Hyunsoo Yoon

According to our database1, Hyunsoo Yoon authored at least 185 papers between 1987 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A Simple and Enriched Closed-Form Formula for Cell Residence Time in 5G Heterogeneous Networks.
Wireless Personal Communications, 2018

Duo: Software Defined Intrusion Tolerant System Using Dual Cluster.
Security and Communication Networks, 2018

Efficient Approach for Mitigating Mobile Phishing Attacks.
IEICE Transactions, 2018

CAPTCHA Image Generation Systems Using Generative Adversarial Networks.
IEICE Transactions, 2018

Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network.
IEEE Access, 2018

POSTER: Zero-Day Evasion Attack Analysis on Race between Attack and Defense.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Designing and Implementing a Diversity Policy for Intrusion-Tolerant Systems.
IEICE Transactions, 2017

Detecting Online Game Chargeback Fraud Based on Transaction Sequence Modeling Using Recurrent Neural Network.
Proceedings of the Information Security Applications - 18th International Conference, 2017

Friend-Safe Adversarial Examples in an Evasion Attack on a Deep Neural Network.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

2016
RM-MAC: a reservation based multi-channel MAC protocol for wireless sensor networks.
Wireless Networks, 2016

Channel-quality-aware multihop broadcast for asynchronous multi-channel wireless sensor networks.
Wireless Networks, 2016

Motion-MiX DHT for Wireless Mobile Networks.
IEEE Trans. Mob. Comput., 2016

Protecting secret keys in networked devices with table encoding against power analysis attacks.
J. High Speed Networks, 2016

Sorting Method for Fully Homomorphic Encrypted Data Using the Cryptographic Single-Instruction Multiple-Data Operation.
IEICE Transactions, 2016

Hybrid Recovery-Based Intrusion Tolerant System for Practical Cyber-Defense.
IEICE Transactions, 2016

Preemptive Real-Time Scheduling Incorporating Security Constraint for Cyber Physical Systems.
IEICE Transactions, 2016

Analysis of Cell Sojourn Time in Heterogeneous Networks With Small Cells.
IEEE Communications Letters, 2016

Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption.
IACR Cryptology ePrint Archive, 2016

On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators.
Computers & Security, 2016

Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Efficient Packet Routing in Highly Mobile Wireless Networks.
Wireless Personal Communications, 2015

Peer-assisted multimedia delivery using periodic multicast.
Inf. Sci., 2015

End-to-end mobility support in content centric networks.
Int. J. Communication Systems, 2015

Customer Data Scanner for Hands-Free Mobile Payment.
IEICE Transactions, 2015

Fully Batch Processing Enabled Memory Integrity Verification Algorithm Based on Merkle Tree.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

2014
Partition and Cooperation for Crowded Multi-rate WLANs.
Wireless Personal Communications, 2014

Design of a Secure System Considering Quality of Service.
Symmetry, 2014

On the Design of Delay based Admission Control in Hierarchical Networks.
TIIS, 2014

A Novel Routing Protocol for Cognitive Radio Networks with Cooperation Process.
TIIS, 2014

A Novel Intrusion Tolerant System Using Live Migration.
IEICE Transactions, 2014

First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA.
IACR Cryptology ePrint Archive, 2014

2013
Base station association schemes to reduce unnecessary handovers using location awareness in femtocell networks.
Wireless Networks, 2013

EMBA: An Efficient Multihop Broadcast Protocol for Asynchronous Duty-Cycled Wireless Sensor Networks.
IEEE Trans. Wireless Communications, 2013

A novel Adaptive Cluster Transformation (ACT)-based intrusion tolerant architecture for hybrid information technology.
The Journal of Supercomputing, 2013

A Survey on Communication Protocols for Wireless Sensor Networks.
JCSE, 2013

A Survey on Intrusion-Tolerant System.
JCSE, 2013

Algorithm learning based neural network integrating feature selection and classification.
Expert Syst. Appl., 2013

Enhanced cooperative communication MAC for mobile wireless networks.
Computer Networks, 2013

Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage.
Computers & Electrical Engineering, 2013

The Design of a Robust Intrusion Tolerance System through Advanced Adaptive Cluster Transformation and Vulnerability-Based VM Selection.
Proceedings of the 32th IEEE Military Communications Conference, 2013

2012
Authenticated public key broadcast encryption scheme secure against insiders' attack.
Mathematical and Computer Modelling, 2012

Congestion control for sudden bandwidth changes in TCP.
Int. J. Communication Systems, 2012

The design of adaptive intrusion tolerant system(ITS) based on historical data.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

A Secure Self-Encryption Scheme for Resource Limited Mobile Devices.
Proceedings of the International Conference on IT Convergence and Security, 2012

A Novel Intrusion Tolerant System Based on Adaptive Recovery Scheme (ARS).
Proceedings of the International Conference on IT Convergence and Security, 2012

Mobility support in content centric networks.
Proceedings of the ICN'12, 2012

2011
Active Queue Management for Flow Fairness and Stable Queue Length.
IEEE Trans. Parallel Distrib. Syst., 2011

Sensor Node Localization by Three Mobile Anchors in the Wireless Sensor Networks.
IEICE Transactions, 2011

MiGuard : Detecting and Guarding against Malicious Iframe through API Hooking.
IEICE Electronic Express, 2011

AQM for Weighted Fairness in Wireless LANs.
IEEE Communications Letters, 2011

A Smart Handover Decision Algorithm Using Location Prediction for Hierarchical Macro/Femto-Cell Networks.
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011

2010
Distributed Fair Scheduling for Wireless Mesh Networks Using IEEE 802.11.
IEEE Trans. Vehicular Technology, 2010

A Multi-service Group Key Management Scheme for Stateless Receivers in Wireless Mesh Networks.
MONET, 2010

A Retransmission-Enhanced Duty-Cycle MAC Protocol Based on the Channel Quality for Wireless Sensor Networks.
IEICE Transactions, 2010

VAMSD: Voronoi Diagram Based Autonomous Mobile Sensor Deployment for Maximizing Coverage.
IEICE Transactions, 2010

Self-healing key distribution scheme with long service time.
IEICE Electronic Express, 2010

Customized Forwarding in application layer multicast for real-time services.
IEICE Electronic Express, 2010

An energy-efficient dispersion method for deployment of mobile sensor networks.
IEICE Electronic Express, 2010

A pseudo-random asynchronous duty cycle MAC protocol in wireless sensor networks.
IEEE Communications Letters, 2010

MRMAC: Medium Reservation MAC Protocol for Reducing End-to-End Delay and Energy Consumption in Wireless Sensor Networks.
IEEE Communications Letters, 2010

Providing forwarding assurance in multi-hop wireless networks.
Computer Communications, 2010

Chosen ciphertext secure authenticated group communication using identity-based signcryption.
Computers & Mathematics with Applications, 2010

An efficient identity-based proxy signcryption for secure broadcast.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

2009
Improved batch exponentiation.
Inf. Process. Lett., 2009

Autonomous broadcast pruning in wireless ad hoc networks using coverage estimation.
Int. J. Pervasive Computing and Communications, 2009

A Resilient and Efficient Replication Attack Detection Scheme for Wireless Sensor Networks.
IEICE Transactions, 2009

A Velocity-Based Bicasting Handover Scheme for 4G Mobile Systems.
IEICE Transactions, 2009

A Decentralized Multi-Group Key Management Scheme.
IEICE Transactions, 2009

Preamble allocation scheme using trajectory information for mobile relay stations.
IEEE Communications Letters, 2009

Long-term flow fairness with fixed memory space.
IEEE Communications Letters, 2009

Bandwidth efficient key distribution for secure multicast in dynamic wireless mesh networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks.
Proceedings of the Communication and Networking, 2009

2008
Optimal modulation and coding scheme selection in cellular networks with hybrid-ARQ error control.
IEEE Trans. Wireless Communications, 2008

An efficient delegation protocol with delegation traceability in the X.509 proxy certificate environment for computational grids.
Inf. Sci., 2008

Improving Handover Quality in 4G Mobile Systems.
IEICE Transactions, 2008

An Efficient TDMA Scheduling Scheme for Wireless Sensor and Actor Networks.
IEICE Transactions, 2008

Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks.
IEICE Transactions, 2008

Reliability measure for sound source localization.
IEICE Electronic Express, 2008

Adaptive Hysteresis Using Mobility Correlation for Fast Handover.
IEEE Communications Letters, 2008

Efficient service discovery mechanism for wireless sensor networks.
Computer Communications, 2008

Security Considerations for Handover Schemes in Mobile WiMAX Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

2007
A practical approach of ID-based cryptosystem in ad hoc networks.
Wireless Communications and Mobile Computing, 2007

A robotic service framework supporting automated integration of ubiquitous sensors and devices.
Inf. Sci., 2007

Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field.
I. J. Network Security, 2007

An effective traffic management scheme using adaptive handover time in next-generation cellular networks.
Int. Journal of Network Management, 2007

Improved base-φ expansion method for Koblitz curves over optimal extension fields.
IET Information Security, 2007

A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables.
IEICE Transactions, 2007

A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates.
IEICE Transactions, 2007

Reactive Key Management Scheme for Access Control in Group Communications.
IEICE Transactions, 2007

Weakness of the Synchro-Difference LKH Scheme for Secure Multicast.
IEEE Communications Letters, 2007

Adaptive Resource Reservation for Efficient Resource Utilization in the Wireless Multimedia Network.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2007

Decentralized group key management for dynamic networks using proxy cryptography.
Proceedings of the Q2SWinet'07, 2007

An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks.
Proceedings of the Advances in Information and Computer Security, 2007

An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

Performance of MCS Selection for Collaborative Hybrid-ARQ Protocol.
Proceedings of the Euro-Par 2007, 2007

2006
Expansion of Sliding Window Method for Finding Shorter Addition/Subtraction-Chains.
I. J. Network Security, 2006

Active Trial-and-error Attack on SASC Protocols.
I. J. Network Security, 2006

Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment.
IEICE Transactions, 2006

User-Perceived QoS in a Wireless Packet Network with Multiple Channel Conditions.
IEICE Transactions, 2006

Real-time analysis of intrusion detection alerts via correlation.
Computers & Security, 2006

Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

A New Proxy Signature Scheme Providing Self-delegation.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

Digital Rights Management with Right Delegation for Home Networks.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

2005
Securing Mobile Agents by Integrity-Based Encryption.
IEICE Transactions, 2005

Handoff Procedure for Seamless Service in IP and OFDM Based 4G Mobile Systems.
IEICE Transactions, 2005

Autonomous Clustering Scheme for Wireless Sensor Networks Using Coverage Estimation-Based Self-Pruning.
IEICE Transactions, 2005

Wireless packet fair queueing algorithms with link level retransmission.
Computer Communications, 2005

Secure Group Communication with Multiplicative One-way Functions.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Automated Teleoperation of Web-Based Devices Using Semantic Web Services.
Proceedings of the Innovations in Applied Artificial Intelligence, 2005

IEEE 802.11b WLAN Performance with Variable Transmission Rates: In View of High Level Throughput.
Proceedings of the Networking, 2005

Trust Management for Resilient Wireless Sensor Networks.
Proceedings of the Information Security and Cryptology, 2005

2004
Tamper Resistant Software by Integrity-Based Encryption.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

Secure Group Communication with Low Communication Complexity.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

A Smart Handoff Procedure in 4G Networks.
Proceedings of the ICETE 2004, 2004

2002
Grapes: Topology-Based Hierarchical Virtual Network for Peer-to-Peer Lookup Services.
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002

Link Stability and Route Lifetime in Ad-hoc Wireless Networks.
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002

A Fast Handoff Scheme For IP over Bluetooth.
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002

2001
A design of macro-micro CDMA cellular overlays in the existing big urban areas.
IEEE Journal on Selected Areas in Communications, 2001

A new call admission control scheme using the user conformity for non-uniform wireless systems.
Proceedings of the 54th IEEE Vehicular Technology Conference, 2001

2000
An output queueing analysis of multipath ATM switches.
Journal of Systems Architecture, 2000

Punctuated Equilibria in Simple Genetic Algorithms for Functions of Unitation.
Complex Systems, 2000

On the construction of a powerful distributed authentication server without additional key management.
Computer Communications, 2000

Movement-based Location Tracking with Extended Spatial Localities.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000

Handling Camera Anchors in Distributed Surveillance Systems.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000

1999
The deflection self-routing Banyan network: a large-scale ATM switch using the fully adaptive self-routing and its performance analyses.
IEEE/ACM Trans. Netw., 1999

Throttle and preempt: A flow control policy for real-time traffic in wormhole networks.
Journal of Systems Architecture, 1999

Novel recursive multicast algorithms in multistage interconnection networks for ATM switches.
J. High Speed Networks, 1999

Design and analysis of the virtual-time-based round robin fair scheduling algorithm for QoS guarantees.
Computer Communications, 1999

Design and Implementation of a Multi-Threaded TMN Agent System.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

Accelerating Key Establishment Protocols for Mobile Communication.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1998
On Submesh Allocation for Mesh Multicomputers: A Best-Fit Allocation and a Virtual Submesh Allocation for Faulty Meshes.
IEEE Trans. Parallel Distrib. Syst., 1998

Fault-tolerant multicasting in MINs for ATM switches.
IEEE Communications Letters, 1998

Cost-effective algorithms for multicast connection in ATM switches based on self-routing multistage networks.
Computer Communications, 1998

Two-phase Multicast in Wormhole-Switched Bidirectional Multistage Banyan Networks.
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998

Fault-Tolerant Multicasting in Multistage Interconnection Networks.
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998

A new appraoch to server-aided secret computation.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998

1997
On the Correctness of Inside-Out Routing Algorithm.
IEEE Trans. Computers, 1997

Ring Embedding in Hypercubes with Faculty Nodes.
Parallel Processing Letters, 1997

Embedding of rings in 2-D meshes and tori with faulty nodes.
Journal of Systems Architecture, 1997

Two Real-Time Flow Controls in Wormhole Networks.
International Journal of High Speed Computing, 1997

Virtual-Time-Based Round Robin: A Hardware-Eflicient Fair Scheduling Algorithm for High-Speed Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1997

Performance Analysis of a Multicast Switch Based on Multistage Interconnection Networks.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

An adaptive sequential prefetching scheme in shared-memory multiprocessors.
Proceedings of the 1997 International Conference on Parallel Processing (ICPP '97), 1997

Throttle and Preempt: A New Flow Control for Real-Time Communications in Wormhole Networks.
Proceedings of the 1997 International Conference on Parallel Processing (ICPP '97), 1997

An Efficient Causal Order Algorithm for Message Delivery in Distributed System.
Proceedings of the 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 1997

An Analysis of Punctuated Equilibria in Simple Genetic Algorithms.
Proceedings of the Artificial Evolution, Third European Conference, 1997

1996
Free Submesh List Strategy: a Best Fit Submesh Allocation in Mesh Connected Multicomputers.
Parallel Processing Letters, 1996

Drop-and-reroute: A new flow control policy for adaptive wormhole routing.
Journal of Systems Architecture, 1996

Design and Performance Analysis of Multistage Interconnection Networks Using a Recursive Multicast Algorithm.
International Journal of High Speed Computing, 1996

On the Best Fit Submesh Allocation Strategy in Mesh-Connected Multicomputers.
International Journal of High Speed Computing, 1996

Performance Analysis of Multipath Multistage Interconnection Networks with Nonuniform Output Traffic Distribution.
Proceedings of the 4th Euromicro Workshop on Parallel and Distributed Processing (PDP '96), 1996

A New Efficient Submesh Allocation Strategy for Mesh Multicomputers.
Proceedings of the 4th Euromicro Workshop on Parallel and Distributed Processing (PDP '96), 1996

Novel algorithms for multicast communication in self-routing MIN-based ATM switches.
Proceedings of the 1996 International Conference on Network Protocols, 1996

A Necessary and Sufficient Condition for Proper Routing in Omega-Omega Network.
Proceedings of the Euro-Par '96 Parallel Processing, 1996

New Modular Multiplication Algorithms for Fast Modular Exponentiation.
Proceedings of the Advances in Cryptology, 1996

1995
The knockout switch under nonuniform traffic.
IEEE Trans. Communications, 1995

Bit-permute multistage interconnection networks.
Microprocessing and Microprogramming, 1995

Restriction-Free Adaptive Wormhole Routing in Multicomputer Networks.
International Journal of High Speed Computing, 1995

The cyclic banyan network: a fault tolerant multistage interconnection network with the fully-adaptive self-routing.
Proceedings of the Seventh IEEE Symposium on Parallel and Distributed Processing, 1995

Performance analysis of output buffers in multistage interconnection networks with multiple paths.
Proceedings of the Seventh IEEE Symposium on Parallel and Distributed Processing, 1995

Drop-and-Reroute: A New flow Control Policy for Adaptive Wormhole Routing.
Proceedings of the 1995 International Conference on Parallel Processing, 1995

Performance analysis of an ATM switch with multiple paths.
Proceedings of the 1995 International Conference on Network Protocols, 1995

Nonpreemptive scheduling algorithms for multimedia communication in local area networks.
Proceedings of the 1995 International Conference on Network Protocols, 1995

1994
Eventor: An Authoring System for Interactive Multimedia Applications.
Multimedia Syst., 1994

A new deadlock prevention scheme for nonminimal adaptive wormhole routing.
Microprocessing and Microprogramming, 1994

The Ring-Banyan Network: a Fault Tolerant Multistage Interconnection Network for Multiprocessor Systems.
International Journal of High Speed Computing, 1994

1993
An improved algorithm for protocol validation by extended circular exploration.
Microprocessing and Microprogramming, 1993

Performance Evaluation of a Class of Multipath Packet Switching Interconnection Networks.
J. Parallel Distrib. Comput., 1993

A Processor Allocation Strategy Using Cube Coalescing in Hypercube Multicomputers.
Proceedings of the Fifth IEEE Symposium on Parallel and Distributed Processing, 1993

Mode Based Type Inference for Prolog Programs.
Proceedings of the SEKE'93, 1993

Specification of Multimedia Composition and a Visual Programming Environment.
Proceedings of the First ACM International Conference on Multimedia '93, 1993

1992
Heuristic Subcube Allocation with Task Migration in Hypercube Systems.
International Journal of High Speed Computing, 1992

1991
Indirect Star-Type Networks for Large Multiprocessor Systems.
IEEE Trans. Computers, 1991

A heuristic processor allocation strategy in hypercube systems.
Proceedings of the Third IEEE Symposium on Parallel and Distributed Processing, 1991

A Systolic Array Exploiting the Inherent Parallelisms of Artificial Neural Networks.
Proceedings of the International Conference on Parallel Processing, 1991

1990
Performance Analysis of Multibuffered Packet-Switching Networks in Multiprocessor Systems.
IEEE Trans. Computers, 1990

The B-Network: A Multistage Interconnection Network with Backward Links.
IEEE Trans. Computers, 1990

On the Modulo M Translators for the Prime Memory System.
J. Parallel Distrib. Comput., 1990

Enhanced parametric representation using binarized spectrum.
Proceedings of the First International Conference on Spoken Language Processing, 1990

Extended elman's recurrent neural network for syllable recognition.
Proceedings of the First International Conference on Spoken Language Processing, 1990

1989
The PM22I Interconnection Network.
IEEE Trans. Computers, 1989

B-Banyan and B-Delta Networks for Multiprocessor Systems.
J. Parallel Distrib. Comput., 1989

1987
Performance Analysis of Multi-Buffered Packet-Switching Networks in Multiprocessor Systems.
Proceedings of the Supercomputing, 1987

Performance Analysis and Comparison of Packet Switching Interconnection Networks.
Proceedings of the International Conference on Parallel Processing, 1987

A New Approach to Internetworking of Integrated Services Local Networks.
Proceedings of the 7th International Conference on Distributed Computing Systems, 1987


  Loading...