Woong Park:
A Durable Hybrid RAM Disk with a Rapid Resilience for Sustainable IoT Devices. Sensors 20(8): 2159 (2020) - [j20]Seung-Ho Lim, Ki-Woong Park:
Compression-Assisted Adaptive ECC and RAID Scattering for NAND Flash Storage Devices. Sensors 20(10): 2952 (2020) - [c34]Sungjoon Park, Ki-Woong Park, Jaimeen Ahn, Alice Oh:
Suicidal Risk Detection for Military Personnel. EMNLP (1) 2020: 2523-2531 - [c33]Ki-Wan Kang, Ki-Woong Park:
Toward Software-Defined Moving Target Defense for Secure Service Deployment Enhanced with a User-Defined Orchestration. ICEA 2020: 23:1-23:5 - [c32]Seong-Jin Kim, Ki-Woong Park:
Blueprint for a Secure Container to Protect Data in Edge Cloud Computing Environment. ICEA 2020: 33:1-33:3 - [c31]Namjun Kim, Chanmo Yang, Daebeom Cho, Seung Hyeon Geum, Ki-Woong Park:
CERT Training Platform over the Event-Recordable Container. ICEA 2020: 39:1-39:6 - [c30]Hyun Kwon, Jungmin Roh, Hyunsoo Yoon, Ki-Woong Park:
TargetNet Backdoor: Attack on Deep Neural Network with Use of Different Triggers. ICIIT 2020: 140-145 - [c29]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
FriendNet Backdoor: Indentifying Backdoor Attack that is safe for Friendly Deep Neural Network. ICSIM 2020: 53-57 - [c28]Sung-Kyung Kim, Eun-Tae Jang, Ki-Woong Park:
Toward a Fine-Grained Evaluation of the Pwnable CTF. WISA 2020: 179-190
2010 – 2019
- 2019
- [j19]Hye Lim Jeong, Sung-Kyu Ahn, Sung Hoon Baek, Ki-Woong Park:
Anomaly Detection Technology Using Potential Difference Displacement Detection of Data Bus. J. Internet Serv. Inf. Secur. 9(4): 68-77 (2019) - [j18]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
Selective Poisoning Attack on Deep Neural Networks †. Symmetry 11(7): 892 (2019) - [j17]Sieun Kim, Taek-Young Youn, Daeseon Choi, Ki-Woong Park:
UAV-Undertaker: Securely Verifiable Remote Erasure Scheme with a Countdown-Concept for UAV via Randomized Data Synchronization. Wirel. Commun. Mob. Comput. 2019: 8913910:1-8913910:11 (2019) - [c27]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
Selective Poisoning Attack on Deep Neural Network to Induce Fine-Grained Recognition Error. AIKE 2019: 136-139 - [c26]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
POSTER: Detecting Audio Adversarial Example through Audio Modification. CCS 2019: 2521-2523 - [c25]Hyun Kwon, Ohmin Kwon, Hyunsoo Yoon, Ki-Woong Park:
Face Friend-Safe Adversarial Example on Face Recognition System. ICUFN 2019: 547-551 - [c24]Seung-Ho Lim, Ki-Woong Park, Kwangho Cha:
Developing an OpenSHMEM Model Over a Switchless PCIe Non-Transparent Bridge Interface. IPDPS Workshops 2019: 593-602 - [c23]Sung-Kyung Kim, Eun-Tae Jang, Seung-Ho Lim, Ki-Woong Park:
Reduction of Data Leakage Using Software Streaming. MobiSec 2019: 99-111 - [c22]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network. WISA 2019: 234-246 - 2018
- [j16]Hyun Kwon, Yongchul Kim, Ki-Woong Park, Hyunsoo Yoon, Daeseon Choi:
Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network. IEEE Access 6: 46084-46096 (2018) - [j15]Hyun Kwon, Yongchul Kim, Ki-Woong Park, Hyunsoo Yoon, Daeseon Choi:
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier. Comput. Secur. 78: 380-397 (2018) - [j14]Heejin Park, Pyung Kim, Heeyoul Kim, Ki-Woong Park, Younho Lee:
Efficient machine learning over encrypted data with non-interactive communication. Comput. Stand. Interfaces 58: 87-108 (2018) - [j13]Hyun Kwon, Yongchul Kim, Ki-Woong Park, Hyunsoo Yoon, Daeseon Choi:
Advanced Ensemble Adversarial Example on Unknown Deep Neural Network Classifiers. IEICE Trans. Inf. Syst. 101-D(10): 2485-2500 (2018) - [j12]Heeyoul Kim, Ki-Woong Park, Daeseon Choi, Younho Lee:
Estimating Resident Registration Numbers of Individuals in Korea: Revisited. KSII Trans. Internet Inf. Syst. 12(6): 2946-2959 (2018) - [c21]Ki-Woong Park, Daeseon Choi, Woo-Jin Jeon:
Applying Time-Lapse Concepts onto Storage System for Long-Term System Trace Analysis: Technical Challenges and Blueprints. AIKE 2018: 201-203 - 2017
- [j11]Joobeom Yun, Ki-Woong Park, Young-joo Shin, Hee-Dong Kim:
An efficient stream cipher for resistive RAM. IEICE Electron. Express 14(7): 20170179 (2017) - [j10]Ki-Woong Park, Sung Hoon Baek:
OPERA: A Complete Offline and Anonymous Digital Cash Transaction System with a One-Time Readable Memory. IEICE Trans. Inf. Syst. 100-D(10): 2348-2356 (2017) - [j9]Sang-Hoon Choi, Joobeom Yun, Ki-Woong Park:
Doc-Trace: Tracing Secret Documents in Cloud Computing via Steganographic Marking. IEICE Trans. Inf. Syst. 100-D(10): 2373-2376 (2017) - [j8]Ki-Woong Park, Younho Lee, Sung Hoon Baek:
Energy-Efficient Hosting Rich Content from Mobile Platforms with Relative Proximity Sensing. Sensors 17(8): 1828 (2017) - 2016
- [j7]Sung Hoon Baek, Ki-Woong Park:
A fully persistent and consistent read/write cache using flash-based general SSDs for desktop workloads. Inf. Syst. 58: 24-42 (2016) - 2015
- [j6]Sung Hoon Baek, Ki-Woong Park:
Parity Resynchronization using a Block-level Journaling for Software RAID. Inf. Syst. 54: 28-42 (2015) - [j5]Woomin Hwang, Ki-Woong Park, Kyu Ho Park:
Reference Pattern-Aware Instant Memory Balancing for Consolidated Virtual Machineson Manycores. IEEE Trans. Parallel Distributed Syst. 26(7): 2036-2050 (2015) - [c20]Taegyu Kim, Woomin Hwang, Chulmin Kim, Dong-Jae Shin, Ki-Woong Park, Kyu Ho Park:
Malfinder: Accelerated Malware Classification System through Filtering on Manycore System. ICISSP 2015: 17-26 - [c19]Taegyu Kim, Ki-Woong Park:
MalCore: Toward a Practical Malware Identification System Enhanced with Manycore Technology. ICISSP (Revised Selected Papers) 2015: 31-48 - 2014
- [j4]Sung Kyu Park, Min Kyu Maeng, Ki-Woong Park, Kyu Ho Park:
Adaptive wear-leveling algorithm for PRAM main memory with a DRAM buffer. ACM Trans. Embed. Comput. Syst. 13(4): 88:1-88:25 (2014) - [c18]Taegyu Kim, Woomin Hwang, Ki-Woong Park, Kyu Ho Park:
I-Filter: Identical Structured Control Flow String filter for accelerated malware variant classification. ISBAST 2014: 225-231 - 2013
- [j3]Ki-Woong Park, Jaesun Han, JaeWoong Chung, Kyu Ho Park:
THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment. IEEE Trans. Serv. Comput. 6(3): 300-313 (2013) - [c17]Yong Song, Woomin Hwang, Ki-Woong Park, Kyu Ho Park:
Microscopic Bit-Level Wear-Leveling for NAND Flash Memory. MUSIC 2013: 315-320 - 2012
- [c16]Jong Hun Choi, Seong-Min Kim, Chulmin Kim, Ki-Woong Park, Kyu Ho Park:
OPAMP: Evaluation Framework for Optimal Page Allocation of Hybrid Main Memory Architecture. ICPADS 2012: 620-627 - [c15]Chulmin Kim, Ki-Woong Park, Kyu Ho Park:
GHOST: GPGPU-offloaded high performance storage I/O deduplication for primary storage system. PMAM 2012: 17-26 - [c14]Kyu Ho Park, Sung Kyu Park, Hyunchul Seok, Woomin Hwang, Dong-Jae Shin, Jong Hun Choi, Ki-Woong Park:
Efficient memory management of a hierarchical and a hybrid main memory for MN-MATE platform. PMAM 2012: 83-92 - [c13]Kyu Ho Park, Sung Kyu Park, Woomin Hwang, Hyunchul Seok, Dong-Jae Shin, Ki-Woong Park:
Resource Management of Manycores with a Hierarchical and a Hybrid Main Memory for MN-MATE Cloud Node. SERVICES 2012: 301-308 - 2011
- [j2]Ki-Woong Park, Kyu Ho Park:
ACCENT: Cognitive cryptography plugged compression for SSL/TLS-based cloud computing services. ACM Trans. Internet Techn. 11(2): 7:1-7:31 (2011) - [c12]Woomin Hwang, Ki-Woong Park, Kyu Ho Park:
MN-GEMS: A Timing-Aware Simulator for a Cloud Node with Manycore, DRAM, and Non-volatile Memories. IEEE CLOUD 2011: 734-735 - 2010
- [c11]Ki-Woong Park, Sung Kyu Park, Jaesun Han, Kyu Ho Park:
THEMIS: Towards Mutually Verifiable Billing Transactions in the Cloud Computing Environment. IEEE CLOUD 2010: 139-147 - [c10]Woomin Hwang, Yangwoo Roh, Youngwoo Park, Ki-Woong Park, Kyu Ho Park:
HyperDealer: Reference-Pattern-Aware Instant Memory Balancing for Consolidated Virtual Machines. IEEE CLOUD 2010: 426-434 - [c9]Ki-Woong Park, Woomin Hwang, Kyu Ho Park:
FalconEye: Data Center Status Extraction via Vision Transformation Techniques. COMPSAC Workshops 2010: 388-392 - [c8]Ki-Woong Park, Byung-Cheol Kim, Jong-Woon Yoo, Kyu Ho Park, KwangYun Wohn:
Enabling sportive games with a do-it-yourself wearable computing platform. ICE-GIC 2010: 70-76 - [c7]Jong-Woon Yoo, Ki-Woong Park, Sung Kyu Park, Hyunchul Seok, Kyu Ho Park:
PokerFace: Game players themselves are truly memorable. ICE-GIC 2010: 159-163 - [c6]Kyu Ho Park, Youngwoo Park, Woomin Hwang, Ki-Woong Park:
MN-Mate: Resource Management of Manycores with DRAM and Nonvolatile Memories. HPCC 2010: 24-34 - [c5]Ki-Woong Park, Chulmin Kim, Kyu Ho Park:
BLAST: Applying Streaming Ciphers Into Outsourced Cloud Storage. ICPADS 2010: 431-437
2000 – 2009
- 2009
- [c4]Jong-Woon Yoo, Woong Ho Choi, Ki-Woong Park, Kyu Ho Park:
An intuitive data transfer technique using bartender's gestures. ACM Multimedia 2009: 991-992 - 2008
- [j1]Ki-Woong Park, Sang Seok Lim, Kyu Ho Park:
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices. IEEE Trans. Computers 57(6): 821-834 (2008) - 2007
- [c3]Jupyung Lee, Seung-Ho Lim, Jong-Woon Yoo, Ki-Woong Park, Hyun-Jin Choi, Kyu Ho Park:
A Ubiquitous Fashionable Computer with an i-Throw Device on a Location-Based Service Environment. AINA Workshops (2) 2007: 59-65 - [c2]Ki-Woong Park, Hyunchul Seok, Kyu Ho Park:
pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices. AINA Workshops (2) 2007: 105-112 - [c1]Kyu Ho Park, Ki-Woong Park, Jupyung Lee, Jong-Woon Yoo, Seung-Ho Lim, Hyun-Jin Choi:
U-TOPIA: A Ubiquitous Environment with a Wearable Platform, UFC and Its Security Infrastructure, pKASSO. AmI Workshops 2007: 183-193
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint