44 | [SCI paper] Junseok Yang, Seokjun Lee and Sungyong Ahn, "Selective Power-Loss-Protection Method for Write Buffer in ZNS SSDs", electronics 11(7), 202203 | infosec | 21 |
78 | [국제학회] Jiwin Seo, et al., "Sfitag: Efficient Software Fault Isolation with Memory Tagging for ARM Kernel Extensions", ACMASIACC23, 20230710 | infosec | 15 |
20 | [SCI paper] Jinjae Lee, et al., "CoMeT: Configurable Tagged Memory Extension", sensors, 21(22), 202111 | infosec | 31 |
81 | [국제학회] Jaehyun Kim, et al., "Improving Voting of Block Producers for Delegated Proof-of-Stake with Quadratic Delegate", Platcon2023, 20230816 | infosec | 18 |
49 | [SCI paper] J. KIM, J. SHIN, S. CHOI and Y. CHOI, "A Study on Prevention and Automatic Recovery of Blockchain Networks Against Persistent Censorship Attacks", IEEE Access 10, 202210 | infosec | 30 |
89 | [국제학회] Iqbal, et al., "The Sky's Betrayal: Drone Hijacking on DJI Enhanced WiFi Protocol", WISA2023, 20230823 | infosec | 18 |
74 | [SCI paper] Hyoeun Kang, et al., "A new fluid flow approximation method using a vision transformer and a U-shaped convolutional neural network", AIP Advances, 20230206 | infosec | 17 |
111 | [국내학회] HUYNH THIEN TRANG, MYOUNG-JONG KIM, "Reconciling the perceptions of academics and practitioners on earnings management", 한국경영정보학회 추계학술대회, 20231125 | infosec | 8 |
54 | [국제학회] Harashta Tatimma Larasati, Thi-Thu-Huong Le and Howon Kim, "Trends of Quantum Computing Applications to Computer Vision", 2022 PlatCon, 202208 | infosec | 34 |
53 | [국제학회] Harashta Tatimma Larasati, Muhammad Firdaus and Howon Kim, "Quantum Federated Learning: Remarks and Challenges", 2022 9th IEEE CSCloud/2022 IEEE 8th EdgeCom, 202206 | infosec | 28 |
88 | [국제학회] Harashta Tatimma Larasati, et al., "Quantum Circuit Designs of Point Doubling for Binary Elliptic Curves", WISA2023, 20230823 | infosec | 11 |
10 | [SCI paper] Harashta Tatimma Larasati, et al., "Quantum Circuit Design of Toom 3-Way Multiplication", Applied Sciences 11(9), 202104 | infosec | 26 |
16 | [국제학회] Harashta Tatimma Larasati, et al, "Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve Discrete Logarithm Problem", WISA 2021, 202108 | infosec | 20 |
76 | [SCI paper] HARASHTA TATIMMA LARASATI, DEDY SEPTONO CATUR PUTRANTO, RINI WISNU WARDHANI, AND HOWON KIM "Depth Optimization of FLT-Based Quantum Inversion Circuit", IEEE Access, 20230607 | infosec | 13 |
73 | [SCI paper] Haeyoung Kim, Harashta Tatimma Larasati, Jonguk Park, Howon Kim and Donghyun Kwon, "DEMIX: Domain-Enforced Memory Isolation for Embedded System ", Sensors 23, 20230329 | infosec | 13 |
3 | [국제학회] Haeyoung Kim, et al., "RIMI: instruction-level memory isolation for embedded systems on RISC-V", ICCAD 2020, 202011 | infosec | 24 |
51 | [SCI paper] GISU YEO, YERYEONG KIM, SUHYEON SONG and DONGHYUN KWON, "Efficient CFI Enforcement for Embedded Systems using ARM TrustZone-M", IEEE Access 10, 202212 | infosec | 34 |
21 | [SCI paper] Gijun Oh, et al., "Efficient Key-Value Data Placement for ZNS SSD", Applied Sciences 11(24), 202112 | infosec | 42 |
83 | [국제학회] Dedy Septono Catur Putranto, et al., "Exploring Hybrid Quantum-Classical Approaches for Information Security", WISA2023, 20230823 | infosec | 16 |
92 | [국제학회] Chang Woo Choi, et al., "Indoor Space Flow Analysis Based on Deep Learning", 2023 ICAIIC, 20230220 | infosec | 17 |