Yuna Kim

According to our database1, Yuna Kim authored at least 14 papers between 2003 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption.
ACM Trans. Priv. Secur., 2018

2017
Efficient Transfer Learning Schemes for Personalized Language Modeling using Recurrent Neural Network.
CoRR, 2017

Efficient Transfer Learning Schemes for Personalized Language Modeling using Recurrent Neural Network.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption.
IACR Cryptology ePrint Archive, 2016

Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2013
A distributed energy-efficient clustering scheme for deploying IDS in MANETs.
Telecommunication Systems, 2013

2012
LT-OLSR: Attack-tolerant OLSR against link spoofing.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

2010
AdaFF: Adaptive Failure-Handling Framework for Composite Web Services.
IEICE Transactions, 2010

binOb+: a framework for potent and stealthy binary obfuscation.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Exclusion of Forged Files from Multi-source Downloadable P2P Systems.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Allowing user-specified failure handling in web services composition.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

2006
PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

2003
Web Prefetching Using Display-Based Prediction.
Proceedings of the 2003 IEEE / WIC International Conference on Web Intelligence, 2003


  Loading...