Hyunsoo Yoon
Hyunsoo Yoon
Professor of Computer Science, KAIST
Verified email at
Cited by
Cited by
Performance analysis of multibuffered packet-switching networks in multiprocessor systems
H Yoon, KY Lee, MT Liu
IEEE Transactions on Computers 39 (3), 319-327, 1990
Mobility support in content centric networks
D Kim, J Kim, Y Kim, H Yoon, I Yeom
Proceedings of the second edition of the ICN workshop on Information-centric …, 2012
Link stability and route lifetime in ad-hoc wireless networks
G Lim, K Shin, S Lee, H Yoon, JS Ma
Proceedings. International Conference on Parallel Processing Workshop, 116-123, 2002
Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage
D Koo, J Hur, H Yoon
Computers & Electrical Engineering 39 (1), 34-46, 2013
Grid-based energy-efficient routing from multiple sources to multiple mobile sinks in wireless sensor networks
K Kweon, H Ghim, J Hong, H Yoon
2009 4th International symposium on wireless pervasive computing, 1-5, 2009
Trust evaluation model for wireless sensor networks
J Hur, Y Lee, H Yoon, D Choi, S Jin
The 7th International Conference on Advanced Communication Technology, 2005 …, 2005
The knockout switch under nonuniform traffic
H Yoon, MT Liu, KY Lee, YM Kim
IEEE transactions on communications 43 (6), 2149-2156, 1995
Transcriptional profiling of the developmentally important signalling pathways in human embryonic stem cells
JY Rho, K Yu, JS Han, JI Chae, DB Koo, HS Yoon, SY Moon, KK Lee, ...
Human Reproduction 21 (2), 405-412, 2006
On submesh allocation for mesh multicomputers: A best-fit allocation and a virtual submesh allocation for faulty meshes
G Kim, H Yoon
IEEE Transactions on Parallel and Distributed Systems 9 (2), 175-185, 1998
Towards a ubiquitous robotic companion: Design and implementation of ubiquitous robotic service framework
YG Ha, JC Sohn, YJ Cho, H Yoon
ETRI journal 27 (6), 666-676, 2005
Selective audio adversarial example in evasion attack on speech recognition system
H Kwon, Y Kim, H Yoon, D Choi
IEEE Transactions on Information Forensics and Security 15, 526-538, 2019
Efficient privacy-preserving matrix factorization via fully homomorphic encryption
S Kim, J Kim, D Koo, Y Kim, H Yoon, J Shin
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
New modular multiplication algorithms for fast modular exponentiation
SM Hong, SY Oh, H Yoon
International Conference on the Theory and Applications of Cryptographic …, 1996
Optimal modulation and coding scheme selection in cellular networks with hybrid-ARQ error control
D Kim, BC Jung, H Lee, DK Sung, H Yoon
IEEE transactions on wireless communications 7 (12), 5195-5201, 2008
A smart handover decision algorithm using location prediction for hierarchical macro/femto-cell networks
B Jeong, S Shin, I Jang, NW Sung, H Yoon
2011 IEEE vehicular technology conference (VTC Fall), 1-5, 2011
Security considerations for handover schemes in mobile WiMAX networks
J Hur, H Shim, P Kim, H Yoon, NO Song
2008 IEEE wireless communications and networking conference, 2531-2536, 2008
End‐to‐end mobility support in content centric networks
D Kim, J Kim, Y Kim, H Yoon, I Yeom
International Journal of Communication Systems 28 (6), 1151-1167, 2015
Real-time analysis of intrusion detection alerts via correlation
S Lee, B Chung, H Kim, Y Lee, C Park, H Yoon
Computers & Security 25 (3), 169-183, 2006
Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption
J Kim, D Koo, Y Kim, H Yoon, J Shin, S Kim
ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-30, 2018
Cluster‐Based Trust Evaluation Scheme in an Ad Hoc Network
S Jin, C Park, D Choi, K Chung, H Yoon
ETRI journal 27 (4), 465-468, 2005
The system can't perform the operation now. Try again later.
Articles 1–20