Conference paper |
13th International Workshop on Computer Science and Engineering, WCSE 2023 |
Kim H.-Y. |
Implementation of an Efficient Multi-Signature Scheme for Copyright Protection on Ethereum |
0 |
978-981187950-0 |
2023-06-16 |
Article |
IEIE Transactions on Smart Processing and Computing |
Na J.; Kim H.-Y.; Park N.; Seo B. |
Comparative Analysis of Schnorr Digital Signature and ECDSA for Efficiency using Private Ethereum Network |
4 |
2287-5255 |
2022-12-01 |
Conference paper |
International Conference on ICT Convergence |
Kim J.; Kim H.; Choi W.; Song M.; Lee S. |
Automatic VLAN Control Framework for a Small Network |
0 |
2162-1233 |
2022-10-19 |
Conference paper |
Proceedings - 2021 International Conference on Computational Science and Computational Intelligence, CSCI 2021 |
Kim H.-Y.; Lee J.-H. |
A load balancing scheme based on deep learning in blockchain network |
2 |
978-166545841-2 |
2021-12-15 |
Conference paper |
BSCI 2021 - Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure, co-located with ASIA CCS 2021 |
Kancharla A.; Seol J.; Kim H.-Y.; Park N. |
Distributed Decentralized Chain (DDC) and k-Queue Variable Bulk Arrival and Static Bulk Service Model |
1 |
978-145038400-1 |
2021-05-24 |
Article |
Journal of Information Processing Systems |
Kim H.-Y. |
An Efficient Load Balancing Scheme for Gaming Server Using Proximal Policy Optimization Algorithm |
1 |
1976-913x |
2021-04-01 |
Article |
Applied Sciences (Switzerland) |
Ashiquzzaman A.; Lee H.; Kim K.; Kim H.-Y.; Park J.; Kim J. |
Compact spatial pyramid pooling deep convolutional neural network based hand gestures decoder |
16 |
2076-3417 |
2020-11-01 |
Conference paper |
BSCI 2020 - Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, Co-located with AsiaCCS 2020 |
Kancharla A.; Seol J.; Park N.; Kim H. |
Slim chain and dependability |
5 |
978-145037610-5 |
2020-10-06 |
Article |
Computer Science and Information Systems |
Kim H.-Y.; Kim J. |
A load balancing scheme for gaming server applying reinforcement learning in IOT |
4 |
1820-0214 |
2020-10-01 |
Conference paper |
BSCI 2020 - Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, Co-located with AsiaCCS 2020 |
Kancharla A.; Ke Z.; Park N.; Kim H. |
Hybrid chain and dependability |
1 |
978-145037610-5 |
2020-10-06 |
Article |
Applied Sciences (Switzerland) |
Park N.; Kancharla A.; Kim H.-Y. |
A real-time chain and variable bulk arrival and variable bulk service (VBAVBS) Model with λF |
2 |
2076-3417 |
2020-05-01 |
Article |
Tehnicki Vjesnik |
Ashiquzzaman A.; Lee H.; Um T.-W.; Kim K.; Kim H.-Y.; Kim J. |
Deep learning-guided production quality estimation for virtual environment-based applications |
0 |
1330-3651 |
2020-12-01 |
Conference paper |
BSCI 2020 - Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, Co-located with AsiaCCS 2020 |
Seol J.; Kancharla A.; Ke Z.; Kim H.; Park N. |
A variable bulk arrival and static bulk service queueing model for blockchain |
5 |
978-145037610-5 |
2020-10-06 |
Editorial |
Lecture Notes in Electrical Engineering |
Kim K.J.; Kim H.-Y. |
Preface |
0 |
1876-1100 |
2020-01-01 |
Conference paper |
IOP Conference Series: Materials Science and Engineering |
Kim H.-Y. |
A scheme of anomalous detection based on reinforcement learning for load balancing |
1 |
1757-8981 |
2019-12-27 |
Article |
Cluster Computing |
Kim H.-Y.; Kim K.J. |
Optimized state update for mobile games in cloud networks |
1 |
1386-7857 |
2019-01-16 |
Conference paper |
Lecture Notes in Electrical Engineering |
Kim C.; Kim H.-Y. |
A hybrid deep Q-network for the SVM Lagrangian |
1 |
1876-1100 |
2018-06-25 |
Conference paper |
Lecture Notes in Electrical Engineering |
Kim H.-Y. |
Development of integrated monitoring system based on IoT for Odor reduction |
0 |
1876-1100 |
2018-01-31 |
Conference paper |
Lecture Notes in Electrical Engineering |
Kim C.; Park J.-M.; Kim H.-Y. |
An actor-critic algorithm for SVM hyperparameters |
1 |
1876-1100 |
2018-06-25 |
Article |
Journal of Supercomputing |
Kim H.-Y. |
A design and implementation of a framework for games in IoT |
8 |
0920-8542 |
2018-12-01 |
Article |
Journal of Supercomputing |
Kim H.-Y. |
A load balancing scheme with Loadbot in IoT networks |
11 |
0920-8542 |
2018-03-01 |
Article |
Wireless Personal Communications |
Kim H.-Y.; Kim J. |
An Energy-Efficient Balancing Scheme in Wireless Sensor Networks |
11 |
0929-6212 |
2017-05-01 |
Conference paper |
Lecture Notes in Electrical Engineering |
Kim C.; Kim H.-Y. |
An improved SVM-T-RFE based on intensity-dependent normalization for feature selection in gene expression of big-data |
1 |
1876-1100 |
2017-09-25 |
Article |
Cluster Computing |
Kim H.-Y.; Kim J.-M. |
A load balancing scheme based on deep-learning in IoT |
48 |
1386-7857 |
2017-03-01 |
Conference paper |
Proceedings - 2016 IEEE International Conference on Smart Cloud, SmartCloud 2016 |
Kim H.-Y. |
A Study of a Framework for Experimental Games with Sensors in IoT |
1 |
978-150905262-2 |
2016-11-18 |
Article |
Cluster Computing |
Kim H.-Y. |
An energy-efficient load balancing scheme to extend lifetime in wireless sensor networks |
54 |
1386-7857 |
2016-03-01 |
Conference paper |
ACM International Conference Proceeding Series |
Kim H.-Y. |
A study of a smart IT convergence framework in IoT |
0 |
978-145034764-8 |
2016-07-20 |
Article |
International Journal of Applied Engineering Research |
Kim H.-Y.; Kim J. |
A study of implementation of kinesthetic feedback on game framework using the haptic device for realistic interaction |
0 |
0973-4562 |
2015-12-01 |
Conference paper |
2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings |
Park A.-J.; Kim H.-Y.; Lim J.-I. |
A framework of device authentication management in IoT environments |
4 |
978-146736537-6 |
2015-08-24 |
Conference paper |
2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings |
Kim H.-Y. |
An effective load balancing scheme maximizes the lifetime in wireless sensor networks |
4 |
978-146736537-6 |
2015-08-24 |