default search action
Hyunsoo Yoon
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j153]Jun Kataoka, Hyunsoo Yoon:
AVATAR: Adversarial self-superVised domain Adaptation network for TARget domain. Expert Syst. Appl. 258: 125147 (2024) - [j152]Oyekanmi O. Olatunde, Kehinde S. Oyetunde, Jihun Han, Mohammad T. Khasawneh, Hyunsoo Yoon:
Multiclass classification of Alzheimer's disease prodromal stages using sequential feature embeddings and regularized multikernel support vector machine. NeuroImage 304: 120929 (2024) - [j151]Hairong Wang, Michael G. Argenziano, Hyunsoo Yoon, Deborah Boyett, Akshay Save, Petros Petridis, William Savage, Pamela R. Jackson, Andrea Hawkins-Daarud, Nhan L. Tran, Leland S. Hu, Kyle W. Singleton, Lisa E. Paulson, Osama Al Dalahmah, Jeffrey N. Bruce, Jack Grinband, Kristin R. Swanson, Peter D. Canoll, Jing Li:
Biologically informed deep neural networks provide quantitative assessment of intratumoral heterogeneity in post treatment glioblastoma. npj Digit. Medicine 7(1) (2024) - [j150]Nathan Gaw, Jing Li, Hyunsoo Yoon:
A Novel Semi-Supervised Learning Model for Smartphone-Based Health Telemonitoring. IEEE Trans Autom. Sci. Eng. 21(1): 428-441 (2024) - [i8]Yujin Lee, Seoyoon Jang, Hyunsoo Yoon:
AnoPLe: Few-Shot Anomaly Detection via Bi-directional Prompt Learning with Only Normal Samples. CoRR abs/2408.13516 (2024) - 2023
- [j149]Firas Al-Hindawi, Tejaswi Soori, Han Hu, Md Mahfuzur Rahman Siddiquee, Hyunsoo Yoon, Teresa Wu, Ying Sun:
A framework for generalizing critical heat flux detection models using unsupervised image-to-image translation. Expert Syst. Appl. 227: 120265 (2023) - [j148]Jiajing Huang, Hyunsoo Yoon, Teresa Wu, Kasim Selçuk Candan, Ojas Pradhan, Jin Wen, Zheng O'Neill:
Eigen-Entropy: A metric for multivariate sampling decisions. Inf. Sci. 619: 84-97 (2023) - [i7]Jun Kataoka, Hyunsoo Yoon:
AVATAR: Adversarial self-superVised domain Adaptation network for TARget domain. CoRR abs/2305.00082 (2023) - [i6]Joonkyo Shim, Hyunsoo Yoon:
LEAT: Towards Robust Deepfake Disruption in Real-World Scenarios via Latent Ensemble Attack. CoRR abs/2307.01520 (2023) - [i5]Yujin Lee, Harin Lim, Hyunsoo Yoon:
SelFormaly: Towards Task-Agnostic Unified Anomaly Detection. CoRR abs/2307.12540 (2023) - 2022
- [j147]Minsoo Lee, Hyun Kwon, Hyunsoo Yoon:
Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants. Secur. Commun. Networks 2022: 4714899:1-4714899:13 (2022) - [i4]Firas Al-Hindawi, Tejaswi Soori, Han Hu, Md Mahfuzur Rahman Siddiquee, Hyunsoo Yoon, Teresa Wu, Ying Sun:
A Generalized Framework for Critical Heat Flux Detection Using Unsupervised Image-to-Image Translation. CoRR abs/2212.09107 (2022) - 2021
- [j146]Moonsu Jang, Donghyun Kim, Daehee Seo, Yongmin Ju, Seungho Ryu, Hyunsoo Yoon:
An intelligent recommendation algorithm for red team strategy in edge computing powered massive Cyber Defense Exercise. Comput. Commun. 165: 141-148 (2021) - [j145]Sang-Ok Park, Ohmin Kwon, Yonggon Kim, Sang Kil Cha, Hyunsoo Yoon:
Mind control attack: Undermining deep learning with GPU memory exploitation. Comput. Secur. 102: 102115 (2021) - [j144]Hyunsoo Yoon, Nathan Gaw:
A novel multi-task linear mixed model for smartphone-based telemonitoring. Expert Syst. Appl. 164: 113809 (2021) - [j143]Hyun Kwon, Hyunsoo Yoon, Daeseon Choi:
Data Correction For Enhancing Classification Accuracy By Unknown Deep Neural Network Classifiers. KSII Trans. Internet Inf. Syst. 15(9): 3243-3257 (2021) - [j142]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Classification score approach for detecting adversarial example in deep neural network. Multim. Tools Appl. 80(7): 10339-10360 (2021) - [j141]Ohmin Kwon, Yonggon Kim, Jaehyuk Huh, Hyunsoo Yoon:
ZeroKernel: Secure Context-Isolated Execution on Commodity GPUs. IEEE Trans. Dependable Secur. Comput. 18(4): 1974-1988 (2021) - 2020
- [j140]Fei Gao, Hyunsoo Yoon, Teresa Wu, Xianghua Chu:
A feature transfer enabled multi-task deep learning model on medical imaging. Expert Syst. Appl. 143 (2020) - [j139]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods. IEICE Trans. Inf. Syst. 103-D(4): 879-882 (2020) - [j138]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
Multi-Targeted Backdoor: Indentifying Backdoor Attack for Multiple Deep Neural Networks. IEICE Trans. Inf. Syst. 103-D(4): 883-887 (2020) - [j137]Yoohwa Kang, Changki Kim, Donghyeok An, Hyunsoo Yoon:
Multipath transmission control protocol-based multi-access traffic steering solution for 5G multimedia-centric network: Design and testbed system implementation. Int. J. Distributed Sens. Networks 16(2) (2020) - [j136]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
Acoustic-decoy: Detection of adversarial examples through audio modification on speech recognition system. Neurocomputing 417: 357-370 (2020) - [j135]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
CAPTCHA Image Generation: Two-Step Style-Transfer Learning in Deep Neural Networks. Sensors 20(5): 1495 (2020) - [j134]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System. IEEE Trans. Inf. Forensics Secur. 15: 526-538 (2020) - [j133]Fei Gao, Teresa Wu, Xianghua Chu, Hyunsoo Yoon, Yanzhe Xu, Bhavika Patel:
Deep Residual Inception Encoder-Decoder Network for Medical Imaging Synthesis. IEEE J. Biomed. Health Informatics 24(1): 39-49 (2020) - [c84]Hyun Kwon, Jungmin Roh, Hyunsoo Yoon, Ki-Woong Park:
TargetNet Backdoor: Attack on Deep Neural Network with Use of Different Triggers. ICIIT 2020: 140-145 - [c83]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
FriendNet Backdoor: Indentifying Backdoor Attack that is safe for Friendly Deep Neural Network. ICSIM 2020: 53-57
2010 – 2019
- 2019
- [j132]Hyun Kwon, Hyunsoo Yoon, Daeseon Choi:
Restricted Evasion Attack: Generation of Restricted-Area Adversarial Example. IEEE Access 7: 60908-60919 (2019) - [j131]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Selective Untargeted Evasion Attack: An Adversarial Example That Will Not Be Classified as Certain Avoided Classes. IEEE Access 7: 73493-73503 (2019) - [j130]Junyoung Son, Jonggyun Choi, Hyunsoo Yoon:
New Complementary Points of Cyber Security Schemes for Critical Digital Assets at Nuclear Power Plants. IEEE Access 7: 78379-78390 (2019) - [j129]Ohmin Kwon, Hyun Kwon, Hyunsoo Yoon:
Rootkit inside GPU Kernel Execution. IEICE Trans. Inf. Syst. 102-D(11): 2261-2264 (2019) - [j128]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
Selective Poisoning Attack on Deep Neural Networks †. Symmetry 11(7): 892 (2019) - [j127]Hyunsoo Yoon, Jing Li:
A Novel Positive Transfer Learning Approach for Telemonitoring of Parkinson's Disease. IEEE Trans Autom. Sci. Eng. 16(1): 180-191 (2019) - [j126]Sokjoon Lee, Hwajeong Seo, Hyeokchan Kwon, Hyunsoo Yoon:
Hybrid approach of parallel implementation on CPU-GPU for high-speed ECDSA verification. J. Supercomput. 75(8): 4329-4349 (2019) - [j125]Dohoo Pyeon, Hyunsoo Yoon:
An efficient multi-path pipeline transmission for a bulk data transfer in IEEE 802.15.4 multi-hop networks. Wirel. Networks 25(1): 117-130 (2019) - [c82]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
Selective Poisoning Attack on Deep Neural Network to Induce Fine-Grained Recognition Error. AIKE 2019: 136-139 - [c81]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
POSTER: Detecting Audio Adversarial Example through Audio Modification. CCS 2019: 2521-2523 - [c80]Hyun Kwon, Hyunsoo Yoon, Daeseon Choi:
Priority Adversarial Example in Evasion Attack on Multiple Deep Neural Networks. ICAIIC 2019: 399-404 - [c79]Hyun Kwon, Ohmin Kwon, Hyunsoo Yoon, Ki-Woong Park:
Face Friend-Safe Adversarial Example on Face Recognition System. ICUFN 2019: 547-551 - [c78]Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network. WISA 2019: 234-246 - [i3]Fei Gao, Hyunsoo Yoon, Teresa Wu, Xianghua Chu:
A Feature Transfer Enabled Multi-Task Deep Learning Model on Medical Imaging. CoRR abs/1906.01828 (2019) - 2018
- [b1]Hyunsoo Yoon:
New Statistical Transfer Learning Models for Health Care Applications. Arizona State University, Tempe, USA, 2018 - [j124]Hyun Kwon, Yongchul Kim, Ki-Woong Park, Hyunsoo Yoon, Daeseon Choi:
Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network. IEEE Access 6: 46084-46096 (2018) - [j123]Hyun Kwon, Yongchul Kim, Ki-Woong Park, Hyunsoo Yoon, Daeseon Choi:
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier. Comput. Secur. 78: 380-397 (2018) - [j122]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
CAPTCHA Image Generation Systems Using Generative Adversarial Networks. IEICE Trans. Inf. Syst. 101-D(2): 543-546 (2018) - [j121]Hyungkyu Lee, Younho Lee, Changho Seo, Hyunsoo Yoon:
Efficient Approach for Mitigating Mobile Phishing Attacks. IEICE Trans. Commun. 101-B(9): 1982-1996 (2018) - [j120]Hyun Kwon, Yongchul Kim, Ki-Woong Park, Hyunsoo Yoon, Daeseon Choi:
Advanced Ensemble Adversarial Example on Unknown Deep Neural Network Classifiers. IEICE Trans. Inf. Syst. 101-D(10): 2485-2500 (2018) - [j119]Yongjae Lee, Seunghyeon Lee, Hyunmin Seo, Changhoon Yoon, Seungwon Shin, Hyunsoo Yoon:
Duo: Software Defined Intrusion Tolerant System Using Dual Cluster. Secur. Commun. Networks 2018: 6751042:1-6751042:13 (2018) - [j118]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Random Untargeted Adversarial Example on Deep Neural Network. Symmetry 10(12): 738 (2018) - [j117]Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Junbum Shin, Sungwook Kim:
Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption. ACM Trans. Priv. Secur. 21(4): 17:1-17:30 (2018) - [j116]Yun-kyung Lee, Jeong-Nyeo Kim, Kyung-Soo Lim, Hyunsoo Yoon:
Secure mobile device structure for trust IoT. J. Supercomput. 74(12): 6646-6664 (2018) - [j115]Byungjin Jeong, Namgi Kim, Byoung-Dai Lee, Hyunsoo Yoon:
A Simple and Enriched Closed-Form Formula for Cell Residence Time in 5G Heterogeneous Networks. Wirel. Pers. Commun. 101(1): 491-509 (2018) - [c77]Hyun Kwon, Hyunsoo Yoon, Daeseon Choi:
POSTER: Zero-Day Evasion Attack Analysis on Race between Attack and Defense. AsiaCCS 2018: 805-807 - [c76]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
Fooling a Neural Network in Military Environments: Random Untargeted Adversarial Example. MILCOM 2018: 456-461 - [c75]Sokjoon Lee, Hwajeong Seo, Byungho Chunng, Joongyong Choi, Hyeokchan Kwon, Hyunsoo Yoon:
OpenCL Based Implementation of ECDSA Signature Verification for V2X Communication. MUE/FutureTech 2018: 711-716 - [c74]Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
One-Pixel Adversarial Example that Is Safe for Friendly Deep Neural Networks. WISA 2018: 42-54 - 2017
- [j114]Seondong Heo, Soojin Lee, Bumsoon Jang, Hyunsoo Yoon:
Designing and Implementing a Diversity Policy for Intrusion-Tolerant Systems. IEICE Trans. Inf. Syst. 100-D(1): 118-129 (2017) - [c73]Hyun Kwon, Hyunsoo Yoon, Daeseon Choi:
Friend-Safe Adversarial Examples in an Evasion Attack on a Deep Neural Network. ICISC 2017: 351-367 - [c72]Namsup Lee, Hyunsoo Yoon, Daeseon Choi:
Detecting Online Game Chargeback Fraud Based on Transaction Sequence Modeling Using Recurrent Neural Network. WISA 2017: 297-309 - 2016
- [j113]Yonggon Kim, Ohmin Kwon, Jin Soo Jang, Seongwook Jin, Hyeongboo Baek, Brent ByungHoon Kang, Hyunsoo Yoon:
On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators. Comput. Secur. 62: 33-48 (2016) - [j112]Seungjae Shin, Uichin Lee, Falko Dressler, Hyunsoo Yoon:
Analysis of Cell Sojourn Time in Heterogeneous Networks With Small Cells. IEEE Commun. Lett. 20(4): 788-791 (2016) - [j111]Bumsoon Jang, Seokjoo Doo, Soojin Lee, Hyunsoo Yoon:
Hybrid Recovery-Based Intrusion Tolerant System for Practical Cyber-Defense. IEICE Trans. Inf. Syst. 99-D(4): 1081-1091 (2016) - [j110]Pyung Kim, Younho Lee, Hyunsoo Yoon:
Sorting Method for Fully Homomorphic Encrypted Data Using the Cryptographic Single-Instruction Multiple-Data Operation. IEICE Trans. Commun. 99-B(5): 1070-1086 (2016) - [j109]Hyeongboo Baek, Jaewoo Lee, Yongjae Lee, Hyunsoo Yoon:
Preemptive Real-Time Scheduling Incorporating Security Constraint for Cyber Physical Systems. IEICE Trans. Inf. Syst. 99-D(8): 2121-2130 (2016) - [j108]Taesung Kim, Seungkwang Lee, Dooho Choi, Hyunsoo Yoon:
Protecting secret keys in networked devices with table encoding against power analysis attacks. J. High Speed Networks 22(4): 293-307 (2016) - [j107]Seungjae Shin, Uichin Lee, Falko Dressler, Hyunsoo Yoon:
Motion-MiX DHT for Wireless Mobile Networks. IEEE Trans. Mob. Comput. 15(12): 3100-3113 (2016) - [j106]Ingook Jang, Dohoo Pyeon, Hyunsoo Yoon, Dongwook Kim:
Channel-quality-aware multihop broadcast for asynchronous multi-channel wireless sensor networks. Wirel. Networks 22(7): 2143-2158 (2016) - [j105]Dohoo Pyeon, Ingook Jang, Hyunsoo Yoon, Dongwook Kim:
RM-MAC: a reservation based multi-channel MAC protocol for wireless sensor networks. Wirel. Networks 22(8): 2727-2739 (2016) - [c71]Sungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Jun-Bum Shin:
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract. AsiaCCS 2016: 617-628 - [i2]Sungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Jun-Bum Shin:
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2016: 232 (2016) - 2015
- [j104]Soo-Hyung Kim, Daeseon Choi, Seung-Hun Jin, Hyunsoo Yoon, JinWoo Son, MyungKeun Yoon:
Customer Data Scanner for Hands-Free Mobile Payment. IEICE Trans. Commun. 98-B(11): 2291-2299 (2015) - [j103]Do-hyung Kim, Jong-Hwan Kim, Yusung Kim, Hyunsoo Yoon, Ikjun Yeom:
End-to-end mobility support in content centric networks. Int. J. Commun. Syst. 28(6): 1151-1167 (2015) - [j102]Younghoon Kim, Yusung Kim, Hyunsoo Yoon, Ikjun Yeom:
Peer-assisted multimedia delivery using periodic multicast. Inf. Sci. 298: 425-446 (2015) - [j101]Cheoleun Moon, Yusung Kim, Do-hyung Kim, Hyunsoo Yoon, Ikjun Yeom:
Efficient Packet Routing in Highly Mobile Wireless Networks. Wirel. Pers. Commun. 84(2): 1265-1284 (2015) - [c70]Se Hwan Kim, Yonggon Kim, Ohmin Kwon, Hyunsoo Yoon:
Fully Batch Processing Enabled Memory Integrity Verification Algorithm Based on Merkle Tree. WISA 2015: 386-398 - 2014
- [j100]Yongjoo Shin, Sihu Song, Yunho Lee, Hyunsoo Yoon:
A Novel Intrusion Tolerant System Using Live Migration. IEICE Trans. Inf. Syst. 97-D(4): 984-988 (2014) - [j99]Seungjae Shin, Namgi Kim, Byoung-Dai Lee, Yoon-Ho Choi, Hyunsoo Yoon:
On the Design of Delay based Admission Control in Hierarchical Networks. KSII Trans. Internet Inf. Syst. 8(3): 997-1010 (2014) - [j98]Sunwoo Kim, Dohoo Pyeon, Ingook Jang, Hyunsoo Yoon:
A Novel Routing Protocol for Cognitive Radio Networks with Cooperation Process. KSII Trans. Internet Inf. Syst. 8(11): 3860-3875 (2014) - [j97]Seondong Heo, Soojin Lee, Seokjoo Doo, Hyunsoo Yoon:
Design of a Secure System Considering Quality of Service. Symmetry 6(4): 938-953 (2014) - [j96]Donghyeok An, Yusung Kim, Hyunsoo Yoon, Ikjun Yeom:
Partition and Cooperation for Crowded Multi-rate WLANs. Wirel. Pers. Commun. 79(2): 1511-1538 (2014) - [c69]Ohmin Kwon, Dongyoung Koo, Yongjoo Shin, Hyunsoo Yoon:
An Efficient Audit Scheme for Cloud Storage. FCC 2014: 185-192 - [c68]Dongyoung Koo, Junbeom Hur, Hyunsoo Yoon:
Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud Storage. FCC 2014: 229-235 - [i1]Yongdae Kim, Hyunsoo Yoon:
First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA. IACR Cryptol. ePrint Arch. 2014: 999 (2014) - 2013
- [j95]Dongyoung Koo, Junbeom Hur, Hyunsoo Yoon:
Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comput. Electr. Eng. 39(1): 34-46 (2013) - [j94]Donghyeok An, Honguk Woo, Hyunsoo Yoon, Ikjun Yeom:
Enhanced cooperative communication MAC for mobile wireless networks. Comput. Networks 57(1): 99-116 (2013) - [j93]Hyunsoo Yoon, Cheong-Sool Park, Jun-Seok Kim, Jun-Geol Baek:
Algorithm learning based neural network integrating feature selection and classification. Expert Syst. Appl. 40(1): 231-241 (2013) - [j92]Ingook Jang, Dohoo Pyeon, Sunwoo Kim, Hyunsoo Yoon:
A Survey on Communication Protocols for Wireless Sensor Networks. J. Comput. Sci. Eng. 7(4): 231-241 (2013) - [j91]Seondong Heo, Pyeong Kim, Yongjoo Shin, Jungmin Lim, Dongyoung Koo, Yonggon Kim, Ohmin Kwon, Hyunsoo Yoon:
A Survey on Intrusion-Tolerant System. J. Comput. Sci. Eng. 7(4): 242-250 (2013) - [j90]Jungmin Lim, Yongki Kim, Dongyoung Koo, Soojin Lee, Seokjoo Doo, Hyunsoo Yoon:
A novel Adaptive Cluster Transformation (ACT)-based intrusion tolerant architecture for hybrid information technology. J. Supercomput. 66(2): 918-935 (2013) - [j89]Ingook Jang, Suho Yang, Hyunsoo Yoon, Dongwook Kim:
EMBA: An Efficient Multihop Broadcast Protocol for Asynchronous Duty-Cycled Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 12(4): 1640-1650 (2013) - [j88]Nak Woon Sung, Ngoc-Thai Pham, Hyunsoo Yoon, Sookjin Lee, Won-Joo Hwang:
Base station association schemes to reduce unnecessary handovers using location awareness in femtocell networks. Wirel. Networks 19(5): 741-753 (2013) - [c67]Jungmin Lim, Yongjoo Shin, Seokjoo Doo, Hyunsoo Yoon:
The Design of a Policy-based Attack-Resilient Intrusion Tolerant System. ITCS 2013: 435-443 - [c66]Jungmin Lim, Seokjoo Doo, Hyunsoo Yoon:
The Design of a Robust Intrusion Tolerance System through Advanced Adaptive Cluster Transformation and Vulnerability-Based VM Selection. MILCOM 2013: 1422-1428 - 2012
- [j87]Euiyul Ko, Donghyeok An, Ikjun Yeom, Hyunsoo Yoon:
Congestion control for sudden bandwidth changes in TCP. Int. J. Commun. Syst. 25(12): 1550-1567 (2012) - [j86]Chanil Park, Junbeom Hur, Seongoun Hwang, Hyunsoo Yoon:
Authenticated public key broadcast encryption scheme secure against insiders' attack. Math. Comput. Model. 55(1-2): 113-122 (2012) - [c65]Do-hyung Kim, Jong-Hwan Kim, Yusung Kim, Hyunsoo Yoon, Ikjun Yeom:
Mobility support in content centric networks. ICN 2012: 13-18 - [c64]Seondong Heo, Jungmin Lim, Minsoo Lee, Soojin Lee, Hyunsoo Yoon:
A Novel Intrusion Tolerant System Based on Adaptive Recovery Scheme (ARS). ICITCS 2012: 71-78 - [c63]Yongjoo Shin, Seungjae Shin, Minsoo Kim, Hyunsoo Yoon:
A Secure Self-Encryption Scheme for Resource Limited Mobile Devices. ICITCS 2012: 121-129 - [c62]Yongki Kim, Jungmin Lim, Seokjoo Doo, Hyunsoo Yoon:
The design of adaptive intrusion tolerant system(ITS) based on historical data. ICITST 2012: 662-667 - 2011
- [j85]Do-hyung Kim, Jong-Hwan Kim, Hyunsoo Yoon, Ikjun Yeom:
AQM for Weighted Fairness in Wireless LANs. IEEE Commun. Lett. 15(11): 1199-1201 (2011) - [j84]Joobeom Yun, Young-joo Shin, HyoungChun Kim, Hyunsoo Yoon:
MiGuard : Detecting and Guarding against Malicious Iframe through API Hooking. IEICE Electron. Express 8(7): 460-465 (2011) - [j83]Seunghak Lee, Namgi Kim, Heeyoul Kim, Younho Lee, Hyunsoo Yoon:
Sensor Node Localization by Three Mobile Anchors in the Wireless Sensor Networks. IEICE Trans. Inf. Syst. 94-D(10): 1981-1988 (2011) - [j82]Jong-Hwan Kim, Hyunsoo Yoon, Ikjun Yeom:
Active Queue Management for Flow Fairness and Stable Queue Length. IEEE Trans. Parallel Distributed Syst. 22(4): 571-579 (2011) - [c61]Donghyeok An, Yusung Kim, Hyunsoo Yoon, Ikjun Yeom:
Multi-rate aware partition and cooperation in WLANs. StudentWorkshop@CoNEXT 2011: 22:1-22:2 - [c60]Byungjin Jeong, Seungjae Shin, Ingook Jang, Nak Woon Sung, Hyunsoo Yoon:
A Smart Handover Decision Algorithm Using Location Prediction for Hierarchical Macro/Femto-Cell Networks. VTC Fall 2011: 1-5 - 2010
- [j81]Junbeom Hur, Chanil Park, Hyunsoo Yoon:
Chosen ciphertext secure authenticated group communication using identity-based signcryption. Comput. Math. Appl. 60(2): 362-375 (2010) - [j80]Sungwon Han, Euiyul Ko, Hyunsoo Yoon, Ikjun Yeom:
Providing forwarding assurance in multi-hop wireless networks. Comput. Commun. 33(3): 293-301 (2010) - [j79]Hanjin Lee, Jaeyoung Hong, Suho Yang, Ingook Jang, Hyunsoo Yoon:
A pseudo-random asynchronous duty cycle MAC protocol in wireless sensor networks. IEEE Commun. Lett. 14(2): 136-138 (2010) - [j78]Jaeyoung Hong, Ingook Jang, Hanjin Lee, Suho Yang, Hyunsoo Yoon:
MRMAC: Medium Reservation MAC Protocol for Reducing End-to-End Delay and Energy Consumption in Wireless Sensor Networks. IEEE Commun. Lett. 14(7): 614-616 (2010) - [j77]Hojin Ghim, Namgi Kim, Dongwook Kim, Min Choi, Hyunsoo Yoon:
An energy-efficient dispersion method for deployment of mobile sensor networks. IEICE Electron. Express 7(10): 722-727 (2010) - [j76]Chanil Park, Junbeom Hur, Kisuk Kweon, Hyunsoo Yoon:
Self-healing key distribution scheme with long service time. IEICE Electron. Express 7(13): 913-919 (2010) - [j75]Winam Kwon, Hojin Ghim, Hyunsoo Yoon:
Customized Forwarding in application layer multicast for real-time services. IEICE Electron. Express 7(21): 1635-1639 (2010) - [j74]Jaeyoung Hong, Hanjin Lee, Suho Yang, Hyunsoo Yoon:
VAMSD: Voronoi Diagram Based Autonomous Mobile Sensor Deployment for Maximizing Coverage. IEICE Trans. Commun. 93-B(3): 732-735 (2010) - [j73]Kisuk Kweon, Hanjin Lee, Hyunsoo Yoon:
A Retransmission-Enhanced Duty-Cycle MAC Protocol Based on the Channel Quality for Wireless Sensor Networks. IEICE Trans. Commun. 93-B(11): 3156-3160 (2010) - [j72]Junbeom Hur, Hyunsoo Yoon:
A Multi-service Group Key Management Scheme for Stateless Receivers in Wireless Mesh Networks. Mob. Networks Appl. 15(5): 680-692 (2010) - [j71]Janghwan Lee, Hyunsoo Yoon, Ikjun Yeom:
Distributed Fair Scheduling for Wireless Mesh Networks Using IEEE 802.11. IEEE Trans. Veh. Technol. 59(9): 4467-4475 (2010) - [c59]Yeojeong Yoon, Chanil Park, Pyung Kim, Seongoun Hwang, Hyunsoo Yoon:
An efficient identity-based proxy signcryption for secure broadcast. ICITST 2010: 1-6
2000 – 2009
- 2009
- [j70]Hanjin Lee, Dongwook Kim, Hyunsoo Yoon:
Preamble allocation scheme using trajectory information for mobile relay stations. IEEE Commun. Lett. 13(6): 396-398 (2009) - [j69]Jong-Hwan Kim, Hyunsoo Yoon, Ikjun Yeom:
Long-term flow fairness with fixed memory space. IEEE Commun. Lett. 13(12): 998-1000 (2009) - [j68]Dongwook Kim, Hanjin Lee, Namgi Kim, Hyunsoo Yoon:
A Velocity-Based Bicasting Handover Scheme for 4G Mobile Systems. IEICE Trans. Commun. 92-B(1): 288-295 (2009) - [j67]Junbeom Hur, Hyunsoo Yoon:
A Decentralized Multi-Group Key Management Scheme. IEICE Trans. Commun. 92-B(2): 632-635 (2009) - [j66]Chano Kim, Seungjae Shin, Chanil Park, Hyunsoo Yoon:
A Resilient and Efficient Replication Attack Detection Scheme for Wireless Sensor Networks. IEICE Trans. Inf. Syst. 92-D(7): 1479-1483 (2009) - [j65]Kichan Bae, Hyunsoo Yoon:
Autonomous broadcast pruning in wireless ad hoc networks using coverage estimation. Int. J. Pervasive Comput. Commun. 5(4): 411-427 (2009) - [j64]Byungchun Chung, Junbeom Hur, Heeyoul Kim, Seong-Min Hong, Hyunsoo Yoon:
Improved batch exponentiation. Inf. Process. Lett. 109(15): 832-837 (2009) - [c58]Chano Kim, Chanil Park, Junbeom Hur, Hanjin Lee, Hyunsoo Yoon:
A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks. FGIT-FGCN 2009: 405-412 - [c57]Seungjae Shin, Junbeom Hur, Hanjin Lee, Hyunsoo Yoon:
Bandwidth efficient key distribution for secure multicast in dynamic wireless mesh networks. WCNC 2009: 2202-2207 - 2008
- [j63]Jaehoon Jung, Seunghak Lee, Namgi Kim, Hyunsoo Yoon:
Efficient service discovery mechanism for wireless sensor networks. Comput. Commun. 31(14): 3292-3298 (2008) - [j62]Hanjin Lee, Dongwook Kim, Byungchun Chung, Hyunsoo Yoon:
Adaptive Hysteresis Using Mobility Correlation for Fast Handover. IEEE Commun. Lett. 12(2): 152-154 (2008) - [j61]Hyejeong Jeon, Seungil Kim, Lag-Yong Kim, Hee-Youn Lee, Hyunsoo Yoon:
Reliability measure for sound source localization. IEICE Electron. Express 5(6): 192-197 (2008) - [j60]Sang-Hun Chung, Seunghak Lee, Hyunsoo Yoon:
An Efficient TDMA Scheduling Scheme for Wireless Sensor and Actor Networks. IEICE Trans. Commun. 91-B(6): 1886-1895 (2008) - [j59]Dongwook Kim, Hanjin Lee, Namgi Kim, Hyunsoo Yoon:
Improving Handover Quality in 4G Mobile Systems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(7): 1686-1688 (2008) - [j58]Daeseon Choi, Younho Lee, Yongsu Park, Seunghun Jin, Hyunsoo Yoon:
Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks. IEICE Trans. Commun. 91-B(11): 3574-3583 (2008) - [j57]Younho Lee, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon:
An efficient delegation protocol with delegation traceability in the X.509 proxy certificate environment for computational grids. Inf. Sci. 178(14): 2968-2982 (2008) - [j56]Dongwook Kim, Bang Chul Jung, Hanjin Lee, Dan Keun Sung, Hyunsoo Yoon:
Optimal modulation and coding scheme selection in cellular networks with hybrid-ARQ error control. IEEE Trans. Wirel. Commun. 7(12-2): 5195-5201 (2008) - [c56]Junbeom Hur, HyeongSeop Shim, Pyung Kim, Hyunsoo Yoon, Nah-Oak Song:
Security Considerations for Handover Schemes in Mobile WiMAX Networks. WCNC 2008: 2531-2536 - 2007
- [j55]Heeyoul Kim, Byungchun Chung, Younho Lee, Yongsu Park, Hyunsoo Yoon:
Weakness of the Synchro-Difference LKH Scheme for Secure Multicast. IEEE Commun. Lett. 11(9): 765-767 (2007) - [j54]Heeyoul Kim, Younho Lee, Yongsu Park, Hyunsoo Yoon:
Reactive Key Management Scheme for Access Control in Group Communications. IEICE Trans. Commun. 90-B(4): 982-986 (2007) - [j53]Kwangwook Shin, Seunghak Lee, Geunhwi Lim, Hyunsoo Yoon:
A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables. IEICE Trans. Commun. 90-B(7): 1651-1662 (2007) - [j52]Younho Lee, Junbeom Hur, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon:
A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates. IEICE Trans. Commun. 90-B(11): 3259-3262 (2007) - [j51]Byungchun Chung, Hong Gil Kim, Hyunsoo Yoon:
Improved base-φ expansion method for Koblitz curves over optimal extension fields. IET Inf. Secur. 1(1): 19-26 (2007) - [j50]Dongwook Kim, Mrinalini Sawhney, Hyunsoo Yoon:
An effective traffic management scheme using adaptive handover time in next-generation cellular networks. Int. J. Netw. Manag. 17(2): 139-154 (2007) - [j49]Jaewon Lee, Heeyoul Kim, Younho Lee, Seong-Min Hong, Hyunsoo Yoon:
Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field. Int. J. Netw. Secur. 4(1): 99-106 (2007) - [j48]Young-Guk Ha, Joo-Chan Sohn, Young-Jo Cho, Hyunsoo Yoon:
A robotic service framework supporting automated integration of ubiquitous sensors and devices. Inf. Sci. 177(3): 657-679 (2007) - [j47]Heeyoul Kim, Jumin Song, Hyunsoo Yoon:
A practical approach of ID-based cryptosystem in ad hoc networks. Wirel. Commun. Mob. Comput. 7(7): 909-917 (2007) - [c55]Hanjin Lee, Dongwook Kim, Hyunsoo Yoon:
Performance of MCS Selection for Collaborative Hybrid-ARQ Protocol. Euro-Par 2007: 941-949 - [c54]Junbeom Hur, Chanil Park, Young-joo Shin, Hyunsoo Yoon:
An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks. ICOIN 2007: 629-638 - [c53]Junbeom Hur, Chanil Park, Hyunsoo Yoon:
An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks. IWSEC 2007: 121-136 - [c52]Junbeom Hur, Young-joo Shin, Hyunsoo Yoon:
Decentralized group key management for dynamic networks using proxy cryptography. Q2SWinet 2007: 123-129 - [c51]Seungwoo Jeon, Hanjin Lee, Hyunsoo Yoon:
Adaptive Resource Reservation for Efficient Resource Utilization in the Wireless Multimedia Network. NEW2AN 2007: 235-247 - 2006
- [j46]Soojin Lee, Byungchun Chung, Heeyoul Kim, Yunho Lee, Chanil Park, Hyunsoo Yoon:
Real-time analysis of intrusion detection alerts via correlation. Comput. Secur. 25(3): 169-183 (2006) - [j45]Minhee Cho, Namgi Kim, Hyunsoo Yoon:
User-Perceived QoS in a Wireless Packet Network with Multiple Channel Conditions. IEICE Trans. Commun. 89-B(2): 342-349 (2006) - [j44]Younho Lee, Yongsu Park, Heeyoul Kim, Seong-Min Hong, Hyunsoo Yoon:
Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment. IEICE Trans. Inf. Syst. 89-D(8): 2452-2455 (2006) - [j43]Younho Lee, Heeyoul Kim, Seong-Min Hong, Hyunsoo Yoon:
Expansion of Sliding Window Method for Finding Shorter Addition/Subtraction-Chains. Int. J. Netw. Secur. 2(1): 34-40 (2006) - [j42]Heeyoul Kim, Younho Lee, Seong-Min Hong, Hyunsoo Yoon:
Active Trial-and-error Attack on SASC Protocols. Int. J. Netw. Secur. 2(2): 105-110 (2006) - [c50]Heeyoul Kim, Younho Lee, Byungchun Chung, Hyunsoo Yoon, Jaewon Lee, KyungIm Jung:
Digital Rights Management with Right Delegation for Home Networks. ICISC 2006: 233-245 - [c49]Younho Lee, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon:
A New Proxy Signature Scheme Providing Self-delegation. ICISC 2006: 328-342 - [c48]Chanil Park, Junbeom Hur, Chanoe Kim, Young-joo Shin, Hyunsoo Yoon:
Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs. WISA 2006: 349-363 - 2005
- [j41]Namgi Kim, Hyunsoo Yoon:
Wireless packet fair queueing algorithms with link level retransmission. Comput. Commun. 28(7): 713-725 (2005) - [j40]Kichan Bae, Hyunsoo Yoon:
Autonomous Clustering Scheme for Wireless Sensor Networks Using Coverage Estimation-Based Self-Pruning. IEICE Trans. Commun. 88-B(3): 973-980 (2005) - [j39]Jaewon Lee, Seong-Min Hong, Hyunsoo Yoon:
Securing Mobile Agents by Integrity-Based Encryption. IEICE Trans. Inf. Syst. 88-D(9): 2102-2104 (2005) - [j38]Namgi Kim, Hyunsoo Yoon:
Handoff Procedure for Seamless Service in IP and OFDM Based 4G Mobile Systems. IEICE Trans. Electron. 88-C(12): 2338-2340 (2005) - [c47]Junbeom Hur, Younho Lee, Seong-Min Hong, Hyunsoo Yoon:
Trust Management for Resilient Wireless Sensor Networks. ICISC 2005: 56-68 - [c46]Namgi Kim, Sunwoong Choi, Hyunsoo Yoon:
IEEE 802.11b WLAN Performance with Variable Transmission Rates: In View of High Level Throughput. ICN (2) 2005: 1080-1087 - [c45]Young-Guk Ha, Jaehong Kim, Minsu Jang, Joo-Chan Sohn, Hyunsoo Yoon:
Automated Teleoperation of Web-Based Devices Using Semantic Web Services. IEA/AIE 2005: 185-188 - [c44]Heeyoul Kim, Seong-Min Hong, Hyunsoo Yoon, Jung Wan Cho:
Secure Group Communication with Multiplicative One-way Functions. ITCC (1) 2005: 685-690 - 2004
- [c43]Namgi Kim, Hyunsoo Yoon:
Packet fair queueing algorithms for wireless networks with link level retransmission. CCNC 2004: 122-127 - [c42]Yuseung Jeong, Namgi Kim, Hyunsoo Yoon:
A Smart Handoff Procedure in 4G Networks. ICETE (3) 2004: 172-180 - [c41]Heeyoul Kim, Jaewon Lee, Hyunsoo Yoon, Jung Wan Cho:
Secure Group Communication with Low Communication Complexity. PDCAT 2004: 586-590 - [c40]Jaewon Lee, Heeyoul Kim, Hyunsoo Yoon:
Tamper Resistant Software by Integrity-Based Encryption. PDCAT 2004: 608-612 - 2002
- [c39]Sang-Hun Chung, Hyunsoo Yoon, Jung Wan Cho:
A Fast Handoff Scheme For IP over Bluetooth. ICPP Workshops 2002: 51-55 - [c38]Geunhwi Lim, Kwangwook Shin, Seunghak Lee, Hyunsoo Yoon, Joong Soo Ma:
Link Stability and Route Lifetime in Ad-hoc Wireless Networks. ICPP Workshops 2002: 116-123 - [c37]Kwangwook Shin, Seunghak Lee, Geunhwi Lim, Hyunsoo Yoon, Joong Soo Ma:
Grapes: Topology-Based Hierarchical Virtual Network for Peer-to-Peer Lookup Services. ICPP Workshops 2002: 159-166 - 2001
- [j37]Byungchan Ahn, Hyunsoo Yoon, Jung Wan Cho:
A design of macro-micro CDMA cellular overlays in the existing big urban areas. IEEE J. Sel. Areas Commun. 19(10): 2094-2104 (2001) - [c36]Minhee Cho, Jae-Man Kim, Hyunsoo Yoon:
A new call admission control scheme using the user conformity for non-uniform wireless systems. VTC Fall 2001: 1339-1343 - 2000
- [j36]Seong-Min Hong, Seungwon Lee, Yongsoo Park, Yookun Cho, Hyunsoo Yoon:
On the construction of a powerful distributed authentication server without additional key management. Comput. Commun. 23(17): 1638-1644 (2000) - [j35]Sang-Yeop Oh, Hyunsoo Yoon:
Punctuated Equilibria in Simple Genetic Algorithms for Functions of Unitation. Complex Syst. 12(2) (2000) - [j34]Hyojeong Song, Boseob Kwon, Ikhyeon Jang, Hyunsoo Yoon:
An output queueing analysis of multipath ATM switches. J. Syst. Archit. 46(11): 1005-1012 (2000) - [c35]Minhee Cho, Geunhwi Lim, Seong Bae Eun, Hyunsoo Yoon:
Handling Camera Anchors in Distributed Surveillance Systems. ICDCS Workshop on Distributed Real-Time Systems 2000: B37-B44 - [c34]Jong-Min Lee, Seung Ryoul Maeng, Hyunsoo Yoon, Minhee Cho, Boseob Kwon, Jin-Soo Kim, Myung-Kyun Kim:
Movement-based Location Tracking with Extended Spatial Localities. ICDCS Workshop on Distributed Real-Time Systems 2000: B57-B62
1990 – 1999
- 1999
- [j33]Ki-Ho Cho, Hyunsoo Yoon:
Design and analysis of the virtual-time-based round robin fair scheduling algorithm for QoS guarantees. Comput. Commun. 22(12): 1150-1159 (1999) - [j32]Jaehyung Park, Hyunsoo Yoon:
Novel recursive multicast algorithms in multistage interconnection networks for ATM switches. J. High Speed Networks 8(4): 265-280 (1999) - [j31]Hyojeong Song, Boseob Kwon, Hyunsoo Yoon:
Throttle and preempt: A flow control policy for real-time traffic in wormhole networks. J. Syst. Archit. 45(8): 633-649 (1999) - [j30]Jae-Hyun Park, Hyunsoo Yoon, Heung-Kyu Lee:
The deflection self-routing Banyan network: a large-scale ATM switch using the fully adaptive self-routing and its performance analyses. IEEE/ACM Trans. Netw. 7(4): 588-604 (1999) - [c33]Seungwon Lee, Seong-Min Hong, Hyunsoo Yoon, Yookun Cho:
Accelerating Key Establishment Protocols for Mobile Communication. ACISP 1999: 51-63 - [c32]Sang-Kwon Lee, Minhee Cho, Hyeon-Ju Yoon, Seong Bae Eun, Hyunsoo Yoon, Jung Wan Cho, Joonwon Lee:
Design and Implementation of a Multi-Threaded TMN Agent System. ICPP Workshops 1999: 332-337 - 1998
- [j29]Jaehyung Park, Hyunsoo Yoon:
Cost-effective algorithms for multicast connection in ATM switches based on self-routing multistage networks. Comput. Commun. 21(1): 54-64 (1998) - [j28]Jinsoo Kim, Jaehyung Park, Hyunsoo Yoon, Jung Wan Cho:
Fault-tolerant multicasting in MINs for ATM switches. IEEE Commun. Lett. 2(12): 331-333 (1998) - [j27]Geunmo Kim, Hyunsoo Yoon:
On Submesh Allocation for Mesh Multicomputers: A Best-Fit Allocation and a Virtual Submesh Allocation for Faulty Meshes. IEEE Trans. Parallel Distributed Syst. 9(2): 175-185 (1998) - [c31]Ki-Ho Cho, Hyunsoo Yoon:
Design and analysis of a fair scheduling algorithm for QoS guarantees in high-speed packet-switched networks. ICC 1998: 1520-1525 - [c30]Seong-Min Hong, Jun-Bum Shin, H. Lee-Kwang, Hyunsoo Yoon:
A new appraoch to server-aided secret computation. ICISC 1998: 33-45 - [c29]Jinsoo Kim, Jaehyung Park, Jung Wan Cho, Hyunsoo Yoon:
Fault-Tolerant Multicasting in Multistage Interconnection Networks. ICPP 1998: 156-163 - [c28]W. Kwon, Boseob Kwon, Jae-Hyun Park, Hyunsoo Yoon:
Two-phase Multicast in Wormhole-Switched Bidirectional Multistage Banyan Networks. ICPP 1998: 374-380 - 1997
- [j26]Hyojeong Song, Boseob Kwon, Ji-Yun Kim, Hyunsoo Yoon:
Two Real-Time Flow Controls in Wormhole Networks. Int. J. High Speed Comput. 9(3): 237-255 (1997) - [j25]Jin-Soo Kim, Seung Ryoul Maeng, Hyunsoo Yoon:
Embedding of rings in 2-D meshes and tori with faulty nodes. J. Syst. Archit. 43(9): 643-654 (1997) - [j24]Jin-Soo Kim, Seung Ryoul Maeng, Hyunsoo Yoon:
Ring Embedding in Hypercubes with Faculty Nodes. Parallel Process. Lett. 7(3): 285-296 (1997) - [j23]Myung-Kyun Kim, Hyunsoo Yoon, Seung Ryoul Maeng:
On the Correctness of Inside-Out Routing Algorithm. IEEE Trans. Computers 46(7): 820-823 (1997) - [c27]Sang-Yeop Oh, Hyunsoo Yoon:
An Analysis of Punctuated Equilibria in Simple Genetic Algorithms. Artificial Evolution 1997: 195-206 - [c26]Ikhyeon Jang, Jaehyung Park, Jung Wan Cho, Hyunsoo Yoon:
An Efficient Causal Order Algorithm for Message Delivery in Distributed System. FTDCS 1997: 270-275 - [c25]Hyojeong Song, Boseob Kwon, Hyunsoo Yoon:
Throttle and Preempt: A New Flow Control for Real-Time Communications in Wormhole Networks. ICPP 1997: 198-202 - [c24]Myoung Kwon Tcheun, Hyunsoo Yoon, Seung Ryoul Maeng:
An adaptive sequential prefetching scheme in shared-memory multiprocessors. ICPP 1997: 306-313 - [c23]Jaehyung Park, Lillykutty Jacob, Hyunsoo Yoon:
Performance Analysis of a Multicast Switch Based on Multistage Interconnection Networks. INFOCOM 1997: 939-946 - [c22]Ki-Ho Cho, Hyunsoo Yoon:
Virtual-Time-Based Round Robin: A Hardware-Eflicient Fair Scheduling Algorithm for High-Speed Networks. PDPTA 1997: 410-415 - 1996
- [j22]Geunmo Kim, Hyunsoo Yoon:
On the Best Fit Submesh Allocation Strategy in Mesh-Connected Multicomputers. Int. J. High Speed Comput. 8(2): 115-136 (1996) - [j21]Jaehyung Park, Hyunsoo Yoon:
Design and Performance Analysis of Multistage Interconnection Networks Using a Recursive Multicast Algorithm. Int. J. High Speed Comput. 8(4): 347-362 (1996) - [j20]Ji-Yun Kim, Hyunsoo Yoon, Seung Ryoul Maeng, Jung Wan Cho:
Drop-and-reroute: A new flow control policy for adaptive wormhole routing. J. Syst. Archit. 42(3): 195-209 (1996) - [j19]Geunmo Kim, Hyunsoo Yoon:
Free Submesh List Strategy: a Best Fit Submesh Allocation in Mesh Connected Multicomputers. Parallel Process. Lett. 6(1): 75-86 (1996) - [c21]Seong-Min Hong, Sang-Yeop Oh, Hyunsoo Yoon:
New Modular Multiplication Algorithms for Fast Modular Exponentiation. EUROCRYPT 1996: 166-177 - [c20]Myung-Kyun Kim, Hyunsoo Yoon, Seung Ryoul Maeng:
A Necessary and Sufficient Condition for Proper Routing in Omega-Omega Network. Euro-Par, Vol. I 1996: 278-282 - [c19]Jaehyung Park, Hyunsoo Yoon, Jung Wan Cho:
Novel algorithms for multicast communication in self-routing MIN-based ATM switches. ICNP 1996: 260- - [c18]Byungho Kim, Boseob Kwon, Hyunsoo Yoon, Seungryul Maeng, Jung Wan Cho:
Performance Analysis of Multipath Multistage Interconnection Networks with Nonuniform Output Traffic Distribution. PDP 1996: 196-203 - [c17]Geunmo Kim, Jinchun Kim, Hyunsoo Yoon:
A New Efficient Submesh Allocation Strategy for Mesh Multicomputers. PDP 1996: 227-234 - 1995
- [j18]Jai-Hoon Chung, Hyunsoo Yoon, Seung Ryoul Maeng:
Restriction-Free Adaptive Wormhole Routing in Multicomputer Networks. Int. J. High Speed Comput. 7(1): 89-107 (1995) - [j17]Myung-Kyun Kim, Hyunsoo Yoon, Seung Ryoul Maeng:
Bit-permute multistage interconnection networks. Microprocess. Microprogramming 41(7): 449-468 (1995) - [j16]Hyunsoo Yoon, Ming T. Liu, Kyungsook Y. Lee, Young Man Kim:
The knockout switch under nonuniform traffic. IEEE Trans. Commun. 43(6): 2149-2156 (1995) - [c16]Byungho Kim, Boseob Kwon, Jinchun Kim, Hyunsoo Yoon, Jung Wan Cho:
Performance analysis of an ATM switch with multiple paths. ICNP 1995: 100- - [c15]Seong Bae Eun, Jong-Wan Kim, Byeong Man Kim, Hyunsoo Yoon, Seungryul Maeng:
Nonpreemptive scheduling algorithms for multimedia communication in local area networks. ICNP 1995: 356-364 - [c14]Ji-Yun Kim, Hyunsoo Yoon, Seung Ryoul Maeng, Jung Wan Cho:
Drop-and-Reroute: A New flow Control Policy for Adaptive Wormhole Routing. ICPP (1) 1995: 60-67 - [c13]Boseob Kwon, Byungho Kim, Jaehyung Park, Hyunsoo Yoon, Jung Wan Cho:
Performance analysis of output buffers in multistage interconnection networks with multiple paths. SPDP 1995: 260-265 - [c12]Jae-Hyun Park, Hyunsoo Yoon, Heung-Kyu Lee:
The cyclic banyan network: a fault tolerant multistage interconnection network with the fully-adaptive self-routing. SPDP 1995: 702-710 - 1994
- [j15]Jaehyun Park, Hyunsoo Yoon, Heungkyu Lee, Seong Bae Eun:
The Ring-Banyan Network: a Fault Tolerant Multistage Interconnection Network for Multiprocessor Systems. Int. J. High Speed Comput. 6(4): 557-577 (1994) - [j14]Jai-Hoon Chung, Hyunsoo Yoon, Seung Ryoul Maeng:
A new deadlock prevention scheme for nonminimal adaptive wormhole routing. Microprocess. Microprogramming 40(7): 465-486 (1994) - [j13]Seong Bae Eun, Eun Suk No, Hyung Chul Kim, Hyunsoo Yoon, Seung Ryoul Maeng:
Eventor: An Authoring System for Interactive Multimedia Applications. Multim. Syst. 2(3): 129-140 (1994) - 1993
- [j12]Kyungsook Y. Lee, Hyunsoo Yoon, Ming T. Liu:
Performance Evaluation of a Class of Multipath Packet Switching Interconnection Networks. J. Parallel Distributed Comput. 17(4): 353-359 (1993) - [j11]Jaecheol Gong, Byeong Man Kim, Hyunsoo Yoon, Heungkyu Lee, Si-Yeong Hwang:
An improved algorithm for protocol validation by extended circular exploration. Microprocess. Microprogramming 36(4): 179-194 (1993) - [c11]Seong Bae Eun, Eun Suk No, Hyung Chul Kim, Hyunsoo Yoon, Seung Ryoul Maeng:
Specification of Multimedia Composition and a Visual Programming Environment. ACM Multimedia 1993: 167-173 - [c10]Dongwook Shin, Youngmin Chung, Hyunsoo Yoon:
Mode Based Type Inference for Prolog Programs. SEKE 1993: 239-243 - [c9]Geunmo Kim, Hyunsoo Yoon:
A Processor Allocation Strategy Using Cube Coalescing in Hypercube Multicomputers. SPDP 1993: 596-605 - 1992
- [j10]Ohan Kang, Byeong Man Kim, Hyunsoo Yoon, Seung Ryoul Maeng, Jung Wan Cho:
Heuristic Subcube Allocation with Task Migration in Hypercube Systems. Int. J. High Speed Comput. 4(2): 121-142 (1992) - [j9]Jai-Hoon Chung, Hyunsoo Yoon, Seung Ryoul Maeng:
A systolic array exploiting the inherent parallelisms of artificial neural networks. Microprocess. Microprogramming 33(3): 145-159 (1992) - [j8]D. H. Oh, Jong H. Nang, Hyunsoo Yoon, Seung Ryoul Maeng:
An efficient mapping of Boltzmann machine computations onto distributed-memory multiprocessors. Microprocess. Microprogramming 33(4): 223-236 (1992) - 1991
- [j7]Kyungsook Y. Lee, Hyunsoo Yoon:
Indirect Star-Type Networks for Large Multiprocessor Systems. IEEE Trans. Computers 40(11): 1277-1282 (1991) - [c8]Sung Jun Lee, Ki Chul Kim, Hyunsoo Yoon, Jung Wan Cho:
Application of fully recurrent neural networks for speech recognition. ICASSP 1991: 77-80 - [c7]Jai-Hoon Chung, Hyunsoo Yoon, Seung Ryoul Maeng:
A Systolic Array Exploiting the Inherent Parallelisms of Artificial Neural Networks. ICPP (1) 1991: 652-653 - [c6]S. Y. Yoon, Ohan Kang, Hyunsoo Yoon, Seung Ryoul Maeng, Jung Wan Cho:
A heuristic processor allocation strategy in hypercube systems. SPDP 1991: 574-581 - 1990
- [j6]Hyunsoo Yoon, Kyungsook Y. Lee, Amos Bahiri:
On the Modulo M Translators for the Prime Memory System. J. Parallel Distributed Comput. 8(1): 72-76 (1990) - [j5]Hyunsoo Yoon, Jong H. Nang, Seung Ryoul Maeng:
Parallel simulation of multilayered neural networks on distributed-memory multiprocessors. Microprocessing and Microprogramming 29(3): 185-195 (1990) - [j4]Hyunsoo Yoon, Kyungsook Y. Lee, Ming T. Liu:
Performance Analysis of Multibuffered Packet-Switching Networks in Multiprocessor Systems. IEEE Trans. Computers 39(3): 319-327 (1990) - [j3]Kyungsook Y. Lee, Hyunsoo Yoon:
The B-Network: A Multistage Interconnection Network with Backward Links. IEEE Trans. Computers 39(7): 966-969 (1990) - [c5]Ki Chul Kim, Hyunsoo Yoon, Jung Wan Cho:
Enhanced parametric representation using binarized spectrum. ICSLP 1990: 201-204 - [c4]Yong Duk Cho, Ki Chul Kim, Hyunsoo Yoon, Seung Ryoul Maeng, Jung Wan Cho:
Extended elman's recurrent neural network for syllable recognition. ICSLP 1990: 1057-1060
1980 – 1989
- 1989
- [j2]Hyunsoo Yoon, Kyungsook Y. Lee:
B-Banyan and B-Delta Networks for Multiprocessor Systems. J. Parallel Distributed Comput. 7(3): 570-582 (1989) - [j1]Kyungsook Y. Lee, Hyunsoo Yoon:
The PM22I Interconnection Network. IEEE Trans. Computers 38(2): 302-307 (1989) - 1987
- [c3]Hyunsoo Yoon, Kyungsook Y. Lee, Ming T. Liu:
A New Approach to Internetworking of Integrated Services Local Networks. ICDCS 1987: 390-397 - [c2]Hyunsoo Yoon, Kyungsook Y. Lee, Ming T. Liu:
Performance Analysis and Comparison of Packet Switching Interconnection Networks. ICPP 1987: 542-545 - [c1]Hyunsoo Yoon, Kyungsook Y. Lee, Ming T. Liu:
Performance Analysis of Multi-Buffered Packet-Switching Networks in Multiprocessor Systems. ICS 1987: 124-137
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint