


Остановите войну!
for scientists:
Hyunsoo Yoon
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j143]Minsoo Lee, Hyun Kwon
, Hyunsoo Yoon:
Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants. Secur. Commun. Networks 2022: 4714899:1-4714899:13 (2022) - 2021
- [j142]Moonsu Jang, Donghyun Kim, Daehee Seo, Yongmin Ju, Seungho Ryu, Hyunsoo Yoon:
An intelligent recommendation algorithm for red team strategy in edge computing powered massive Cyber Defense Exercise. Comput. Commun. 165: 141-148 (2021) - [j141]Sang-Ok Park, Ohmin Kwon, Yonggon Kim, Sang Kil Cha, Hyunsoo Yoon:
Mind control attack: Undermining deep learning with GPU memory exploitation. Comput. Secur. 102: 102115 (2021) - [j140]Hyunsoo Yoon
, Nathan Gaw:
A novel multi-task linear mixed model for smartphone-based telemonitoring. Expert Syst. Appl. 164: 113809 (2021) - [j139]Hyun Kwon
, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi
:
Classification score approach for detecting adversarial example in deep neural network. Multim. Tools Appl. 80(7): 10339-10360 (2021) - [j138]Ohmin Kwon
, Yonggon Kim
, Jaehyuk Huh
, Hyunsoo Yoon
:
ZeroKernel: Secure Context-Isolated Execution on Commodity GPUs. IEEE Trans. Dependable Secur. Comput. 18(4): 1974-1988 (2021) - 2020
- [j137]Fei Gao, Hyunsoo Yoon
, Teresa Wu, Xianghua Chu
:
A feature transfer enabled multi-task deep learning model on medical imaging. Expert Syst. Appl. 143 (2020) - [j136]Hyun Kwon
, Hyunsoo Yoon, Ki-Woong Park:
Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods. IEICE Trans. Inf. Syst. 103-D(4): 879-882 (2020) - [j135]Hyun Kwon
, Hyunsoo Yoon, Ki-Woong Park:
Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks. IEICE Trans. Inf. Syst. 103-D(4): 883-887 (2020) - [j134]Yoohwa Kang
, Changki Kim, Donghyeok An, Hyunsoo Yoon:
Multipath transmission control protocol-based multi-access traffic steering solution for 5G multimedia-centric network: Design and testbed system implementation. Int. J. Distributed Sens. Networks 16(2) (2020) - [j133]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
Acoustic-decoy: Detection of adversarial examples through audio modification on speech recognition system. Neurocomputing 417: 357-370 (2020) - [j132]Hyun Kwon
, Hyunsoo Yoon, Ki-Woong Park
:
CAPTCHA Image Generation: Two-Step Style-Transfer Learning in Deep Neural Networks. Sensors 20(5): 1495 (2020) - [j131]Hyun Kwon
, Yongchul Kim, Hyunsoo Yoon
, Daeseon Choi
:
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System. IEEE Trans. Inf. Forensics Secur. 15: 526-538 (2020) - [j130]Fei Gao
, Teresa Wu
, Xianghua Chu
, Hyunsoo Yoon
, Yanzhe Xu
, Bhavika Patel
:
Deep Residual Inception Encoder-Decoder Network for Medical Imaging Synthesis. IEEE J. Biomed. Health Informatics 24(1): 39-49 (2020) - [c84]Hyun Kwon
, Jungmin Roh, Hyunsoo Yoon, Ki-Woong Park:
TargetNet Backdoor: Attack on Deep Neural Network with Use of Different Triggers. ICIIT 2020: 140-145 - [c83]Hyun Kwon
, Hyunsoo Yoon, Ki-Woong Park:
FriendNet Backdoor: Indentifying Backdoor Attack that is safe for Friendly Deep Neural Network. ICSIM 2020: 53-57
2010 – 2019
- 2019
- [j129]Hyun Kwon
, Hyunsoo Yoon, Daeseon Choi:
Restricted Evasion Attack: Generation of Restricted-Area Adversarial Example. IEEE Access 7: 60908-60919 (2019) - [j128]Hyun Kwon
, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Selective Untargeted Evasion Attack: An Adversarial Example That Will Not Be Classified as Certain Avoided Classes. IEEE Access 7: 73493-73503 (2019) - [j127]Junyoung Son
, Jonggyun Choi, Hyunsoo Yoon:
New Complementary Points of Cyber Security Schemes for Critical Digital Assets at Nuclear Power Plants. IEEE Access 7: 78379-78390 (2019) - [j126]Ohmin Kwon, Hyun Kwon
, Hyunsoo Yoon:
Rootkit inside GPU Kernel Execution. IEICE Trans. Inf. Syst. 102-D(11): 2261-2264 (2019) - [j125]Hyun Kwon
, Hyunsoo Yoon, Ki-Woong Park
:
Selective Poisoning Attack on Deep Neural Networks †. Symmetry 11(7): 892 (2019) - [j124]Hyunsoo Yoon
, Jing Li
:
A Novel Positive Transfer Learning Approach for Telemonitoring of Parkinson's Disease. IEEE Trans Autom. Sci. Eng. 16(1): 180-191 (2019) - [j123]Sokjoon Lee, Hwajeong Seo
, Hyeokchan Kwon, Hyunsoo Yoon:
Hybrid approach of parallel implementation on CPU-GPU for high-speed ECDSA verification. J. Supercomput. 75(8): 4329-4349 (2019) - [j122]Dohoo Pyeon
, Hyunsoo Yoon:
An efficient multi-path pipeline transmission for a bulk data transfer in IEEE 802.15.4 multi-hop networks. Wirel. Networks 25(1): 117-130 (2019) - [c82]Hyun Kwon
, Hyunsoo Yoon, Ki-Woong Park:
Selective Poisoning Attack on Deep Neural Network to Induce Fine-Grained Recognition Error. AIKE 2019: 136-139 - [c81]Hyun Kwon
, Hyunsoo Yoon, Ki-Woong Park:
POSTER: Detecting Audio Adversarial Example through Audio Modification. CCS 2019: 2521-2523 - [c80]Hyun Kwon
, Hyunsoo Yoon, Daeseon Choi:
Priority Adversarial Example in Evasion Attack on Multiple Deep Neural Networks. ICAIIC 2019: 399-404 - [c79]Hyun Kwon
, Ohmin Kwon, Hyunsoo Yoon, Ki-Woong Park:
Face Friend-Safe Adversarial Example on Face Recognition System. ICUFN 2019: 547-551 - [c78]Hyun Kwon
, Hyunsoo Yoon, Ki-Woong Park:
CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network. WISA 2019: 234-246 - [i3]Fei Gao, Hyunsoo Yoon, Teresa Wu, Xianghua Chu:
A Feature Transfer Enabled Multi-Task Deep Learning Model on Medical Imaging. CoRR abs/1906.01828 (2019) - 2018
- [b1]Hyunsoo Yoon:
New Statistical Transfer Learning Models for Health Care Applications. Arizona State University, Tempe, USA, 2018 - [j121]Hyun Kwon
, Yongchul Kim, Ki-Woong Park
, Hyunsoo Yoon, Daeseon Choi:
Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network. IEEE Access 6: 46084-46096 (2018) - [j120]Hyun Kwon
, Yongchul Kim, Ki-Woong Park
, Hyunsoo Yoon, Daeseon Choi
:
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier. Comput. Secur. 78: 380-397 (2018) - [j119]Hyun Kwon
, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
CAPTCHA Image Generation Systems Using Generative Adversarial Networks. IEICE Trans. Inf. Syst. 101-D(2): 543-546 (2018) - [j118]Hyungkyu Lee, Younho Lee, Changho Seo, Hyunsoo Yoon:
Efficient Approach for Mitigating Mobile Phishing Attacks. IEICE Trans. Commun. 101-B(9): 1982-1996 (2018) - [j117]Hyun Kwon
, Yongchul Kim, Ki-Woong Park, Hyunsoo Yoon, Daeseon Choi:
Advanced Ensemble Adversarial Example on Unknown Deep Neural Network Classifiers. IEICE Trans. Inf. Syst. 101-D(10): 2485-2500 (2018) - [j116]Yongjae Lee, Seunghyeon Lee, Hyunmin Seo, Changhoon Yoon, Seungwon Shin
, Hyunsoo Yoon:
Duo: Software Defined Intrusion Tolerant System Using Dual Cluster. Secur. Commun. Networks 2018: 6751042:1-6751042:13 (2018) - [j115]Hyun Kwon
, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Random Untargeted Adversarial Example on Deep Neural Network. Symmetry 10(12): 738 (2018) - [j114]Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Junbum Shin, Sungwook Kim:
Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption. ACM Trans. Priv. Secur. 21(4): 17:1-17:30 (2018) - [j113]Yun-kyung Lee
, Jeong-Nyeo Kim, Kyung-Soo Lim, Hyunsoo Yoon:
Secure mobile device structure for trust IoT. J. Supercomput. 74(12): 6646-6664 (2018) - [j112]Byungjin Jeong, Namgi Kim, Byoung-Dai Lee, Hyunsoo Yoon:
A Simple and Enriched Closed-Form Formula for Cell Residence Time in 5G Heterogeneous Networks. Wirel. Pers. Commun. 101(1): 491-509 (2018) - [c77]Hyun Kwon
, Hyunsoo Yoon, Daeseon Choi:
POSTER: Zero-Day Evasion Attack Analysis on Race between Attack and Defense. AsiaCCS 2018: 805-807 - [c76]Hyun Kwon
, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Fooling a Neural Network in Military Environments: Random Untargeted Adversarial Example. MILCOM 2018: 456-461 - [c75]Sokjoon Lee, Hwajeong Seo, Byungho Chunng, Joongyong Choi, Hyeokchan Kwon, Hyunsoo Yoon:
OpenCL Based Implementation of ECDSA Signature Verification for V2X Communication. MUE/FutureTech 2018: 711-716 - [c74]Hyun Kwon
, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
One-Pixel Adversarial Example that Is Safe for Friendly Deep Neural Networks. WISA 2018: 42-54 - 2017
- [j111]Seondong Heo, Soojin Lee, Bumsoon Jang, Hyunsoo Yoon:
Designing and Implementing a Diversity Policy for Intrusion-Tolerant Systems. IEICE Trans. Inf. Syst. 100-D(1): 118-129 (2017) - [c73]Hyun Kwon
, Hyunsoo Yoon, Daeseon Choi:
Friend-Safe Adversarial Examples in an Evasion Attack on a Deep Neural Network. ICISC 2017: 351-367 - [c72]Namsup Lee, Hyunsoo Yoon, Daeseon Choi:
Detecting Online Game Chargeback Fraud Based on Transaction Sequence Modeling Using Recurrent Neural Network. WISA 2017: 297-309 - 2016
- [j110]Yonggon Kim, Ohmin Kwon
, Jin Soo Jang
, Seongwook Jin, Hyeongboo Baek, Brent ByungHoon Kang, Hyunsoo Yoon:
On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators. Comput. Secur. 62: 33-48 (2016) - [j109]Seungjae Shin
, Uichin Lee, Falko Dressler
, Hyunsoo Yoon:
Analysis of Cell Sojourn Time in Heterogeneous Networks With Small Cells. IEEE Commun. Lett. 20(4): 788-791 (2016) - [j108]Bumsoon Jang, Seokjoo Doo, Soojin Lee, Hyunsoo Yoon:
Hybrid Recovery-Based Intrusion Tolerant System for Practical Cyber-Defense. IEICE Trans. Inf. Syst. 99-D(4): 1081-1091 (2016) - [j107]Pyung Kim, Younho Lee, Hyunsoo Yoon:
Sorting Method for Fully Homomorphic Encrypted Data Using the Cryptographic Single-Instruction Multiple-Data Operation. IEICE Trans. Commun. 99-B(5): 1070-1086 (2016) - [j106]Hyeongboo Baek, Jaewoo Lee, Yongjae Lee, Hyunsoo Yoon:
Preemptive Real-Time Scheduling Incorporating Security Constraint for Cyber Physical Systems. IEICE Trans. Inf. Syst. 99-D(8): 2121-2130 (2016) - [j105]Taesung Kim, Seungkwang Lee, Dooho Choi, Hyunsoo Yoon:
Protecting secret keys in networked devices with table encoding against power analysis attacks. J. High Speed Networks 22(4): 293-307 (2016) - [j104]Seungjae Shin
, Uichin Lee, Falko Dressler
, Hyunsoo Yoon:
Motion-MiX DHT for Wireless Mobile Networks. IEEE Trans. Mob. Comput. 15(12): 3100-3113 (2016) - [j103]Ingook Jang, Dohoo Pyeon, Hyunsoo Yoon, Dongwook Kim:
Channel-quality-aware multihop broadcast for asynchronous multi-channel wireless sensor networks. Wirel. Networks 22(7): 2143-2158 (2016) - [j102]Dohoo Pyeon, Ingook Jang, Hyunsoo Yoon, Dongwook Kim:
RM-MAC: a reservation based multi-channel MAC protocol for wireless sensor networks. Wirel. Networks 22(8): 2727-2739 (2016) - [c71]Sungwook Kim, Jinsu Kim, Dongyoung Koo
, Yuna Kim, Hyunsoo Yoon, Jun-Bum Shin:
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract. AsiaCCS 2016: 617-628 - [i2]Sungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Jun-Bum Shin:
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2016: 232 (2016) - 2015
- [j101]Soo-Hyung Kim, Daeseon Choi, Seung-Hun Jin, Hyunsoo Yoon, JinWoo Son, MyungKeun Yoon:
Customer Data Scanner for Hands-Free Mobile Payment. IEICE Trans. Commun. 98-B(11): 2291-2299 (2015) - [j100]Do-hyung Kim
, Jong-Hwan Kim, Yusung Kim, Hyunsoo Yoon, Ikjun Yeom:
End-to-end mobility support in content centric networks. Int. J. Commun. Syst. 28(6): 1151-1167 (2015) - [j99]Younghoon Kim, Yusung Kim, Hyunsoo Yoon, Ikjun Yeom:
Peer-assisted multimedia delivery using periodic multicast. Inf. Sci. 298: 425-446 (2015) - [j98]Cheoleun Moon, Yusung Kim, Do-hyung Kim
, Hyunsoo Yoon, Ikjun Yeom:
Efficient Packet Routing in Highly Mobile Wireless Networks. Wirel. Pers. Commun. 84(2): 1265-1284 (2015) - [c70]Se Hwan Kim, Yonggon Kim, Ohmin Kwon, Hyunsoo Yoon:
Fully Batch Processing Enabled Memory Integrity Verification Algorithm Based on Merkle Tree. WISA 2015: 386-398 - 2014
- [j97]Yongjoo Shin
, Sihu Song, Yunho Lee, Hyunsoo Yoon:
A Novel Intrusion Tolerant System Using Live Migration. IEICE Trans. Inf. Syst. 97-D(4): 984-988 (2014) - [j96]Seungjae Shin, Namgi Kim, Byoung-Dai Lee, Yoon-Ho Choi, Hyunsoo Yoon:
On the Design of Delay based Admission Control in Hierarchical Networks. KSII Trans. Internet Inf. Syst. 8(3): 997-1010 (2014) - [j95]Sunwoo Kim, Dohoo Pyeon, Ingook Jang, Hyunsoo Yoon:
A Novel Routing Protocol for Cognitive Radio Networks with Cooperation Process. KSII Trans. Internet Inf. Syst. 8(11): 3860-3875 (2014) - [j94]Seondong Heo, Soojin Lee, Seokjoo Doo, Hyunsoo Yoon:
Design of a Secure System Considering Quality of Service. Symmetry 6(4): 938-953 (2014) - [j93]Donghyeok An, Yusung Kim, Hyunsoo Yoon, Ikjun Yeom:
Partition and Cooperation for Crowded Multi-rate WLANs. Wirel. Pers. Commun. 79(2): 1511-1538 (2014) - [c69]Ohmin Kwon, Dongyoung Koo
, Yongjoo Shin
, Hyunsoo Yoon:
An Efficient Audit Scheme for Cloud Storage. FCC 2014: 185-192 - [c68]Dongyoung Koo
, Junbeom Hur, Hyunsoo Yoon:
Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage. FCC 2014: 229-235 - [i1]Yongdae Kim, Hyunsoo Yoon:
First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA. IACR Cryptol. ePrint Arch. 2014: 999 (2014) - 2013
- [j92]Dongyoung Koo
, Junbeom Hur, Hyunsoo Yoon:
Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comput. Electr. Eng. 39(1): 34-46 (2013) - [j91]Donghyeok An, Honguk Woo, Hyunsoo Yoon, Ikjun Yeom:
Enhanced cooperative communication MAC for mobile wireless networks. Comput. Networks 57(1): 99-116 (2013) - [j90]Hyunsoo Yoon
, Cheong-Sool Park, Jun-Seok Kim, Jun-Geol Baek:
Algorithm learning based neural network integrating feature selection and classification. Expert Syst. Appl. 40(1): 231-241 (2013) - [j89]Ingook Jang, Dohoo Pyeon, Sunwoo Kim, Hyunsoo Yoon:
A Survey on Communication Protocols for Wireless Sensor Networks. J. Comput. Sci. Eng. 7(4): 231-241 (2013) - [j88]Seondong Heo, Pyeong Kim, Yongjoo Shin
, Jungmin Lim, Dongyoung Koo
, Yonggon Kim, Ohmin Kwon, Hyunsoo Yoon:
A Survey on Intrusion-Tolerant System. J. Comput. Sci. Eng. 7(4): 242-250 (2013) - [j87]Jungmin Lim, Yongki Kim, Dongyoung Koo
, Soojin Lee, Seokjoo Doo, Hyunsoo Yoon:
A novel Adaptive Cluster Transformation (ACT)-based intrusion tolerant architecture for hybrid information technology. J. Supercomput. 66(2): 918-935 (2013) - [j86]Ingook Jang, Suho Yang, Hyunsoo Yoon, Dongwook Kim:
EMBA: An Efficient Multihop Broadcast Protocol for Asynchronous Duty-Cycled Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 12(4): 1640-1650 (2013) - [j85]Nak Woon Sung, Ngoc-Thai Pham, Hyunsoo Yoon, Sookjin Lee, Won-Joo Hwang:
Base station association schemes to reduce unnecessary handovers using location awareness in femtocell networks. Wirel. Networks 19(5): 741-753 (2013) - [c67]Jungmin Lim, Yongjoo Shin
, Seokjoo Doo, Hyunsoo Yoon:
The Design of a Policy-based Attack-Resilient Intrusion Tolerant System. ITCS 2013: 435-443 - [c66]Jungmin Lim, Seokjoo Doo, Hyunsoo Yoon:
The Design of a Robust Intrusion Tolerance System through Advanced Adaptive Cluster Transformation and Vulnerability-Based VM Selection. MILCOM 2013: 1422-1428 - 2012
- [j84]Euiyul Ko, Donghyeok An, Ikjun Yeom, Hyunsoo Yoon:
Congestion control for sudden bandwidth changes in TCP. Int. J. Commun. Syst. 25(12): 1550-1567 (2012) - [j83]Chanil Park, Junbeom Hur, Seongoun Hwang, Hyunsoo Yoon:
Authenticated public key broadcast encryption scheme secure against insiders' attack. Math. Comput. Model. 55(1-2): 113-122 (2012) - [c65]Do-hyung Kim
, Jong-Hwan Kim, Yusung Kim, Hyunsoo Yoon, Ikjun Yeom:
Mobility support in content centric networks. ICN 2012: 13-18 - [c64]Seondong Heo, Jungmin Lim, Minsoo Lee, Soojin Lee, Hyunsoo Yoon:
A Novel Intrusion Tolerant System Based on Adaptive Recovery Scheme (ARS). ICITCS 2012: 71-78 - [c63]Yongjoo Shin
, Seungjae Shin, Minsoo Kim, Hyunsoo Yoon:
A Secure Self-Encryption Scheme for Resource Limited Mobile Devices. ICITCS 2012: 121-129 - [c62]Yongki Kim, Jungmin Lim, Seokjoo Doo, Hyunsoo Yoon:
The design of adaptive intrusion tolerant system(ITS) based on historical data. ICITST 2012: 662-667 - 2011
- [j82]Do-hyung Kim
, Jong-Hwan Kim, Hyunsoo Yoon, Ikjun Yeom:
AQM for Weighted Fairness in Wireless LANs. IEEE Commun. Lett. 15(11): 1199-1201 (2011) - [j81]Joobeom Yun, Young-joo Shin
, HyoungChun Kim, Hyunsoo Yoon:
MiGuard : Detecting and Guarding against Malicious Iframe through API Hooking. IEICE Electron. Express 8(7): 460-465 (2011) - [j80]Seunghak Lee, Namgi Kim, Heeyoul Kim, Younho Lee, Hyunsoo Yoon:
Sensor Node Localization by Three Mobile Anchors in the Wireless Sensor Networks. IEICE Trans. Inf. Syst. 94-D(10): 1981-1988 (2011) - [j79]Jong-Hwan Kim, Hyunsoo Yoon, Ikjun Yeom:
Active Queue Management for Flow Fairness and Stable Queue Length. IEEE Trans. Parallel Distributed Syst. 22(4): 571-579 (2011) - [c61]Donghyeok An, Yusung Kim, Hyunsoo Yoon, Ikjun Yeom:
Multi-rate aware partition and cooperation in WLANs. StudentWorkshop@CoNEXT 2011: 22:1-22:2 - [c60]Byungjin Jeong, Seungjae Shin, Ingook Jang, Nak Woon Sung, Hyunsoo Yoon:
A Smart Handover Decision Algorithm Using Location Prediction for Hierarchical Macro/Femto-Cell Networks. VTC Fall 2011: 1-5 - 2010
- [j78]Junbeom Hur, Chanil Park, Hyunsoo Yoon:
Chosen ciphertext secure authenticated group communication using identity-based signcryption. Comput. Math. Appl. 60(2): 362-375 (2010) - [j77]Sungwon Han, Euiyul Ko, Hyunsoo Yoon, Ikjun Yeom:
Providing forwarding assurance in multi-hop wireless networks. Comput. Commun. 33(3): 293-301 (2010) - [j76]Hanjin Lee, Jaeyoung Hong, Suho Yang, Ingook Jang, Hyunsoo Yoon:
A pseudo-random asynchronous duty cycle MAC protocol in wireless sensor networks. IEEE Commun. Lett. 14(2): 136-138 (2010) - [j75]Jaeyoung Hong, Ingook Jang, Hanjin Lee, Suho Yang, Hyunsoo Yoon:
MRMAC: Medium Reservation MAC Protocol for Reducing End-to-End Delay and Energy Consumption in Wireless Sensor Networks. IEEE Commun. Lett. 14(7): 614-616 (2010) - [j74]Hojin Ghim, Namgi Kim, Dongwook Kim, Min Choi, Hyunsoo Yoon:
An energy-efficient dispersion method for deployment of mobile sensor networks. IEICE Electron. Express 7(10): 722-727 (2010) - [j73]Chanil Park, Junbeom Hur, Kisuk Kweon, Hyunsoo Yoon:
Self-healing key distribution scheme with long service time. IEICE Electron. Express 7(13): 913-919 (2010) - [j72]Winam Kwon, Hojin Ghim, Hyunsoo Yoon:
Customized Forwarding in application layer multicast for real-time services. IEICE Electron. Express 7(21): 1635-1639 (2010) - [j71]Jaeyoung Hong, Hanjin Lee, Suho Yang, Hyunsoo Yoon:
VAMSD: Voronoi Diagram Based Autonomous Mobile Sensor Deployment for Maximizing Coverage. IEICE Trans. Commun. 93-B(3): 732-735 (2010) - [j70]Kisuk Kweon, Hanjin Lee, Hyunsoo Yoon:
A Retransmission-Enhanced Duty-Cycle MAC Protocol Based on the Channel Quality for Wireless Sensor Networks. IEICE Trans. Commun. 93-B(11): 3156-3160 (2010) - [j69]Junbeom Hur, Hyunsoo Yoon:
A Multi-service Group Key Management Scheme for Stateless Receivers in Wireless Mesh Networks. Mob. Networks Appl. 15(5): 680-692 (2010) - [j68]Janghwan Lee, Hyunsoo Yoon, Ikjun Yeom:
Distributed Fair Scheduling for Wireless Mesh Networks Using IEEE 802.11. IEEE Trans. Veh. Technol. 59(9): 4467-4475 (2010) - [c59]Yeojeong Yoon, Chanil Park, Pyung Kim, Seongoun Hwang, Hyunsoo Yoon:
An efficient identity-based proxy signcryption for secure broadcast. ICITST 2010: 1-6
2000 – 2009
- 2009
- [j67]Hanjin Lee, Dongwook Kim, Hyunsoo Yoon:
Preamble allocation scheme using trajectory information for mobile relay stations. IEEE Commun. Lett. 13(6): 396-398 (2009) - [j66]Jong-Hwan Kim, Hyunsoo Yoon, Ikjun Yeom:
Long-term flow fairness with fixed memory space. IEEE Commun. Lett. 13(12): 998-1000 (2009) - [j65]Dongwook Kim, Hanjin Lee, Namgi Kim, Hyunsoo Yoon:
A Velocity-Based Bicasting Handover Scheme for 4G Mobile Systems. IEICE Trans. Commun. 92-B(1): 288-295 (2009) - [j64]Junbeom Hur, Hyunsoo Yoon:
A Decentralized Multi-Group Key Management Scheme. IEICE Trans. Commun. 92-B(2): 632-635 (2009) - [j63]Chano Kim, Seungjae Shin, Chanil Park, Hyunsoo Yoon:
A Resilient and Efficient Replication Attack Detection Scheme for Wireless Sensor Networks. IEICE Trans. Inf. Syst. 92-D(7): 1479-1483 (2009) - [j62]Kichan Bae, Hyunsoo Yoon:
Autonomous broadcast pruning in wireless ad hoc networks using coverage estimation. Int. J. Pervasive Comput. Commun. 5(4): 411-427 (2009) - [j61]Byungchun Chung, Junbeom Hur, Heeyoul Kim, Seong-Min Hong, Hyunsoo Yoon:
Improved batch exponentiation. Inf. Process. Lett. 109(15): 832-837 (2009) - [c58]Chano Kim, Chanil Park, Junbeom Hur, Hanjin Lee, Hyunsoo Yoon:
A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks. FGIT-FGCN 2009: 405-412 - [c57]Seungjae Shin, Junbeom Hur,