Follow
YUNA KIM
Title
Cited by
Cited by
Year
Reducing IPTV channel zapping time based on viewer’s surfing behavior and preference
Y Kim, JK Park, HJ Choi, S Lee, H Park, J Kim, Z Lee, K Ko
2008 IEEE International Symposium on Broadband Multimedia Systems and …, 2008
742008
Efficient privacy-preserving matrix factorization via fully homomorphic encryption
S Kim, J Kim, D Koo, Y Kim, H Yoon, J Shin
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
702016
{Hardware-Assisted}{On-Demand} Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices
Y Cho, J Shin, D Kwon, MJ Ham, Y Kim, Y Paek
2016 USENIX Annual Technical Conference (USENIX ATC 16), 565-578, 2016
632016
Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption
J Kim, D Koo, Y Kim, H Yoon, J Shin, S Kim
ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-30, 2018
562018
Efficient transfer learning schemes for personalized language modeling using recurrent neural network
S Yoon, H Yun, Y Kim, G Park, K Jung
Workshops at the Thirty-First AAAI Conference on Artificial Intelligence, 2017
412017
binOb+ a framework for potent and stealthy binary obfuscation
B Lee, Y Kim, J Kim
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
242010
LT-OLSR: Attack-tolerant OLSR against link spoofing
Y Jeon, TH Kim, Y Kim, J Kim
37th Annual IEEE Conference on Local Computer Networks, 216-219, 2012
192012
A distributed energy-efficient clustering scheme for deploying IDS in MANETs
Y Kim, KY Jung, TH Kim, J Kim
Telecommunication Systems, 1-12, 2011
112011
Web prefetching using display-based prediction
Y Kim, J Kim
Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003 …, 2003
112003
PolyI-D: polymorphic worm detection based on instruction distribution
K Lee, Y Kim, S Hong, J Kim
Information Security Applications, 45-59, 2007
52007
AdaFF: Adaptive Failure-Handling Framework for Composite Web Services
KIM Yuna, WY Lee, KH Kim, KIM Jong
IEICE TRANSACTIONS on Information and Systems 93 (4), 834-842, 2010
42010
Allowing user-specified failure handling in web services composition
Y Kim, J Kim
Proceedings of the 2nd international conference on Ubiquitous information …, 2008
42008
Power-aware Real-time Task Scheduling in Dependable Embedded Systems
KH Kim, Y Kim, J Kim
IEMEK Journal of Embedded Systems and Applications 3 (1), 25-29, 2008
22008
Exclusion of Forged Files from Multi-source Downloadable P2P Systems
Y Kim, J Kim, J You, H Park
2009 International Conference on Advanced Information Networking and …, 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–14