default search action
Jonghee M. Youn
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Seonghwan Park, Hayoung Kang, Sanghun Han, Jonghee M. Youn, Donghyun Kwon:
MECAT: Memory-Safe Smart Contracts in ARM TrustZone. IEEE Access 12: 56110-56119 (2024) - [j10]Yongseok Lee, Jonghee M. Youn, Kevin Nam, Heon Hui Jung, Myunghyun Cho, Jimyung Na, Jong-Yeon Park, Seungsu Jeon, Bo Gyeong Kang, Hyunyoung Oh, Yunheung Paek:
An Efficient Hardware/Software Co-Design for FALCON on Low-End Embedded Systems. IEEE Access 12: 57947-57958 (2024) - [e1]Howon Kim, Jonghee M. Youn:
Information Security Applications - 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers. Lecture Notes in Computer Science 14402, Springer 2024, ISBN 978-981-99-8023-9 [contents] - 2023
- [j9]Yongseok Lee, Jonghee M. Youn, Kevin Nam, Hyunyoung Oh, Yunheung Paek:
Optimizing Hardware Resource Utilization for Accelerating the NTRU-KEM Algorithm. Comput. 12(12): 259 (2023)
2010 – 2019
- 2019
- [j8]Jonghee M. Youn, Doosan Cho:
A spill data aware memory assignment technique for improving power consumption of multimedia memory systems. Multim. Tools Appl. 78(5): 5463-5478 (2019) - 2017
- [j7]Jonghee M. Youn, Doosan Cho:
Improving memory system performance for multimedia applications. Multim. Tools Appl. 76(4): 5951-5963 (2017) - [j6]Jihun Kim, Jonghee M. Youn:
Threats of Password Pattern Leakage Using Smartwatch Motion Recognition Sensors. Symmetry 9(7): 101 (2017) - [c12]Jihun Kim, Kwangman Ko, Jonghee M. Youn:
Building the De-obfuscation Platform Based on LLVM. CSA/CUTE 2017: 1269-1274 - [c11]Jihun Kim, Jonghee M. Youn:
Dynamic Analysis Bypassing Malware Detection Method Utilizing Malicious Behavior Visualization and Similarity. MUE/FutureTech 2017: 560-565 - 2016
- [c10]Jihun Kim, Seungwon Lee, Jonghee M. Youn, Haechul Choi:
A Study of Simple Classification of Malware Based on the Dynamic API Call Counts. CSA/CUTE 2016: 944-949 - 2015
- [j5]Daejin Park, Jonghee M. Youn, Jeonghun Cho:
A Low-Power Microcontroller with Accuracy-Controlled Event-Driven Signal Processing Unit for Rare-Event Activity-Sensing IoT Devices. J. Sensors 2015: 809201:1-809201:10 (2015) - [c9]Jonghee M. Youn, Doosan Cho, Yunheung Paek, Kwangman Ko:
Energy Consumption Reduction Technique on Smart Devices for Communication-Intensive Applications. CSA/CUTE 2015: 431-435 - 2013
- [j4]Jongwon Lee, Yohan Ko, Kyoungwoo Lee, Jonghee M. Youn, Yunheung Paek:
Dynamic code duplication with vulnerability awareness for soft error detection on VLIW architectures. ACM Trans. Archit. Code Optim. 9(4): 48:1-48:24 (2013) - [j3]Jongwon Lee, Jonghee M. Youn, Doosan Cho, Yunheung Paek:
Reducing instruction bit-width for low-power VLIW architectures. ACM Trans. Design Autom. Electr. Syst. 18(2): 25:1-25:32 (2013) - [c8]Seungjun Yang, Yongin Kwon, Yeongpil Cho, Hayoon Yi, Donghyun Kwon, Jonghee M. Youn, Yunheung Paek:
Fast dynamic execution offloading for efficient mobile cloud computing. PerCom 2013: 20-28 - 2012
- [c7]Jonghee M. Youn, Doosan Cho:
A Delay and Distance Aware Code Mapping Technique for Coarse-Grained Reconfigurable Array Processors. ICHIT (2) 2012: 488-495 - [c6]Jongwon Lee, Jonghee M. Youn, Jihoon Lee, Minwook Ahn, Yunheung Paek:
Dynamic Operands Insertion for VLIW Architecture with a Reduced Bit-width Instruction Set. IPDPS 2012: 119-130 - 2011
- [j2]Jonghee M. Youn, Jongwon Lee, Yunheung Paek, Jongeun Lee, Hanno Scharwächter, Rainer Leupers:
Fast graph-based instruction selection for multi-output instructions. Softw. Pract. Exp. 41(6): 717-736 (2011) - 2010
- [j1]Jonghee M. Youn, Minwook Ahn, Yunheung Paek, Jongwung Kim, Jeonghun Cho:
Two versions of architectures for dynamic implied addressing mode. J. Syst. Archit. 56(8): 368-383 (2010) - [c5]Jonghee M. Youn, Jongwon Lee, Yunheung Paek, Jongwung Kim, Jeonghun Cho:
Implementing dynamic implied addressing mode for multi-output instructions. CASES 2010: 87-96
2000 – 2009
- 2009
- [c4]Minwook Ahn, Jonghee M. Youn, Youngkyu Choi, Doosan Cho, Yunheung Paek:
Iterative Algorithm for Compound Instruction Selection with Register Coalescing. DSD 2009: 513-520 - [c3]Jonghee M. Youn, Daeho Kim, Minwook Ahn, Yongjoo Kim, Yunheung Paek:
Orthogonal Instruction Encoding for a 16-bit Embedded Processor with Dynamic Implied Addressing Mode. HPCC 2009: 545-550 - [c2]Jonghee M. Youn, Minwook Ahn, Daeho Kim, Jonghee W. Yoon, Yunheung Paek, Sechul Shin, Hochang Chae, Jeonghun Cho:
A new addressing mode for the encoding space problem on embedded processors. SASP 2009: 58-61 - 2007
- [c1]Hanno Scharwächter, Jonghee M. Youn, Rainer Leupers, Yunheung Paek, Gerd Ascheid, Heinrich Meyr:
A code-generator generator for multi-output instructions. CODES+ISSS 2007: 131-136
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 02:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint