Constructing minimum connected dominating sets with bounded diameters in wireless networks D Kim, Y Wu, Y Li, F Zou, DZ Du IEEE Transactions on Parallel and Distributed Systems 20 (2), 147-157, 2008 | 223 | 2008 |
On security and privacy issues of fog computing supported Internet of Things environment K Lee, D Kim, D Ha, U Rajput, H Oh 2015 6th International Conference on the Network of the Future (NOF), 1-3, 2015 | 204 | 2015 |
A new comprehensive RSU installation strategy for cost-efficient VANET deployment D Kim, Y Velasco, W Wang, RN Uma, R Hussain, S Lee IEEE Transactions on Vehicular Technology 66 (5), 4200-4211, 2016 | 144 | 2016 |
Minimum latency multiple data mule trajectory planning in wireless sensor networks D Kim, RN Uma, BH Abay, W Wu, W Wang, AO Tokuta IEEE Transactions on Mobile Computing 13 (4), 838-851, 2013 | 76 | 2013 |
A better approximation algorithm for computing connected dominating sets in unit ball graphs D Kim, Z Zhang, X Li, W Wang, W Wu, DZ Du IEEE Transactions on Mobile Computing 9 (8), 1108-1118, 2010 | 68 | 2010 |
Minimizing data collection latency in wireless sensor network with multiple mobile elements D Kim, BH Abay, RN Uma, W Wu, W Wang, AO Tokuta 2012 Proceedings IEEE INFOCOM, 504-512, 2012 | 63 | 2012 |
A new constant factor approximation for computing 3-connected m-dominating sets in homogeneous wireless networks D Kim, W Wang, X Li, Z Zhang, W Wu 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 59 | 2010 |
Secure and privacy-aware incentives-based witness service in social internet of vehicles clouds R Hussain, D Kim, J Son, J Lee, CA Kerrache, A Benslimane, H Oh IEEE Internet of Things Journal 5 (4), 2441-2448, 2018 | 54 | 2018 |
On construction of quality fault-tolerant virtual backbone in wireless networks W Wang, D Kim, MK An, W Gao, X Li, Z Zhang, W Wu IEEE/ACM Transactions on Networking 21 (5), 1499-1510, 2012 | 53 | 2012 |
Vehicle witnesses as a service: Leveraging vehicles as witnesses on the road in vanet clouds R Hussain, F Abbas, J Son, D Kim, S Kim, H Oh 2013 IEEE 5th International Conference on Cloud Computing Technology and …, 2013 | 51 | 2013 |
Minimum Data-Latency-Bound -Sink Placement Problem in Wireless Sensor Networks D Kim, W Wang, N Sohaee, C Ma, W Wu, W Lee, DZ Du IEEE/ACM Transactions on Networking 19 (5), 1344-1353, 2011 | 49 | 2011 |
On theoretical trajectory planning of multiple drones to minimize latency in search-and-reconnaissance operations D Kim, L Xue, D Li, Y Zhu, W Wang, AO Tokuta IEEE transactions on mobile computing 16 (11), 3156-3166, 2017 | 48 | 2017 |
Rumor restriction in online social networks S Li, Y Zhu, D Li, D Kim, H Huang 2013 IEEE 32nd international performance computing and communications …, 2013 | 45 | 2013 |
New dominating sets in social networks X Zhu, J Yu, W Lee, D Kim, S Shan, DZ Du Journal of Global Optimization 48 (4), 633-642, 2010 | 44 | 2010 |
Maximum lifetime combined barrier-coverage of weak static sensors and strong mobile sensors D Kim, W Wang, J Son, W Wu, W Lee, AO Tokuta IEEE Transactions on Mobile Computing 16 (7), 1956-1966, 2016 | 41 | 2016 |
Constructing connected dominating sets with bounded diameters inwireless networks Y Li, D Kim, F Zou, DZ Du International Conference on Wireless Algorithms, Systems and Applications …, 2007 | 40 | 2007 |
Identity-based key agreement protocols in a multiple PKG environment H Lee, D Kim, S Kim, H Oh Computational Science and Its Applications–ICCSA 2005: International …, 2005 | 35 | 2005 |
Conditional proxy re-encryption for secure big data group sharing in cloud environment J Son, D Kim, R Hussain, H Oh 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2014 | 34 | 2014 |
Current status and security trend of osint YW Hwang, IY Lee, H Kim, H Lee, D Kim Wireless Communications and Mobile Computing 2022 (1), 1290129, 2022 | 31 | 2022 |
Strengthening barrier-coverage of static sensor network with mobile sensor nodes B Xu, Y Zhu, D Kim, D Li, H Jiang, AO Tokuta Wireless Networks 22, 1-10, 2016 | 30 | 2016 |