Temporal node centrality in complex networks H Kim, R Anderson Physical Review E—Statistical, Nonlinear, and Soft Matter Physics 85 (2 …, 2012 | 376 | 2012 |
An image encryption scheme with a pseudorandom permutation based on chaotic maps JW Yoon, H Kim Communications in Nonlinear Science and Numerical Simulation 15 (12), 3998-4006, 2010 | 203 | 2010 |
Backdoor attacks and countermeasures on deep learning: A comprehensive review Y Gao, BG Doan, Z Zhang, S Ma, J Zhang, A Fu, S Nepal, H Kim arXiv preprint arXiv:2007.10760, 2020 | 200 | 2020 |
End-to-end evaluation of federated learning and split learning for internet of things Y Gao, M Kim, S Abuadbba, Y Kim, C Thapa, K Kim, SA Camtepe, H Kim, ... arXiv preprint arXiv:2003.13376, 2020 | 189 | 2020 |
What’s in Twitter, I know what parties are popular and who you are supporting now! A Boutet, H Kim, E Yoneki Social network analysis and mining 3, 1379-1391, 2013 | 123 | 2013 |
What's in your tweets? I know who you supported in the UK 2010 general election A Boutet, H Kim, E Yoneki Proceedings of the International AAAI Conference on Web and Social Media 6 …, 2012 | 118 | 2012 |
Can we use split learning on 1D CNN models for privacy preserving training? S Abuadbba, K Kim, M Kim, C Thapa, SA Camtepe, Y Gao, H Kim, ... Proceedings of the 15th ACM Asia conference on computer and communications …, 2020 | 107 | 2020 |
DDoS attack mitigation in Internet of Things using software defined networking ME Ahmed, H Kim 2017 IEEE third international conference on big data computing service and …, 2017 | 107 | 2017 |
Centrality prediction in dynamic human contact networks H Kim, J Tang, R Anderson, C Mascolo Computer Networks 56 (3), 983-996, 2012 | 105 | 2012 |
Security challenges with network functions virtualization MD Firoozjaei, JP Jeong, H Ko, H Kim Future Generation Computer Systems 67, 315-324, 2017 | 95 | 2017 |
Security and privacy challenges in the internet of things [security and privacy matters] JH Lee, H Kim IEEE Consumer Electronics Magazine 6 (3), 134-136, 2017 | 92 | 2017 |
Void: A fast and light voice liveness detection system ME Ahmed, IY Kwak, JH Huh, I Kim, T Oh, H Kim 29th USENIX Security Symposium (USENIX Security 20), 2685-2702, 2020 | 90 | 2020 |
On the effectiveness of pattern lock strength meters: Measuring the strength of real world pattern locks Y Song, G Cho, S Oh, H Kim, JH Huh Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015 | 88 | 2015 |
Statistical application fingerprinting for DDoS attack mitigation ME Ahmed, S Ullah, H Kim IEEE Transactions on Information Forensics and Security 14 (6), 1471-1484, 2018 | 87 | 2018 |
Phishing detection with popular search engines: Simple and effective JH Huh, H Kim Foundations and Practice of Security: 4th Canada-France MITACS Workshop, FPS …, 2012 | 86 | 2012 |
You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild. E Lee, J Woo, H Kim, A Mohaisen, HK Kim Ndss, 1-15, 2016 | 83 | 2016 |
Bitcoin vs. bitcoin cash: Coexistence or downfall of bitcoin cash? Y Kwon, H Kim, J Shin, Y Kim 2019 IEEE Symposium on Security and Privacy (SP), 935-951, 2019 | 79 | 2019 |
Hybrid spam filtering for mobile communication JW Yoon, H Kim, JH Huh computers & security 29 (4), 446-459, 2010 | 77 | 2010 |
Design and evaluation of a multi-domain trojan detection method on deep neural networks Y Gao, Y Kim, BG Doan, Z Zhang, G Zhang, S Nepal, DC Ranasinghe, ... IEEE Transactions on Dependable and Secure Computing 19 (4), 2349-2364, 2021 | 76 | 2021 |
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks W Aiken, H Kim, S Woo, J Ryoo Computers & Security 106, 102277, 2021 | 73 | 2021 |