Suhyun Kim

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2025
When Model Knowledge meets Diffusion Model: Diffusion-assisted Data-free Image Synthesis with Alignment of Domain and Class.
CoRR, June, 2025

KFinEval-Pilot: A Comprehensive Benchmark Suite for Korean Financial Language Understanding.
CoRR, April, 2025

A study on k-walk generation algorithm to prevent the tottering in graph edit distance heuristic algorithms.
J. Comb. Optim., January, 2025

Adapting cybersecurity maturity models for resource-constrained settings: A case study of Peru.
Electron. J. Inf. Syst. Dev. Ctries., January, 2025

Uplink MIMO Communications With RIS-Integrated Base Station: Modeling and Experiments.
IEEE Internet Things J., 2025

A Study on New EPC-MPSI for an Inputless External Party to Compute the Intersection of Multiple Private Datasets.
IET Commun., 2025

A Novel RIS-Empowered Base Station: A Practical Implementation and Experimental Validation.
Proceedings of the 2025 IEEE Wireless Communications and Networking Conference (WCNC), 2025

Difference Inversion: Interpolate and Isolate the Difference with Token Consistency for Image Analogy Generation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025

One-Shot is Enough: Consolidating Multi-Turn Attacks into Efficient Single-Turn Prompts for LLMs.
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2025

Salient Frequency-aware Exemplar Compression for Resource-constrained Online Continual Learning.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

2024
A Comprehensive Approach to User Delegation and Anonymity within Decentralized Identifiers for IoT.
Sensors, April, 2024

Kore Initial Clustering for Unsupervised Domain Adaptation.
Proceedings of the 19th International Joint Conference on Computer Vision, 2024

2023
Improving Depression Severity Prediction from Passive Sensing: Symptom-Profiling Approach.
Sensors, October, 2023

Probabilistic Precision and Recall Towards Reliable Evaluation of Generative Models.
CoRR, 2023

NaturalInversion: Data-Free Image Synthesis Improving Real-World Consistency.
CoRR, 2023

Tanh Works Better with Asymmetry.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

2022
Identity Access Management via ECC Stateless Derived Key Based Hierarchical Blockchain for the Industrial Internet of Things.
IEICE Trans. Inf. Syst., November, 2022

A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks.
KSII Trans. Internet Inf. Syst., 2022

2019
Introduction of a Program to Improve the Information Sharing System of Food Allergy Patients.
Proceedings of the MEDINFO 2019: Health and Wellbeing e-Networks for All, 2019

Norm-referenced Criteria for Strength of the Upper Limbs for the Korean High School Baseball Players Using Computer Assisted Isokinetic Equipment.
Proceedings of the Big Data, 2019

2018
IoT device security based on proxy re-encryption.
J. Ambient Intell. Humaniz. Comput., 2018

Secure Multicast using Proxy Re-Encryption in an IoT Environment.
KSII Trans. Internet Inf. Syst., 2018

2017
Hierarchical Multimodal Fusion of Deep-Learned Lesion and Tissue Integrity Features in Brain MRIs for Distinguishing Neuromyelitis Optica from Multiple Sclerosis.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2017, 2017

Secure Multicast Using Proxy Re-encryption in IoT Environment.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

2016
Understanding information security stress: Focusing on the type of information security compliance activity.
Comput. Secur., 2016

Analysis on Manipulation of the MAC Address and Consequent Security Threats.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

Our Journey to Becoming Agile: Experiences with Agile Transformation in Samsung Electronics.
Proceedings of the 23rd Asia-Pacific Software Engineering Conference, 2016

2015
Study on User Authority Management for Safe Data Protection in Cloud Computing Environments.
Symmetry, 2015

Unidirectional ring ethernet for low-complexity in-vehicle control network.
Proceedings of the IEEE International Conference on Industrial Technology, 2015

Data Block Management Scheme Based on Secret Sharing for HDFS.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
Block Access Token Renewal Scheme Based on Secret Sharing in Apache Hadoop.
Entropy, 2014

2012
Step-by-Step Strategies and Case Studies for Embedded Software Companies to Adapt to the FOSS Ecosystem.
Proceedings of the Open Source Systems: Long-Term Sustainability, 2012

2011
Zapping delay reduction method for sports live with multi-angle on smart tv.
Proceedings of the 9th International Interactive TV&Video Conference, 2011

2010
Data Refinement and Channel Selection for a Portable E-Nose System by the Use of Feature Feedback.
Sensors, 2010

2008
Perfdiff: a framework for performance difference analysis in a virtual machine environment.
Proceedings of the Sixth International Symposium on Code Generation and Optimization (CGO 2008), 2008

2007
Template based High Performance ALE-TSOAP Message Communication.
Proceedings of the 5th ACIS International Conference on Software Engineering Research, 2007

2004
An efficient codebook design in SDCHMM for mobile communication environments.
Proceedings of the 8th International Conference on Spoken Language Processing, 2004

Design of Authentication and Key Exchange Protocol in Ethernet Passive Optical Networks.
Proceedings of the Computational Science and Its Applications, 2004

2003
Design and Performance Evaluation of a Separated Control Signaling Protocol for WDM Optical Networks.
Photonic Netw. Commun., 2003

2000
Improvement of speaker recognition system by individual information weighting.
Proceedings of the Sixth International Conference on Spoken Language Processing, 2000


  Loading...