Efficient privacy-preserving matrix factorization via fully homomorphic encryption S Kim, J Kim, D Koo, Y Kim, H Yoon, J Shin Proceedings of the 11th ACM on Asia conference on computer and …, 2016 | 75 | 2016 |
Reducing IPTV channel zapping time based on viewer’s surfing behavior and preference Y Kim, JK Park, HJ Choi, S Lee, H Park, J Kim, Z Lee, K Ko 2008 IEEE International Symposium on Broadband Multimedia Systems and …, 2008 | 74 | 2008 |
{Hardware-Assisted}{On-Demand} Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices Y Cho, J Shin, D Kwon, MJ Ham, Y Kim, Y Paek 2016 USENIX Annual Technical Conference (USENIX ATC 16), 565-578, 2016 | 64 | 2016 |
Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption J Kim, D Koo, Y Kim, H Yoon, J Shin, S Kim ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-30, 2018 | 61 | 2018 |
Efficient transfer learning schemes for personalized language modeling using recurrent neural network S Yoon, H Yun, Y Kim, G Park, K Jung Workshops at the Thirty-First AAAI Conference on Artificial Intelligence, 2017 | 44 | 2017 |
binOb+ a framework for potent and stealthy binary obfuscation B Lee, Y Kim, J Kim Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010 | 24 | 2010 |
LT-OLSR: Attack-tolerant OLSR against link spoofing Y Jeon, TH Kim, Y Kim, J Kim 37th Annual IEEE Conference on Local Computer Networks, 216-219, 2012 | 20 | 2012 |
A distributed energy-efficient clustering scheme for deploying IDS in MANETs Y Kim, KY Jung, TH Kim, J Kim Telecommunication Systems, 1-12, 2011 | 11 | 2011 |
Web prefetching using display-based prediction Y Kim, J Kim Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003 …, 2003 | 11 | 2003 |
PolyI-D: polymorphic worm detection based on instruction distribution K Lee, Y Kim, S Hong, J Kim Information Security Applications, 45-59, 2007 | 5 | 2007 |
AdaFF: Adaptive Failure-Handling Framework for Composite Web Services KIM Yuna, WY Lee, KH Kim, KIM Jong IEICE TRANSACTIONS on Information and Systems 93 (4), 834-842, 2010 | 4 | 2010 |
Allowing user-specified failure handling in web services composition Y Kim, J Kim Proceedings of the 2nd international conference on Ubiquitous information …, 2008 | 4 | 2008 |
Power-aware Real-time Task Scheduling in Dependable Embedded Systems KH Kim, Y Kim, J Kim IEMEK Journal of Embedded Systems and Applications 3 (1), 25-29, 2008 | 2 | 2008 |
Exclusion of Forged Files from Multi-source Downloadable P2P Systems Y Kim, J Kim, J You, H Park 2009 International Conference on Advanced Information Networking and …, 2009 | | 2009 |