Kwangjo Kim

Kwangjo Kim

Korea Advanced Institute of Science and Technology

Professor

School of Computing

Research Area

  • #Computer science
  • #Artificial intelligence
  • #Machine learning
  • #Information leakage
  • #Cloud computing
  • #Cloud storage
  • #Data deduplication
  • #Feature learning
  • #Mathematics
  • #Deep learning

Get access to
Contact information

Log in

Related papers to
‘ Computer science ‘ : 6

  • Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection

    2018/03

    6.2 Impact Factor

    111 citations

    Muhamad Erza Aminanto, Rakyong Choi, Harry Chandra Tanuwidjaja, Paul D. Yoo, Kwangjo Kim

    DOI : 10.1109/TIFS.2017.2762828

    • #Computer science
    • #Artificial intelligence
    • #Pattern recognition
    • #Machine learning
    • #Feature extraction
    • #Support vector machine
    • #Computational complexity theory
    • #Feature selection
    • #Communications protocol
    • #Feature learning
    • #Constant false alarm rate
    • #Wireless network

All papers authored by
‘ Kwangjo Kim ’ : 10

  • Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection

    2018/03
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY

    6.2 Impact Factor

    111 citations

    Muhamad Erza Aminanto, Rakyong Choi, Harry Chandra Tanuwidjaja, Paul D. Yoo, Kwangjo Kim

    DOI : 10.1109/TIFS.2017.2762828

    • #Computer science
    • #Artificial intelligence
    • #Pattern recognition
    • #Machine learning
    • #Feature extraction
    • #Support vector machine
    • #Computational complexity theory
    • #Feature selection
    • #Communications protocol
    • #Feature learning
    • #Constant false alarm rate
    • #Wireless network

Related papers to
‘ Computer science ‘ : 6

  • Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection

    2018/03
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY

    6.2 Impact Factor

    111 citations

    Muhamad Erza Aminanto, Rakyong Choi, Harry Chandra Tanuwidjaja, Paul D. Yoo, Kwangjo Kim

    DOI : 10.1109/TIFS.2017.2762828

    • #Computer science
    • #Artificial intelligence
    • #Pattern recognition
    • #Machine learning
    • #Feature extraction
    • #Support vector machine
    • #Computational complexity theory
    • #Feature selection
    • #Communications protocol
    • #Feature learning
    • #Constant false alarm rate
    • #Wireless network
  • Differentially private client-side data deduplication protocol for cloud storage services

    2015/08
    SECURITY AND COMMUNICATION NETWORKS

    0.8 Impact Factor

    18 citations

    Youngjoo Shin, Kwangjo Kim

    DOI : 10.1002/SEC.1159

    • #Computer science
    • #Computer network
    • #Service provider
    • #Default gateway
    • #Client-side
    • #Information sensitivity
    • #Disk storage
    • #Data deduplication
    • #Information leakage
    • #Cloud storage

Get access to
Contact information

Log in

All papers authored by
‘ Kwangjo Kim ’ : 10

  • Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection

    2018/03
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY

    6.2 Impact Factor

    111 citations

    Muhamad Erza Aminanto, Rakyong Choi, Harry Chandra Tanuwidjaja, Paul D. Yoo, Kwangjo Kim

    DOI : 10.1109/TIFS.2017.2762828

    • #Computer science
    • #Artificial intelligence
    • #Pattern recognition
    • #Machine learning
    • #Feature extraction
    • #Support vector machine
    • #Computational complexity theory
    • #Feature selection
    • #Communications protocol
    • #Feature learning
    • #Constant false alarm rate
    • #Wireless network
  • Identity-based chameleon hashing and signatures without key exposure

    2014/05
    INFORMATION SCIENCES

    4.0 Impact Factor

    56 citations

    Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim

    DOI : 10.1016/J.INS.2013.12.020

    • #Mathematics
    • #Computer security
    • #Mathematical proof
    • #Hash function
    • #Certificate
    • #Open problem
    • #Cryptosystem
    • #Security properties
    • #Concrete security
    • #Identity based system

Get access to Contact information

Log in
scholarship

Are you Thesis Advisor?
Register and Get Benefits from PhD.GO!

Learn more

Blog

Learn more about scholarship of
Korea Advanced Institute of Science and Technology

Learn more