Int’l Journal

Int’l Journal 2018-05-10T21:48:07+00:00

2018

  1. Prevention of Cross-update Privacy Leaks on Android
    Beumjin Cho, Sangho Lee, Meng Xu, Sangwoo Ji, Taesoo Kim, and Jong Kim
    Computer Science and Information Systems, Vol. 15(1), pp. 111-137, January 2018. (SCIE, 0.837)
  2. SSD Performance Modeling Using Bottleneck Analysis
    Jihun Kim, Joonsung Kim, Pyeongsu Park, Jong Kim, and Jangwoo Kim
    IEEE Computer Architecture Letters (CAL), Vol. 17(1), pp. 80-83, January 2018 (SCIE, 1.397)

2016

  1. Heterogeneous Distributed Shared Memory for Lightweight Internet-of-Things Devices
    Bongjun Kim, Seonyeong Heo, Gyeongmin Lee, Soyeon Park, Hanjun Kim, and Jong Kim
    IEEE Micro, Vol. 36(6), pp. 16-24, November 2016. (SCI, 1.091) (IoT support)
  2. Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata
    Jonghyuk Song, Sangho Lee, and Jong Kim
    IEEE Transactions on Dependable and Secure Computing, Vol. 13(3), pp. 340-354, May 2016. (SCIE, 1.592) (CMEST support)
  3. Preserving Source- and Sink-location Privacy in Sensor Networks
    Sangho Lee, Jong Kim, and Yoonho Kim
    Computer Science and Information Systems, Vol. 13(1), pp. 115-130, January 2016. (SCIE, 0.640) (IoT support)

2014

  1. Early Filtering of Ephemeral Malicious Accounts on Twitter,
    Sangho Lee and Jong Kim
    Computer Communications, Vol. 54, pp. 48-57, December 2014. (SCIE, 1.352) (CMEST support)
  2. ScaleGPU: GPU Architecture for Memory-Unaware GPU Programming,
    Youngsok Kim, Jaewon Lee, Donggyu Kim, and Jangwoo Kim
    IEEE Computer Architecture Letters, Vol. 13(2), pp. 101-104, July-December 2014.

2013

  1. A Survey of Security Mechanisms with Direct Sequence Spread Spectrum Signals,
    Taeho Kang, Xiang Li, Chansu Yu, Jong Kim
    Journal of Computing Science and Engineering, Vol.7, No.3, pp. 168-176, September 2013. (BSR and WCU support)
  2. Differential Privacy in Practice,
    Hiep H. Nguyen, Jong Kim, and Yoonho Kim
    Journal of Computing Science and Engineering, Vol.7, No.3, pp. 177-186, September 2013. (WCU support)
  3. WarningBird: A Near Real-time Detection System for Suspicious URLs in Twitter Stream,
    Sangho Lee and Jong Kim
    IEEE Transactions on Dependable and Secure Computing, Vol. 10(3), pp. 183-195, May-June 2013. (SCIE, 1.140) (CMEST and WCU support)
  4. Fluxing Botnet Command and Control Channels with URL Shortening Services,
    Sangho Lee and Jong Kim
    Computer Communications, Vol. 36(3), pp. 320-332, February 2013. (SCIE,1.044) (CMEST and WCU support)
  5. A Distributed Energy-Efficient Clustering Scheme for Deploying IDS in MANETs,
    Yuna Kim, Ki-Young Jung, Tae-Hyung Kim, and Jong Kim
    Telecommunication Systems, Vol. 52(1), pp. 85-96, January 2013. (SCIE, 0.689)

2012

  1. Distance Bounding with Delayed Responses,
    Sangho Lee, Jin Seok Kim, Sung Je Hong, and Jong Kim
    IEEE Communications Letters, Vol. 16(9), pp. 1478-1481, September 2012. (SCI,0.982) (CMEST and WCU support)
  2. A Hybrid Sonar Algorithm for Submersible Cars to Verify the Location of Senders,
    Jin Seok Kim, Dae Hyun Yum, Pil Joong Lee, Sung Je Hong and Jong Kim
    IEEE Transactions on Vehicular Technology, Vol. 61(6), pp. 2707-2714, July 2012. (SCI,1.921) (CITE and WCU support)
  3. Security Condition for Exact Localization in Wireless Ad Hoc Networks,
    Jin Seok Kim, Dae Hyun Yum, Sung Je Hong, Jong Kim and Pil Joong Lee
    IEICE Transactions on Communications, Vol. E95-B, No.7, pp.2459-2462, July 2012. (SCI,0.254) (CITE and WCU support)
  4. DRMFS: A file system layer for transparent access semantics of DRM-protected contents,
    Sangho Lee, Hay-Rim Lee, Seungkwang Lee, and Jong Kim
    Journal of Systems and Software, Vol. 85(5), pp. 1058-1066, May 2012. (SCIE,0.836) (CMEST and WCU support)
  5. Lightweight Distance Bounding Protocol against Relay Attacks,
    Jin Seok Kim, Kookrae Cho, Dae Hyun Yum, Sung Je Hong, and Pil Joong Lee
    IEICE Transactions on Information and Systems, 2012. Vol.E95-D, No.4, pp.1155-1158, April 2012. (SCIE,0.178)

2011

  1. Distance Bounding Protocol with Adjustable False Acceptance Rate,
    Dae Hyun Yum, Jin Seok Kim, Sung Je Hong, and Pil Joong Lee
    IEEE Communications Letters, vol. 15(4), pp. 434-436, April 2011. (SCI) (SCOPUS)
  2. Distance Bounding Protocol for Mutual Authentication,
    Dae Hyun Yum, Jin Seok Kim, Sung Je Hong, and Pil Joong Lee
    IEEE Trans. Wireless Communications, vol. 10(2), pp. 592-601, February 2011. (SCI) (SCOPUS)
  3. Fast Verification of Hash Chains with Reduced Storage,
    Dae Hyun Yum, Jin Seok Kim, Pil Joong Lee, and Sung Je Hong
    IEICE Trans. Fundamentals of Electronics, Communications and Computer Science, vol. E94-A(1), pp. 383-391, January 2011. (SCIE) (SCOPUS)

2010

  1. SLA-based Scheduling of Bag-of-Tasks Applications on Power-aware Cluster Systems,
    Kyong Hoon Kim, Wan Yeon Lee, Jong Kim, and Rajkumar Buyya
    IEICE Trans. Information and Systems, vol. E93-D(12), pp.3194-3201, December 2010. (SCIE) (SCOPUS)
  2. AdaFF: Adaptive Failure-handling Framework for Composite Web Services,
    Yuna Kim, Wan Yeon Lee, Kyoung Hoon Kim, and Jong Kim
    IEICE Trans. Information and Systems, vol. E93-D(4), pp. 834-842, April 2010. (SCIE, 0.396) (SCOPUS) (CMEST support)
  3. On Fast Verification of Hash Chains,
    Dae Hyun Yum, Jin Seok Kim, Pil Joong Lee, and Sung Je Hong
    LNCS 5985 (CT-RSA 2010) March 2010. (SCOPUS) (Yum & Lee were supported by NRF & BK21, and Hong was supported by HNRC)

2009

  1. Redistributing time-based rights between consumer devices for content sharing in DRM system,
    Sangho Lee, Jong Kim, and Sung Je Hong
    International Journal of Information Security, vol. 8(4), pp. 263-273, August 2009. (SCIE, 1.681) (SCOPUS) (CMEST Support)
  2. Security weakness of Tseng’s fault-tolerant conference-key agreement protocol,
    Sangho Lee, Jong Kim, and Sung Je Hong
    Journal of Systems and Software, vol. 82(7), pp. 1163-1167, July 2009. (SCIE, 1.340) (SCOPUS) (CMEST support)

2008

  1. Dynamic Two-tier Cell Structure for Bandwidth Reservation of Handoffs in Cellular Networks,
    Jae Keun Park, Wan Yeon Lee, Sung Je Hong, and Jong Kim
    IEICE Trans. Fundamentals of Electronics, Communications and Computer Sciences, vol. E91-A(10), pp. 3003-3005, October 2008. (SCIE, 0.287) (SCOPUS) (2008-HNRC support)
  2. Energy-Aware Error Correction for QoS-Provisioning Real-Time Communications,
    Kyong Hoon Kim, Wan Yeon Lee, and Jong Kim
    IEICE Trans. Fundamentals of Electronics, Communications and Computer Sciences, vol. E91-A(7), pp. 1682-1685, July 2008. (SCIE, 0.287) (SCOPUS) (2008-CMEST partly support)
  3. Copyright Protection for Modifiable Digital Content Based on Distributed Environment,
    Heejae Park and Jong Kim
    IEICE Trans. Information and Systems, vol. E91-D(5), pp. 1390-1397, May 2008. (SCIE, 0.245) (SCOPUS) (2008-CMEST support)
  4. Mitigating the Impact of Liars by Reflecting Peer’s Credibility on P2P File Reputation Systems,
    So Young Lee, O-Hoon Kwon, Jong Kim, and Sung Je Hong
    LNAI 4461 (AP2PC 2006), pp. 111-122, 2008. (SCOPUS) (2005-CMEST support)
  5. The Exclusion of Malicious Routing Peers in Structured P2P Systems,
    Bong-Soo Roh, O-Hoon Kwon, Sung Je Hong, and Jong Kim
    LNAI 4461 (AP2PC 2006), pp. 45-59, 2008. (SCOPUS) (2005-HNRC support)

2007

  1. An Adaptive DVS Checkpointing Scheme for Fixed-Priority Tasks with Reliability Constraints in Dependable Real-Time Embedded Systems,
    Kyong Hoon Kim and Jong Kim
    LNCS 4523 (ICESS’07), 560-571, 2007 (SCOPUS) (CMEST support)
  2. FileTrust : Reputation Management for Reliable Resource Sharing in Structured Peer-to-Peer Networks,
    O-Hoon Kwon, So Young Lee, and Jong Kim
    IEICE Trans. Communications, vol. E90-B(4), pp. 826-835, April 2007. (SCI, 0.290) (SCOPUS) (CMEST support)
  3. PolyI-D: Polymorphic worm detection based on instruction distribution,
    Ki hun Lee, Yuna Kim, Sung Je Hong, and Jong Kim
    LNCS 4298 (WISA 2006), pp. 45-59, 2007. (SCOPUS) (CNU-ITRC support)
  4. Minimum distance between two sphere-swept surfaces,
    Kwanhee Lee, Joon-Kyung Seong, Ku-Jin Kim, and Sung Je Hong
    Computer-Aided Design, vol. 39(6), pp. 452-459, 2007. (SCIE) (SCOPUS)

2006

  1. Return Address Randomization Scheme for Annulling Data-injection Buffer Overflow Attack,
    Deok Jin Kim, Tae Hyung Kim, Jong Kim, and Sung Je Hong
    LNCS 4318 (Inscrypt 2006), pp. 238-252, 2006. (SCOPUS) (CMEST support)
  2. Resiliency of Network Topologies under Path-Based Attacks,
    Heejo Lee, Jong Kim, and Wanyeon Lee
    IEICE Trans. Communications, Vol. E89-B(10), pp. 2878-2884, Oct. 2006. (SCOPUS) (KOR-ITRC support)
  3. A Trust Management Scheme in Structured P2P Systems
    So Young Lee, O-Hoon Kwon, Jong Kim, and Sung Je Hong
    LNAI 4118 (AP2PC 2005), pp. 30-43, 2006. (SCOPUS) (HNRC support)
  4. Dual-Mode r-Reliable Task Model for Flexible Scheduling in Reliable Real-Time Systems
    Kyong Hoon Kim, Jong Kim, and Sung Je Hong
    LNCS 4096 (EUC 2006), pp. 308-317, 2006 (SCOPUS) (CMEST support)
  5. Approximation of Optimal Moving Paths of Huge Robot Reclaimer with a 3D Range Finder
    Kwan-Hee Lee, Hyo-Jung Bae, and S. J. Hong
    LNCS 3980 (ICCSA 2006), pp. 151-160, 2006 (SCOPUS)

2005

  1. An Adaptive FEC Scheme for Firm Real-Time Multimedia Communications in Wireless Networks,
    Kyong Hoon Kim, Jong Kim, and Sung Je Hong
    IEICE Trans. on Communications, vol. E88-B(7), pp. 2794-2801, 2005. (SCIE) (SCOPUS) (CMEST support)
  2. Ticket-Based Grid Services Architecture for Dynamic Virtual Organizations,
    Byung Joon Kim, Kyong Hoon Kim, Sung Je Hong, and Jong Kim
    LNCS 3470 (Advances in Grid Computing: EGC 2005), pp. 394-403, 2005. (SCOPUS) (HNRC support)
  3. Mobile Multicast Routing Protocol Using Prediction of Dwelling Time of A Mobile Host,
    Jae Keun Park, Sung Je Hong, and Jong Kim
    LNCS 3421 (ICN 05), pp. 884-891, 2005. (SCOPUS) (HNRC support)
  4. HackSim : An Automation of Penetration Testing for Remote Buffer Overflow Vulnerabilities,
    O-Hoon Kwon, Seung Min Lee, Heejo Lee, and Jong Kim
    LNCS 3391 (ICOIN 2005), pp.652-661, 2005. (No ack) (SCOPUS)

2004

  1. Modifiable Digital Content Protection in P2P,
    H. J. Park and J. Kim
    LNCS 3225 (ISC 2004), pp. 379-390, 2004. (SCOPUS) (CNU-ITRC support)
  2. Workflow-based Authorization Service in the Grid,
    Seung-Hyun Kim, K. H. Kim, J. Kim, and S. J. Hong, S. W. Kim
    Journal of Grid Computing, Vol. 2(1), pp. 43-55, 2004. (No Ack)

2003

  1. On-line Scheduling of Scalable Real-Time Tasks on Multiprocessor Systems,
    W. Y. Lee, S. J. Hong, and J. Kim
    Journal of Parallel and Distributed Computing, Vol.63(12), pp. 1315-1324, December 2003. (SCIE) (SCOPUS)
  2. Approximating 3D General Sweep Boundary Using Depth-Buffer,
    Jae-Woo Ahn and S. J. Hong
    Lecture Notes in Computer Science (Vol. 2669, pp. 508-518), May 2003. (SCOPUS)
  3. Processor Allocation and Task Scheduling of Matrix Chain Products on Parallel Systems,
    H. Lee, J. Kim, S. J. Hong, and S.Lee
    IEEE Trans. on Parallel and Distributed Systems, Vol. 14(3), pp. 1-14, 2003. (SCIE) (SCOPUS)
  4. Secure Checkpointing,
    H. C. Nam, J. Kim, S. J. Hong, and S. Lee
    Journal of Systems Architecture, Vol. 48, Issues 8-10, pp. 237-254, March 2003. (SCIE) (SCOPUS)
  5. Dynamic load balancing for switch-based network,
    W. Y. Lee, S. J. Hong, J. Kim, and S. Lee
    Journal of Parallel and Distributed Computing, Vol. 63(3), pp. 286-298, March 2003. (SCIE) (SCOPUS)
  6. Task scheduling using a block dependency DAG for block-oriented sparse Cholesky factorization,
    H. Lee, J. Kim, S. J. Hong, and S. Lee
    Parallel Computing, Vol. 29(1), pp. 135-159, Elsevier (2003.01) (SCIE) (SCOPUS)
  7. MUMEC: Protocol for Multicasting with Membership Control,
    J. H. Park, S. J. Hong, J. Kim, and S. Lee
    IEE Electronics Letters, Vol. 39(2), pp. 257-259, Jan 2003. (SCIE) (SCOPUS)

2002

  1. Probabilistic Checkpointing,
    H. C. Nam, J. Kim, S. J. Hong, and S. Lee
    IEICE Transaction on Information and Systems, Vol. E85-D, No. 17, pp. 1093-1104, July 2002. (SCIE) (SCOPUS)

2001

  1. The Intersection of Two Ringed Surfaces and Some Related Problems
    Hee-Seok Heo, S. J. Hong, J.K. Seong, M.S. Kim, and G. Elber
    Graphical Models, Vol 63, pp.228-244, Elsevier Science (2001) (SCIE) (SCOPUS)

— 2000

  1. On the Configuration of Switch-Based Networks with Wormhole Routing
    W. Y. Lee, S. J. Hong and J. Kim
    Journal of Interconnection Networks, Vol.1 (2), pp. 95-114, June 2000.
  2. Polygonal Boundary approximation for a 2D General Sweep Based on Envelope and set Operations
    Joo-Haeng Lee, S. J. Hong and Myung-Soo Kim
    The Visual Compiter, pp.208-240 Springer-Verlag (2000.05).
  3. Design and Analysis of the Dual-Torus Network
    Sang Ho Chae, Jong Kim and Sung Je Hong
    New Generation Computing, Vol.17, No. 3, pp.229-254 Springer-Verlag (1999.05).
  4. Synchronous Load Balancing in Hypercube Multicomputers with Faulty Nodes
    K. W. Nam, S. Lee, and J. Kim
    Journal of Parallel and Distributed Computing, Vol.58, No. 1, pp.26-53 Academic Press (1999.07).
  5. Path Selection for Real-Time Communication in Wormhole Networks
    K. Nam, S. Lee, and J. Kim
    International Journal of High Speed Computing, Vol.10 No.4, pp.343-359 World Scientific Publishing Company (1999.12.01).
  6. Evaluation of Two Load-Balancing Primary-Backup Process Allocation Schemes
    H. Lee, J. Kim, and S. J. Hong
    IEICE Transactions on Information and Systems, Vol. E82-D, No. 12, pp.118-127 (1999.12).
  7. Direct Manipulation of Generalized Cylinders Based on B-spline Motion
    Tae-Ick Chang, Joo-Haeng Lee, Myung-Soo Kim, Sung Je Hong
    The Visual Computer, Vol.14, pp.228-239, Springer-Verlag (1998.10).
  8. Adaptive Virtual Cut-Through as a Viable Routing Method
    H. W. Kim, H. S. Lee, S. Lee, and J. Kim
    Journal of Parallel and Distributed Computing, Vol.52, pp.82-95 Academic Press (1998.02).
  9. A CMOS Built-in Current Sensor
    J. B. Kim, S. J. Hong, and J. Kim
    International Journal of Electronics, Vol.85, pp.181-205 (1998.02).
  10. Design of a Built-In Current Sensor for Iddq Testing
    J. B. Kim, S. J. Hong, and J. Kim
    IEEE Journal of Solid States, Vol.33, pp.1266-1272 IEEE (1998.08).
  11. Dynamic Load Distribution on a Mesh with a Single Bus
    W. Y. Lee, S. J. Hong, and J. Kim
    International Journal of High Speed Computing, Vol.9, pp.337-357 World Sceintific Publishing Company (1998.12).
  12. A Boolean Factorization using an Extended Boolean Matrix
    O. H. Kwon, S. J. Hong, and J. Kim
    IEICE Transactions on Information and Systems, Vol.E81-D, pp.1466-1472 IEICE (1998.12).
  13. Dynamic load distribution on a mesh with a single bus,
    W. Lee, S. J. Hong, and J. Kim
    International Journal of High Speed Computing, Vol. 9, No. 4, pp. 337-357, World Scientific Publishing Company (1997.12).
  14. New Circuits for XOR and XNOR Functions
    J. B. Kim, S. J. Hong, and J. Kim
    International Journal of Electronics, Vol.82, No. 2, pp.131-143 Taylor & Francis Ltd. (1997.02).
  15. Replicated Process Allocation for Load Distribution in Fault-Tolerant Multicomputers
    J. Kim, H. J. Lee, and S. G. Lee
    IEEE Trans. on Computers, Vol.46, No. 4, pp.499-504 IEEE (1997.04).
  16. A New Approach to Through-the-Lens Camera Control
    M-H Kyung, M-S Kim, and S. J. Hong
    Graphical Models and Image Processing, Vol.58, No. 3, pp.262-285 Academic Press, Inc. (1996.05).
  17. Execution Time Analysis of Communicating Tasks in Distributed Systems,
    J. Kim, and K. G. Shin
    IEEE Trans. on Computers, Vol. 45, No. 5, pp.572-579 (1996.05).
  18. Path Selection for Message Passing in a Circuit Switched Multicomputer,
    S. G. Lee, and J. Kim
    Journal of Parallel and Distributed Computing, Vol.No. 35, pp.211-218 Cicago, U.S.A. (1996.07).
  19. Hypercube Communication Delay with Wormhole Routing,
    J. Kim and K. G. Shin,
    IEEE Trans. on Computers, Vol.43, No. 7,(1994.07).
  20. Operationally Enhanced Folded Hypercube,
    J. Kim and K. G. Shin,
    IEEE Trans. on Parallel and Distributed Systems, Vol. 5, No. 12,, pp.1310-1316, (1994.12).
  21. Deadlock-Free Routing in an Injured Hypercube,
    J. Kim and K.G. Shin
    IEEE Trans. on Computers, pp.1078-1088, (1993.09).
  22. A Unified Task-based Dependability Models for Hypercube computers,
    C.R. Das, J. Kim
    IEEE Trans. on Parallel and Distributed Systems, pp.312-324, (1992.05).
  23. Absolute Minimization of Completely Specified Switching Functions,
    S. J. Hong and S. Muroga
    IEEE Trans. Computer,, Vol.C-40, pp.53-65 IEEE (1991.01).
  24. A Top-down Processor Allocation Scheme for Hypercube Computer,
    J. Kim, C.R. Das and W. Lin
    IEEE Trans. on Parallel and Distributed Systems, pp.20-30, (1991.01).
  25. The Design of a Testable Parallel Multiplier,
    S. J. Hong
    IEEE Trans. Computers, Vol.C-39, pp.411-416 IEEE (1990.03).
  26. Reliability Evaluation of Hypercube Multicpomputers,
    J. Kim, C.R. Das, et. al.
    IEEE Trans. on Reliability, pp.121-129, (1989.04).
  27. Existence Algorithms for Synchronizing/Distinguishing Sequences,
    S. J. Hong
    IEEE Trans. Computers, Vol.C-31, pp.234-237 IEEE (1981.03).

Tech. report

  1. A dynamic bandwidth reservation scheme based on a dynamic two-tier cell structure in celluar networks,
    Jae Keun Park, Sung Je Hong, Jong Kim
    Technical Report hpc-2008-01, HPC, POSTECH.