default search action
Jinsu Kim
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Junhyoung Jo, Yeonhwi Jeong, Jinsu Kim, Jihyung Yoo:
Thermal conductivity estimation using Physics-Informed Neural Networks with limited data. Eng. Appl. Artif. Intell. 137: 109079 (2024) - [j20]Keunsu Kim, Hanbaek Lyu, Jinsu Kim, Jae-Hun Jung:
Supervised Low-Rank Semi-nonnegative Matrix Factorization with Frequency Regularization for Forecasting Spatio-temporal Data. J. Sci. Comput. 100(2): 29 (2024) - [i12]Jinsu Kim, Jaemin Seo:
Design Optimization of Nuclear Fusion Reactor through Deep Reinforcement Learning. CoRR abs/2409.08231 (2024) - [i11]Sunghwa Kang, Jinsu Kim:
Noise-robust chemical reaction networks training artificial neural networks. CoRR abs/2410.11919 (2024) - 2023
- [j19]Jinsu Kim, Eunsun Choi, Byung-Gyu Kim, Namje Park:
Proposal of a Token-Based Node Selection Mechanism for Node Distribution of Mobility IoT Blockchain Nodes. Sensors 23(19): 8259 (2023) - [j18]Hyukpyo Hong, Bryan S. Hernandez, Jinsu Kim, Jae Kyoung Kim:
Computational Translation Framework Identifies Biochemical Reaction Networks with Special Topologies and Their Long-Term Dynamics. SIAM J. Appl. Math. 83(3): 1025-1048 (2023) - [i10]Keunsu Kim, Hanbaek Lyu, Jinsu Kim, Jae-Hun Jung:
Supervised low-rank semi-nonnegative matrix factorization with frequency regularization for forecasting spatio-temporal data. CoRR abs/2311.08636 (2023) - 2022
- [j17]Jinsu Kim, Namje Park:
Role-based Access Control Video Surveillance Mechanism Modeling in Smart Contract Environment. Trans. Emerg. Telecommun. Technol. 33(4) (2022) - [j16]Jinsu Kim, Namje Park:
Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing. Pers. Ubiquitous Comput. 26(2): 345-353 (2022) - [j15]Jinsu Kim, Namje Park:
De-Identification Mechanism of User Data in Video Systems According to Risk Level for Preventing Leakage of Personal Healthcare Information. Sensors 22(7): 2589 (2022) - [i9]Minhyeok Cho, Haechang Lee, Hyunwoo Je, Kijeong Kim, Dongil Ryu, Jinsu Kim, Jonghyun Bae, Albert No:
PyNET-QxQ: A Distilled PyNET for QxQ Bayer Pattern Demosaicing in CMOS Image Sensor. CoRR abs/2203.04314 (2022) - 2021
- [j14]Germán A. Enciso, Jinsu Kim:
Accuracy of Multiscale Reduction for Stochastic Reaction Systems. Multiscale Model. Simul. 19(4): 1633-1658 (2021) - [j13]Sungwook Ryu, Jinsu Kim, Namje Park, Yongseok Seo:
Preemptive Prediction-Based Automated Cyberattack Framework Modeling. Symmetry 13(5): 793 (2021) - [j12]Won-Chi Jung, Jinsu Kim, Namje Park:
Web-Browsing Application Using Web Scraping Technology in Korean Network Separation Application. Symmetry 13(8): 1550 (2021) - [c19]Sunpill Kim, Yunseong Jeong, Jinsu Kim, Jungkon Kim, Hyung Tae Lee, Jae Hong Seo:
IronMask: Modular Architecture for Protecting Deep Face Template. CVPR 2021: 16125-16134 - [i8]Sunpill Kim, Yunseong Jeong, Jinsu Kim, Jungkon Kim, Hyung Tae Lee, Jae Hong Seo:
IronMask: Modular Architecture for Protecting Deep Face Template. CoRR abs/2104.02239 (2021) - 2020
- [j11]David F. Anderson, Daniele Cappelletti, Jinsu Kim:
Stochastically modeled weakly reversible reaction networks with a single linkage class. J. Appl. Probab. 57(3): 792-810 (2020) - [j10]Jinsu Kim, Donghyeok Lee, Namje Park:
CCTV-RFID enabled multifactor authentication model for secure differential level video access control. Multim. Tools Appl. 79(31-32): 23461-23481 (2020) - [j9]Jinsu Kim, Namje Park:
A Face Image Virtualization Mechanism for Privacy Intrusion Prevention in Healthcare Video Surveillance Systems. Symmetry 12(6): 891 (2020)
2010 – 2019
- 2019
- [j8]Sungwook Kim, Jinsu Kim, Jae Hong Seo:
A new approach to practical function-private inner product encryption. Theor. Comput. Sci. 783: 22-40 (2019) - 2018
- [j7]Jinsu Kim, Sungwook Kim, Jae Hong Seo:
A new scale-invariant homomorphic encryption scheme. Inf. Sci. 422: 177-187 (2018) - [j6]David F. Anderson, Jinsu Kim:
Some Network Conditions for Positive Recurrence of Stochastically Modeled Reaction Networks. SIAM J. Appl. Math. 78(5): 2692-2713 (2018) - [j5]Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Junbum Shin, Sungwook Kim:
Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption. ACM Trans. Priv. Secur. 21(4): 17:1-17:30 (2018) - [c18]Hyunjun Eun, Jonghee Kim, Jinsu Kim, Changick Kim:
Fast Korean Text Detection and Recognition in Traffic Guide Signs. VCIP 2018: 1-4 - 2017
- [c17]Jonghee Kim, Jinsu Kim, Seokeon Choi, Muhammad Abul Hasan, Changick Kim:
Robust template matching using scale-adaptive deep convolutional features. APSIPA 2017: 708-711 - [c16]Jinsu Kim, Yoonhyung Kim, Changick Kim:
A Robust Ensemble of ResNets for Character Level End-to-end Text Detection in Natural Scene Images. CBMI 2017: 10:1-10:6 - [c15]Quang Son Le, Jeongeun Kim, Jinsu Kim, Hyoung Il Son:
Report on work in progress of small insect tracking system using autonomous UAV. URAI 2017: 242-243 - [i7]Sungwook Kim, Jinsu Kim, Jae Hong Seo:
A New Approach for Practical Function-Private Inner Product Encryption. IACR Cryptol. ePrint Arch. 2017: 4 (2017) - 2016
- [j4]Faming Liang, Jinsu Kim, Qifan Song:
A Bootstrap Metropolis-Hastings Algorithm for Bayesian Analysis of Big Data. Technometrics 58(3): 304-318 (2016) - [c14]Sungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Jun-Bum Shin:
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract. AsiaCCS 2016: 617-628 - [c13]Jung Hee Cheon, Kyoohyung Han, Jinsu Kim, Changmin Lee, Yongha Son:
A Practical Post-Quantum Public-Key Cryptosystem Based on \textsf spLWE. ICISC 2016: 51-74 - [i6]Sungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Jun-Bum Shin:
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2016: 232 (2016) - [i5]Jung Hee Cheon, Kyoohyung Han, Jinsu Kim, Changmin Lee, Yongha Son:
A Practical Post-Quantum Public-Key Cryptosystem Based on spLWE. IACR Cryptol. ePrint Arch. 2016: 1055 (2016) - 2015
- [j3]Jung Hee Cheon, Jinsu Kim, Moon Sung Lee, Aaram Yun:
CRT-based fully homomorphic encryption over the integers. Inf. Sci. 310: 149-162 (2015) - [j2]Jung Hee Cheon, Jinsu Kim:
A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption. IEEE Trans. Inf. Forensics Secur. 10(5): 1052-1063 (2015) - [c12]Seokil Song, Taein Jeon, Eungjin Kim, Jinsu Kim, Dojin Choi, Yeona Kim, Hyojin Choi, Kyunbyoung Ko, Cheol Mun:
Demo: Human-Interactive Hardware-In-the-Loop Simulator for Cooperative Intelligent Transportation Systems and services. VNC 2015: 169-170 - [i4]Jinsu Kim, Sungwook Kim, Jae Hong Seo:
Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency. IACR Cryptol. ePrint Arch. 2015: 992 (2015) - 2013
- [c11]Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, Aaram Yun:
Batch Fully Homomorphic Encryption over the Integers. EUROCRYPT 2013: 315-335 - [i3]Jinsu Kim, Moon Sung Lee, Aaram Yun, Jung Hee Cheon:
CRT-based Fully Homomorphic Encryption over the Integers. IACR Cryptol. ePrint Arch. 2013: 57 (2013) - [i2]Jung Hee Cheon, Jinsu Kim:
An Approach to Reduce Storage for Homomorphic Computations. IACR Cryptol. ePrint Arch. 2013: 710 (2013) - 2012
- [i1]Myungsun Kim, Jinsu Kim, Jung Hee Cheon:
A Public Shuffle without Private Permutations. IACR Cryptol. ePrint Arch. 2012: 301 (2012) - 2010
- [c10]Seong-Yong Choi, Jinsu Kim, Yang-Jae Park, Joong-Kyung Ryu, Kee-Wook Rim, Jung-Hyun Lee:
A Fault-Tolerant and Energy Efficient Routing in a Dense and Large Scale Wireless Sensor Network. FGIT-FGCN (1) 2010: 66-75 - [c9]Seong-Yong Choi, Jinsu Kim, Seung-Jin Han, Jun Hyeog Choi, Kee-Wook Rim, Jung-Hyun Lee:
Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks. AST/UCMA/ISA/ACN 2010: 159-174
2000 – 2009
- 2009
- [c8]Jinsu Kim, Seong-Yong Choi, Seungjin Han, Jun Hyeog Choi, Junghyun Lee, Keewook Rim:
Secure and Energy Efficient Key Management Scheme Using Authentication in Cluster Based Routing Protocol. FGIT 2009: 181-189 - [c7]Seong-Yong Choi, Jinsu Kim, Seung-Jin Han, Jun Hyeog Choi, Kee-Wook Rim, Jung-Hyun Lee:
Dynamic Routing Algorithm for Reliability and Energy Efficiency in Wireless Sensor Networks. FGIT 2009: 277-284 - [c6]Jinsu Kim, Junghyun Lee, Keewook Rim:
3DE_var: Energy-Efficient Cluster-Based Routing Scheme in Wireless Sensor Networks. KES-AMSTA 2009: 314-324 - [c5]Jinsu Kim, Junghyun Lee, Keewook Rim:
3DE: selective cluster head selection scheme for energy efficiency in wireless sensor networks. PETRA 2009 - 2008
- [c4]Jinsu Kim, Jae Hong Lee:
Opportunistic Cooperation Based on Delayed Retransmissions for a Multi-User Uplink System. VTC Fall 2008: 1-4 - 2007
- [c3]Wonik Choi, Hyunduk Kim, Jinsu Kim, Jinseok Chae:
A Context-Aware Framework for Mobile Navigation Service. CIT 2007: 423-428 - [c2]Yangmi Lim, Jinsu Kim, Jinseok Chae:
RISA: A Real-Time Interactive Shadow Avatar. ISM 2007: 112-122 - 2005
- [c1]Yong-Kab Kim, Jinsu Kim, Soonja Lim, Dong-Hyun Kim:
Neuron Operation Using Controlled Chaotic Instabilities in Brillouin-Active Fiber Based Neural Network in Smart Structures. ICNC (3) 2005: 1044-1050 - 2004
- [j1]Jae Sung Lee, Dong Soo Lee, Yu Kyeong Kim, Jinsu Kim, Ho Young Lee, Sang Kun Lee, June-Key Chung, Myung Chul Lee:
Probabilistic map of blood flow distribution in the brain from the internal carotid artery. NeuroImage 23(4): 1422-1431 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-01 01:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint