default search action
Brian Kim
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Kai Chih Chang, Haoran Niu, Brian Kim, K. Suzanne Barber:
IoT Privacy Risks Revealed. Entropy 26(7): 561 (2024) - [c19]Joshua Groen, Mauro Belgiovine, Utku Demir, Brian Kim, Kaushik R. Chowdhury:
TRACTOR: Traffic Analysis and Classification Tool for Open RAN. ICC 2024: 4894-4899 - [c18]Chinenye Tassie, Brian Kim, Joshua Groen, Mauro Belgiovine, Kaushik R. Chowdhury:
Leveraging Explainable AI for Reducing Queries of Performance Indicators in Open RAN. ICC 2024: 5413-5418 - [c17]Azuka J. Chiejina, Brian Kim, Kaushik Chowhdury, Vijay K. Shah:
System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks. WISEC 2024: 237-247 - [i11]Azuka J. Chiejina, Brian Kim, Kaushik Chowhdury, Vijay K. Shah:
System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks. CoRR abs/2402.06846 (2024) - 2023
- [c16]Naveen Naik Sapavath, Brian Kim, Kaushik R. Chowdhury, Vijay K. Shah:
Experimental Study of Adversarial Attacks on ML-Based xApps in O-RAN. GLOBECOM 2023: 6352-6357 - [c15]Joshua Groen, Brian Kim, Kaushik R. Chowdhury:
The Cost of Securing O-RAN. ICC 2023: 5444-5449 - [i10]Naveen Naik Sapavath, Brian Kim, Kaushik R. Chowdhury, Vijay K. Shah:
Experimental Study of Adversarial Attacks on ML-based xApps in O-RAN. CoRR abs/2309.03844 (2023) - [i9]Joshua Groen, Mauro Belgiovine, Utku Demir, Brian Kim, Kaushik R. Chowdhury:
TRACTOR: Traffic Analysis and Classification Tool for Open RAN. CoRR abs/2312.07896 (2023) - 2022
- [b1]Brian Kim:
Adversarial Machine Learning in Wireless Communication Systems. University of Maryland, College Park, MD, USA, 2022 - [j10]Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus:
Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas. Entropy 24(8): 1047 (2022) - [j9]Brian Kim, Moses Ogwal, Enos Sande, Herbert Kiyingi, David Serwadda, Wolfgang Hladik:
Using geographical data and rolling statistics for diagnostics of respondent-driven sampling. Soc. Networks 69: 74-83 (2022) - [j8]Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus:
Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless Signal Classifiers. IEEE Trans. Wirel. Commun. 21(6): 3868-3880 (2022) - [c14]Brian Kim, Tugba Erpek, Yalin E. Sagduyu, Sennur Ulukus:
Covert Communications via Adversarial Machine Learning and Reconfigurable Intelligent Surfaces. WCNC 2022: 411-416 - 2021
- [c13]Brian Kim, Yi Shi, Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus:
Adversarial Attacks against Deep Learning Based Power Control in Wireless Communications. GLOBECOM (Workshops) 2021: 1-6 - [c12]Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus:
Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers. ICC 2021: 1-6 - [c11]Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus:
Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G And Beyond. SSP 2021: 590-594 - [i8]Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus:
Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G and Beyond. CoRR abs/2103.13989 (2021) - [i7]Brian Kim, Yi Shi, Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus:
Adversarial Attacks against Deep Learning Based Power Control in Wireless Communications. CoRR abs/2109.08139 (2021) - [i6]Brian Kim, Tugba Erpek, Yalin E. Sagduyu, Sennur Ulukus:
Covert Communications via Adversarial Machine Learning and Reconfigurable Intelligent Surfaces. CoRR abs/2112.11414 (2021) - 2020
- [c10]Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus:
How to Make 5G Communications "Invisible": Adversarial Machine Learning for Wireless Privacy. ACSSC 2020: 763-767 - [c9]Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus:
Over-the-Air Adversarial Attacks on Deep Learning Based Modulation Classifier over Wireless Channels. CISS 2020: 1-6 - [c8]Moein Enayati, Heather A. Heaton, Rona Wang, Gomathi Marisamy, Nasibeh Zanjirani Farahani, Thomas R. Hellmich, Kalyan S. Pasupathy, Brian Kim, David M. Nestler:
Trauma Activation Responsiveness: An RFID-enabled trauma flowsheet. EMBC 2020: 5718-5721 - [c7]Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus:
Adversarial Attacks with Multiple Antennas Against Deep Learning-Based Modulation Classifiers. GLOBECOM (Workshops) 2020: 1-6 - [c6]Shiyun Lin, Ding Wang, Ferdous Khan, Jeannie Chen, Alex Nickel, Brian Kim, Yasuhiro Matsui, Bruce Young, Martin Kwakernaak, Glen Carey, Tsurugi Sudo:
Grating Coupled Laser (GCL) for Si Photonics. OFC 2020: 1-3 - [i5]Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus:
Over-the-Air Adversarial Attacks on Deep Learning Based Modulation Classifier over Wireless Channels. CoRR abs/2002.02400 (2020) - [i4]Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus:
Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless Signal Classifiers. CoRR abs/2005.05321 (2020) - [i3]Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus:
How to Make 5G Communications "Invisible": Adversarial Machine Learning for Wireless Privacy. CoRR abs/2005.07675 (2020) - [i2]Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus:
Adversarial Attacks with Multiple Antennas Against Deep Learning-Based Modulation Classifiers. CoRR abs/2007.16204 (2020) - [i1]Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus:
Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers. CoRR abs/2012.02160 (2020)
2010 – 2019
- 2019
- [c5]Siavash Khodadadeh, Sharare Zehtabian, Jonathan Guilbe, Ross Pearlman, Bradley J. Willenberg, Brian Kim, Edward A. Ross, Ladislau Bölöni, Damla Turgut:
Detecting Unsafe Use of a Four-Legged Walker using IoT and Deep Learning. ICC 2019: 1-6 - 2018
- [j7]Stanislav Culaclii, Brian Kim, Yi-Kai Lo, Lin Li, Wentai Liu:
Online Artifact Cancelation in Same-Electrode Neural Stimulation and Recording Using a Combined Hardware and Software Architecture. IEEE Trans. Biomed. Circuits Syst. 12(3): 601-613 (2018) - 2017
- [j6]Brian Kim, Anubav Vasudevan:
How to expect a surprising exam. Synth. 194(8): 3101-3133 (2017) - [j5]Yi-Kai Lo, Yen-Cheng Kuan, Stanislav Culaclii, Brian Kim, Po-Min Wang, Chih-Wei Chang, Jonathan A. Massachi, Minji Zhu, Kuanfu Chen, Parag Gad, V. Reggie Edgerton, Wentai Liu:
A Fully Integrated Wireless SoC for Motor Function Recovery After Spinal Cord Injury. IEEE Trans. Biomed. Circuits Syst. 11(3): 497-509 (2017) - [j4]Brian Kim, Kostas E. Psannis, Harish Bhaskar:
Special section on emerging multimedia technology for smart surveillance system with IoT environment. J. Supercomput. 73(3): 923-925 (2017) - 2016
- [c4]Stanislav Culaclii, Brian Kim, Yi-Kai Lo, Wentai Liu:
A hybrid hardware and software approach for cancelling stimulus artifacts during same-electrode neural stimulation and recording. EMBC 2016: 6190-6193 - [c3]Yi-Kai Lo, Chih-Wei Chang, Yen-Cheng Kuan, Stanislav Culaclii, Brian Kim, Kuanfu Chen, Parag Gad, V. Reggie Edgerton, Wentai Liu:
22.2 A 176-channel 0.5cm3 0.7g wireless implant for motor function recovery after spinal cord injury. ISSCC 2016: 382-383 - 2015
- [c2]Brian Kim:
Solving the HI-LO Puzzle. LORI 2015: 421-425 - 2014
- [j3]Dan Ismailescu, Brian Kim:
Packing and Covering with Centrally Symmetric Convex Disks. Discret. Comput. Geom. 51(2): 495-508 (2014) - [j2]Brian Kim:
The locality and globality of instrumental rationality: the normative significance of preference reversals. Synth. 191(18): 4353-4376 (2014)
2000 – 2009
- 2007
- [c1]Manseok Yang, Sun Sup So, Steve Eun, Brian Kim, Jinchun Kim:
Sensos: A Sensor Node Operating System with a Device Management Scheme for Sensor Nodes. ITNG 2007: 134-139
1990 – 1999
- 1999
- [j1]David R. Karger, Alex Sherman, Andy Berkheimer, Bill Bogstad, Rizwan Dhanidina, Ken Iwamoto, Brian Kim, Luke Matkins, Yoav Yerushalmi:
Web Caching with Consistent Hashing. Comput. Networks 31(11-16): 1203-1213 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint