Myungsun Kim

Orcid: 0000-0002-0461-3053

According to our database1, Myungsun Kim authored at least 48 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
gCFS: completely fair scheduling on multiple GPUs for improved multi-DNN execution in terms of performance isolation.
J. Supercomput., April, 2023

Scheduling Framework for Accelerating Multiple Detection-Free Object Trackers.
Sensors, April, 2023

Taming the round efficiency of cryptographic protocols for private web search schemes.
Inf. Sci., April, 2023

2022
Time-Constrained Adversarial Defense in IoT Edge Devices through Kernel Tensor Decomposition and Multi-DNN Scheduling.
Sensors, 2022

A New Approach to the Constant-Round Re-encryption Mix-Net.
IACR Cryptol. ePrint Arch., 2022

Guaranteeing That Multilevel Prioritized DNN Models on an Embedded GPU Have Inference Performance Proportional to Respective Priorities.
IEEE Embed. Syst. Lett., 2022

A Key Recovery Protocol for Multiparty Threshold ECDSA Schemes.
IEEE Access, 2022

Toward Round-Efficient Verifiable Re-Encryption Mix-Net.
IEEE Access, 2022

Bulletproofs+: Shorter Proofs for a Privacy-Enhanced Distributed Ledger.
IEEE Access, 2022

2021
Deep Reinforcement Learning-Based Smart Joint Control Scheme for On/Off Pumping Systems in Wastewater Treatment Plants.
IEEE Access, 2021

ODMDEF: On-Device Multi-DNN Execution Framework Utilizing Adaptive Layer-Allocation on General Purpose Cores and Accelerators.
IEEE Access, 2021

2020
Homomorphic Comparison for Point Numbers with User-Controllable Precision and Its Applications.
Symmetry, 2020

Memory-Aware Fair-Share Scheduling for Improved Performance Isolation in the Linux Kernel.
IEEE Access, 2020

Programming Language Support for Multisensor Data Fusion: The Splash Approach<sup>*</sup>.
Proceedings of the 17th International Conference on Ubiquitous Robots, 2020

2019
Private Compound Wildcard Queries Using Fully Homomorphic Encryption.
IEEE Trans. Dependable Secur. Comput., 2019

Search Condition-Hiding Query Evaluation on Encrypted Databases.
IEEE Access, 2019

Experimenting With Non-Interactive Range Proofs Based on the Strong RSA Assumption.
IEEE Access, 2019

2018
OLM: online LLC management for container-based cloud service.
J. Supercomput., 2018

Fair-share scheduling in single-ISA asymmetric multicore architecture via scaled virtual runtime and load redistribution.
J. Parallel Distributed Comput., 2018

Encoding of Rational Numbers and Their Homomorphic Computations for FHE-Based Applications.
Int. J. Found. Comput. Sci., 2018

2017
An experimental study of encrypted polynomial arithmetics for private set operations.
J. Commun. Networks, 2017

2016
Private Over-Threshold Aggregation Protocols over Distributed Datasets.
IEEE Trans. Knowl. Data Eng., 2016

Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data.
IEEE Trans. Inf. Forensics Secur., 2016

Better Security for Queries on Encrypted Databases.
IACR Cryptol. ePrint Arch., 2016

Encoding Rational Numbers for FHE-based Applications.
IACR Cryptol. ePrint Arch., 2016

Ghostshell: Secure Biometric Authentication using Integrity-based Homomorphic Evaluations.
IACR Cryptol. ePrint Arch., 2016

Private Web Search with an Expected Constant Round.
CoRR, 2016

2015
Memory Management Scheme to Improve Utilization Efficiency and Provide Fast Contiguous Allocation without a Statically Reserved Area.
ACM Trans. Design Autom. Electr. Syst., 2015

On the Efficiency of FHE-based Private Queries.
IACR Cryptol. ePrint Arch., 2015

Fair-Share Scheduling for Performance-Asymmetric Multicore Architecture via Scaled Virtual Runtime.
Proceedings of the 21st IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2015

Private Web Search with Constant Round Efficiency.
Proceedings of the ICISSP 2015, 2015

2014
Private Web Search with Constant Round Efficiency.
IACR Cryptol. ePrint Arch., 2014

Search-and-compute on Encrypted Data.
IACR Cryptol. ePrint Arch., 2014

Bubble Task: A Dynamic Execution Throttling Method for Multi-core Resource Management.
Proceedings of the Job Scheduling Strategies for Parallel Processing, 2014

Hardware-in-the-loop simulation of Android GPGPU applications.
Proceedings of the 12th IEEE Symposium on Embedded Systems for Real-time Multimedia, 2014

Utilization-aware load balancing for the energy efficient operation of the big.LITTLE processor.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

Hardware-in-the-loop Simulation for CPU/GPU Heterogeneous Platforms.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014

2013
Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs.
IEEE Trans. Dependable Secur. Comput., 2013

Private Over-threshold Aggregation Protocols over Distributed Databases.
IACR Cryptol. ePrint Arch., 2013

2012
Private Top-k Aggregation Protocols.
IACR Cryptol. ePrint Arch., 2012

A Public Shuffle without Private Permutations.
IACR Cryptol. ePrint Arch., 2012

Compress Multiple Ciphertexts Using ElGamal Encryption Schemes.
IACR Cryptol. ePrint Arch., 2012

Privacy-preserving web search.
Proceedings of the Fourth International Conference on Ubiquitous and Future Networks, 2012

Private Over-Threshold Aggregation Protocols.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Providing Fair Share Scheduling on Multicore Cloud Servers via Virtual Runtime-based Task Migration Algorithm.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

2011
Mutual Private Set Intersection with Linear Complexity.
IACR Cryptol. ePrint Arch., 2011

2002
Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002


  Loading...