Jinkyu Koo

According to our database1, Jinkyu Koo authored at least 19 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Swin-Free: Achieving Better Cross-Window Attention and Efficiency with Size-varying Window.
CoRR, 2023

2022
Depth Estimation with Simplified Transformer.
CoRR, 2022

2021
Simultaneous learning of individual microRNA-gene interactions and regulatory comodules.
BMC Bioinform., 2021

2019
HAWKEYE: Adversarial Example Detector for Deep Neural Networks.
CoRR, 2019

ApproxNet: Content and Contention Aware Video Analytics System for the Edge.
CoRR, 2019

Federation in genomics pipelines: techniques and challenges.
Briefings Bioinform., 2019

XSTRESSOR : Automatic Generation of Large-Scale Worst-Case Test Inputs by Inferring Path Conditions.
Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification, 2019

PySE: Automatic Worst-Case Test Generation by Reinforcement Learning.
Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification, 2019

2018
TRIFECTA: Security, Energy Efficiency, and Communication Capacity Comparison for Wireless IoT Devices.
IEEE Internet Comput., 2018

VideoChef: Efficient Approximation for Streaming Video Processing Pipelines.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Minerva: A reinforcement learning-based technique for optimal scheduling and bottleneck detection in distributed factory operations.
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018

2017
Protecting Bare-Metal Embedded Systems with Privilege Overlays.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

RL-BLH: Learning-Based Battery Control for Cost Savings and Privacy Preservation for Smart Meters.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2015
Memory Management Scheme to Improve Utilization Efficiency and Provide Fast Contiguous Allocation without a Statically Reserved Area.
ACM Trans. Design Autom. Electr. Syst., 2015

2013
A delay-bounded event-monitoring and adversary-identification protocol in resource-constraint sensor networks.
Ad Hoc Networks, 2013

Low-complexity secure protocols to defend cyber-physical systems against network isolation attacks.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
PRIVATUS: Wallet-Friendly Privacy Protection for Smart Meters.
Proceedings of the Computer Security - ESORICS 2012, 2012

2009
A tale of two synchronizing clocks.
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009

2005
A novel detection criterion for weak m-ary signals and its application to ultrawideband multiple access systems.
IEEE Trans. Veh. Technol., 2005


  Loading...