Power aware scheduling of bag-of-tasks applications with deadline constraints on DVS-enabled clusters KH Kim, R Buyya, J Kim Seventh IEEE International Symposium on Cluster Computing and the Grid …, 2007 | 445 | 2007 |
Spam filtering in twitter using sender-receiver relationship J Song, S Lee, J Kim Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011 | 325 | 2011 |
WARNINGBIRD: Detecting Suspicious URLs in Twitter Stream S Lee, J Kim NDSS, 2012 | 270 | 2012 |
Warningbird: A near real-time detection system for suspicious urls in twitter stream S Lee, J Kim IEEE transactions on dependable and secure computing 10 (3), 183-195, 2013 | 253 | 2013 |
Hypercube communication delay with wormhole routing J Kim, CR Das IEEE Transactions on Computers 43 (7), 806-814, 1994 | 165 | 1994 |
Protecting location privacy using location semantics B Lee, J Oh, H Yu, J Kim Proceedings of the 17th ACM SIGKDD international conference on Knowledge …, 2011 | 152 | 2011 |
A top-down processor allocation scheme for hypercube computers J Kim, CR Das, W Lin IEEE Transactions on Parallel & Distributed Systems 2 (01), 20-30, 1991 | 137 | 1991 |
Stealing Webpages rendered on your browser by exploiting GPU vulnerabilities S Lee, Y Kim, J Kim, J Kim IEEE Symposium on Security and Privacy, 2014 | 126 | 2014 |
Early filtering of ephemeral malicious accounts on Twitter S Lee, J Kim Computer Communications 54 (1), 48-57, 2014 | 109 | 2014 |
Crowdtarget: Target-based detection of crowdturfing in online social networks J Song, S Lee, J Kim Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015 | 103 | 2015 |
Detecting and identifying faulty IoT devices in smart home with context extraction J Choi, H Jeoung, J Kim, Y Ko, W Jung, H Kim, J Kim 2018 48th annual IEEE/IFIP international conference on dependable systems …, 2018 | 88 | 2018 |
Reducing IPTV channel zapping time based on viewer’s surfing behavior and preference Y Kim, JK Park, HJ Choi, S Lee, H Park, J Kim, Z Lee, K Ko 2008 IEEE International Symposium on Broadband Multimedia Systems and …, 2008 | 74 | 2008 |
A real-time communication method for wormhole switching networks B Kim, J Kim, S Hong, S Lee Proceedings. 1998 International Conference on Parallel Processing (Cat. No …, 1998 | 74 | 1998 |
Probabilistic checkpointing H Nam, J Kim, SJ Hong, S Lee IEICE TRANSACTIONS on Information and Systems 85 (7), 1093-1104, 2002 | 68 | 2002 |
Reliability evaluation of hypercube multicomputers J Kim, CR Das, W Lin, TY Feng IEEE Transactions on Reliability 38 (1), 121-129, 1989 | 62 | 1989 |
FACT: Functionality-centric Access Control System for IoT Programming Frameworks S Lee, J Choi, J Kim, B Cho, S Lee, H Kim, J Kim SACMAT 2017, 43-54, 2017 | 61 | 2017 |
Design of a built-in current sensor for I/sub DDQ/testing JB Kim, SJ Hong, J Kim IEEE Journal of Solid-State Circuits 33 (8), 1266-1272, 1998 | 60 | 1998 |
Processor allocation scheme for hypercube computers J Kim, CR Das, W Lin Proceedings of the International Conference on Parallel Processing 2, 231-238, 1989 | 53 | 1989 |
On-line scheduling of scalable real-time tasks on multiprocessor systems WY Lee, SJ Hong, J Kim Journal of Parallel and Distributed Computing 63 (12), 1315-1324, 2003 | 51 | 2003 |
Location Privacy via Differential Private Perturbation of Cloaking Area H Ngo, J Kim 28th IEEE Computer Security Foundations Symposium, 2015 | 50 | 2015 |