default search action
Junsoo Kim 0001
Person information
- affiliation: Seoul National University of Science and Technology, Seoul, South Korea
Other persons with the same name
- Junsoo Kim — disambiguation page
- Junsoo Kim 0002 — Korea Advanced Institute of Science and Technology, Daejeon, South Korea
- Junsoo Kim 0003 — Pohang University of Science and Technology, Pohang, Korea
- Junsoo Kim 0004 — Hyundai Motor Company, Seoul, Korea
- Junsoo Kim 0005 — Harvard University, Cambridge, MA, USA
- Junsoo Kim 0006 — Japan Advanced Institute of Science and Technology, Ishikawa, Japan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j9]Junsoo Kim:
Further Methods for Encrypted Linear Dynamic Controllers Utilizing Re-Encryption. IEEE Trans. Autom. Control. 69(10): 6974-6979 (2024) - 2023
- [j8]Rijad Alisic, Junsoo Kim, Henrik Sandberg:
Model-Free Undetectable Attacks on Linear Systems Using LWE-Based Encryption. IEEE Control. Syst. Lett. 7: 1249-1254 (2023) - [j7]Donggil Lee, Junsoo Kim, Hyungbo Shim:
Distributed Resilient Observer: Blended Dynamics Theory Meets ℓ1-Minimization Approach. IEEE Control. Syst. Lett. 7: 2083-2088 (2023) - [j6]Junsoo Kim, Hyungbo Shim, Kyoohyung Han:
Dynamic Controller That Operates Over Homomorphically Encrypted Data for Infinite Time Horizon. IEEE Trans. Autom. Control. 68(2): 660-672 (2023) - 2022
- [j5]Junsoo Kim, Dongwoo Kim, Yongsoo Song, Hyungbo Shim, Henrik Sandberg, Karl Henrik Johansson:
Comparison of encrypted control approaches and tutorial on dynamic systems using Learning With Errors-based homomorphic encryption. Annu. Rev. Control. 54: 200-218 (2022) - [j4]Jin Gyu Lee, Junsoo Kim:
Mixed analog-digital method of designing a heterogeneous network with the desired collective behavior and rapid convergence. Syst. Control. Lett. 160: 105126 (2022) - 2020
- [j3]Jin Gyu Lee, Junsoo Kim, Hyungbo Shim:
Fully Distributed Resilient State Estimation Based on Distributed Median Solver. IEEE Trans. Autom. Control. 65(9): 3935-3942 (2020) - 2019
- [j2]Junsoo Kim, Chanhwa Lee, Hyungbo Shim, Yongsoon Eun, Jin Heon Seo:
Detection of Sensor Attack and Resilient State Estimation for Uniformly Observable Nonlinear Systems having Redundant Sensors. IEEE Trans. Autom. Control. 64(3): 1162-1169 (2019) - 2018
- [j1]Jung Hee Cheon, Kyoohyung Han, Seong-Min Hong, Hyoun Jin Kim, Junsoo Kim, Suseong Kim, Hosung Seo, Hyungbo Shim, Yongsoo Song:
Toward a Secure Drone System: Flying With Real-Time Homomorphic Authenticated Encryption. IEEE Access 6: 24325-24339 (2018)
Conference and Workshop Papers
- 2024
- [c13]Nils Schlüter, Junsoo Kim, Moritz Schulze Darup:
A Code-Driven Tutorial on Encrypted Control: From Pioneering Realizations to Modern Implementations. ECC 2024: 914-920 - [c12]Anne van der Horst, Michelle S. Chong, Junsoo Kim, Henrik Sandberg:
Resilient Nonlinear State Estimation Using the Median Operation for a Network of Droop-Controlled Power Inverters. ECC 2024: 3070-3076 - 2023
- [c11]Joowon Lee, Donggil Lee, Seungbeom Lee, Junsoo Kim, Hyungbo Shim:
Conversion of Controllers to have Integer State Matrix for Encrypted Control: Non-Minimal Order Approach. CDC 2023: 5091-5096 - 2022
- [c10]Nils Schlüter, Philipp Binfet, Junsoo Kim, Moritz Schulze Darup:
Encrypted distributed state estimation via affine averaging. CDC 2022: 7754-7761 - [c9]Junsoo Kim, Moritz Schulze Darup, Henrik Sandberg, Karl Henrik Johansson:
Asymptotic Stabilization over Encrypted Data with Limited Controller Capacity and Time-varying Quantizer. CDC 2022: 7762-7767 - 2021
- [c8]Junsoo Kim, Hyungbo Shim, Henrik Sandberg, Karl Henrik Johansson:
Method for Running Dynamic Systems over Encrypted Data for Infinite Time Horizon without Bootstrapping and Re-encryption. CDC 2021: 5614-5619 - 2020
- [c7]Jung Hee Cheon, Dongwoo Kim, Junsoo Kim, Seungbeom Lee, Hyungbo Shim:
Authenticated Computation of Control Signal from Dynamic Controllers. CDC 2020: 3249-3254 - [c6]Junsoo Kim, Hyungbo Shim, Kyoohyung Han:
Design Procedure for Dynamic Controllers based on LWE-based Homomorphic Encryption to Operate for Infinite Time Horizon. CDC 2020: 5463-5468 - [c5]Donggil Lee, Junsoo Kim, Hyungbo Shim:
Distributed Aggregation over Homomorphically Encrypted Data under Switching Networks. CDC 2020: 5495-5500 - 2019
- [c4]Junsoo Kim, Hyungbo Shim:
Encrypted State Estimation in Networked Control Systems. CDC 2019: 7190-7195 - 2018
- [c3]Junsoo Kim, Jin Gyu Lee, Chanhwa Lee, Hyungbo Shim, Jin Heon Seo:
Local Identification of Sensor Attack and Distributed Resilient State Estimation for Linear Systems. CDC 2018: 2056-2061 - [c2]Jung Hee Cheon, Kyoohyung Han, Hyuntae Kim, Junsoo Kim, Hyungbo Shim:
Need for Controllers Having Integer Coefficients in Homomorphically Encrypted Dynamic System. CDC 2018: 5020-5025 - 2016
- [c1]Junsoo Kim, Chanhwa Lee, Hyungbo Shim, Yongsoon Eun, Jin Heon Seo:
Detection of sensor attack and resilient state estimation for uniformly observable nonlinear systems. CDC 2016: 1297-1302
Informal and Other Publications
- 2024
- [i12]Yeongjun Jang, Joowon Lee, Junsoo Kim, Hyungbo Shim:
Learning with errors based dynamic encryption that discloses residue signal for anomaly detection. CoRR abs/2404.02574 (2024) - [i11]Nils Schlüter, Junsoo Kim, Moritz Schulze Darup:
A code-driven tutorial on encrypted control: From pioneering realizations to modern implementations. CoRR abs/2404.04727 (2024) - [i10]Yeongjun Jang, Joowon Lee, Seonhong Min, Hyesun Kwak, Junsoo Kim, Yongsoo Song:
Ring-LWE based encrypted controller with unlimited number of recursive multiplications and effect of error growth. CoRR abs/2406.14372 (2024) - 2023
- [i9]Junsoo Kim, Jin Gyu Lee, Henrik Sandberg, Karl Henrik Johansson:
Complexity reduction for resilient state estimation of uniformly observable nonlinear systems. CoRR abs/2304.08983 (2023) - [i8]Joowon Lee, Donggil Lee, Junsoo Kim, Hyungbo Shim:
Encrypted Dynamic Control exploiting Limited Number of Multiplications and a Method using Ring-LWE based Cryptosystem. CoRR abs/2307.03451 (2023) - 2022
- [i7]Nils Schlüter, Philipp Binfet, Junsoo Kim, Moritz Schulze Darup:
Encrypted distributed state estimation via affine averaging. CoRR abs/2209.07206 (2022) - [i6]Junsoo Kim, Dongwoo Kim, Yongsoo Song, Hyungbo Shim, Henrik Sandberg, Karl Henrik Johansson:
Comparison of encrypted control approaches and tutorial on dynamic systems using LWE-based homomorphic encryption. CoRR abs/2210.05560 (2022) - 2021
- [i5]Junsoo Kim, Farhad Farokhi, Iman Shames, Hyungbo Shim:
Toward nonlinear dynamic control over encrypted data for infinite time horizon. CoRR abs/2110.06270 (2021) - 2020
- [i4]Jin Gyu Lee, Junsoo Kim, Hyungbo Shim:
Fully Distributed Resilient State Estimation based on Distributed Median Solver. CoRR abs/2002.06605 (2020) - 2019
- [i3]Junsoo Kim, Hyungbo Shim, Kyoohyung Han:
Comprehensive Introduction to Fully Homomorphic Encryption for Dynamic Feedback Controller via LWE-based Cryptosystem. CoRR abs/1904.08025 (2019) - [i2]Junsoo Kim, Hyungbo Shim, Kyoohyung Han:
Dynamic Controller that Operates over Homomorphically Encrypted Data for Infinite Time Horizon. CoRR abs/1912.07362 (2019) - 2018
- [i1]Junsoo Kim, Chanhwa Lee, Hyungbo Shim, Yongsoon Eun, Jin Heon Seo:
Detection of Sensor Attack and Resilient State Estimation for Uniformly Observable Nonlinear Systems having Redundant Sensors. CoRR abs/1805.07944 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint