Performance analysis of multibuffered packet-switching networks in multiprocessor systems H Yoon, KY Lee, MT Liu IEEE Transactions on Computers 39 (3), 319-327, 1990 | 229 | 1990 |
Mobility support in content centric networks D Kim, J Kim, Y Kim, H Yoon, I Yeom Proceedings of the second edition of the ICN workshop on Information-centric …, 2012 | 176 | 2012 |
Link stability and route lifetime in ad-hoc wireless networks G Lim, K Shin, S Lee, H Yoon, JS Ma Proceedings. International Conference on Parallel Processing Workshop, 116-123, 2002 | 168 | 2002 |
Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage D Koo, J Hur, H Yoon Computers & Electrical Engineering 39 (1), 34-46, 2013 | 122 | 2013 |
Grid-based energy-efficient routing from multiple sources to multiple mobile sinks in wireless sensor networks K Kweon, H Ghim, J Hong, H Yoon 2009 4th International symposium on wireless pervasive computing, 1-5, 2009 | 110 | 2009 |
Trust evaluation model for wireless sensor networks J Hur, Y Lee, H Yoon, D Choi, S Jin The 7th International Conference on Advanced Communication Technology, 2005 …, 2005 | 106 | 2005 |
The knockout switch under nonuniform traffic H Yoon, MT Liu, KY Lee, YM Kim IEEE transactions on communications 43 (6), 2149-2156, 1995 | 94 | 1995 |
Transcriptional profiling of the developmentally important signalling pathways in human embryonic stem cells JY Rho, K Yu, JS Han, JI Chae, DB Koo, HS Yoon, SY Moon, KK Lee, ... Human Reproduction 21 (2), 405-412, 2006 | 89 | 2006 |
On submesh allocation for mesh multicomputers: A best-fit allocation and a virtual submesh allocation for faulty meshes G Kim, H Yoon IEEE Transactions on Parallel and Distributed Systems 9 (2), 175-185, 1998 | 85 | 1998 |
Towards a ubiquitous robotic companion: Design and implementation of ubiquitous robotic service framework YG Ha, JC Sohn, YJ Cho, H Yoon ETRI journal 27 (6), 666-676, 2005 | 83 | 2005 |
Selective audio adversarial example in evasion attack on speech recognition system H Kwon, Y Kim, H Yoon, D Choi IEEE Transactions on Information Forensics and Security 15, 526-538, 2019 | 82 | 2019 |
New modular multiplication algorithms for fast modular exponentiation SM Hong, SY Oh, H Yoon International Conference on the Theory and Applications of Cryptographic …, 1996 | 76 | 1996 |
Efficient privacy-preserving matrix factorization via fully homomorphic encryption S Kim, J Kim, D Koo, Y Kim, H Yoon, J Shin Proceedings of the 11th ACM on Asia conference on computer and …, 2016 | 75 | 2016 |
Optimal modulation and coding scheme selection in cellular networks with hybrid-ARQ error control D Kim, BC Jung, H Lee, DK Sung, H Yoon IEEE transactions on wireless communications 7 (12), 5195-5201, 2008 | 73 | 2008 |
A smart handover decision algorithm using location prediction for hierarchical macro/femto-cell networks B Jeong, S Shin, I Jang, NW Sung, H Yoon 2011 IEEE vehicular technology conference (VTC Fall), 1-5, 2011 | 71 | 2011 |
Security considerations for handover schemes in mobile WiMAX networks J Hur, H Shim, P Kim, H Yoon, NO Song 2008 IEEE wireless communications and networking conference, 2531-2536, 2008 | 66 | 2008 |
End‐to‐end mobility support in content centric networks D Kim, J Kim, Y Kim, H Yoon, I Yeom International Journal of Communication Systems 28 (6), 1151-1167, 2015 | 62 | 2015 |
Real-time analysis of intrusion detection alerts via correlation S Lee, B Chung, H Kim, Y Lee, C Park, H Yoon Computers & Security 25 (3), 169-183, 2006 | 62 | 2006 |
POSTER: Detecting audio adversarial example through audio modification H Kwon, H Yoon, KW Park Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 60 | 2019 |
Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption J Kim, D Koo, Y Kim, H Yoon, J Shin, S Kim ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-30, 2018 | 59 | 2018 |