Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    From the Hardness of Detecting Superpositions to Cryptography: Quantum Public Key Encryption and Commitments

    Recently, Aaronson et al. (ar** these states. While their original motivation was from quantum gravity, we ...

    Minki Hhan, Tomoyuki Morimae, Takashi Yamakawa in Advances in Cryptology – EUROCRYPT 2023 (2023)

  2. Article

    Open Access

    Scalable design and algorithm for science DMZ by considering the nature of research traffic

    This paper explores the nature of scientific research traffic on the Korea research environment open network. Based on these investigations, we propose a scalable design and algorithm for the science demilitar...

    Chankyun Lee, Minseok Jang, Minki Noh, Woo** Seok in The Journal of Supercomputing (2021)

  3. No Access

    Chapter and Conference Paper

    DoFNet: Depth of Field Difference Learning for Detecting Image Forgery

    Recently, online transactions have had an exponential growth and expanded to various cases, such as opening bank accounts and filing for insurance claims. Despite the effort of many companies requiring their o...

    Yonghyun Jeong, Jongwon Choi, Doyeon Kim, Sehyeon Park in Computer Vision – ACCV 2020 (2021)

  4. No Access

    Article

    Extraction of Product Evaluation Factors with a Convolutional Neural Network and Transfer Learning

    Earlier studies have indicated that decision-making by a project development team can be improved throughout the design and development process by understanding the key factors that affect customers evaluation...

    Younghoon Lee, Minki Chung, Sungzoon Cho, **hae Choi in Neural Processing Letters (2019)

  5. No Access

    Article

    Variable-categorized clustering algorithm using fuzzy logic for Internet of things local networks

    This paper presents a variable-categorized clustering algorithm (VCCA) using fuzzy logic for Internet of Things (IoT) local networks. The VCCA selects the cluster head (CH) that has the highest network capacit...

    Jung-Hyok Kwon, Minki Cha, Sol-Bee Lee, Eui-Jik Kim in Multimedia Tools and Applications (2019)

  6. Chapter and Conference Paper

    GA-Based Filter Selection for Representation in Convolutional Neural Networks

    One of the deep learning models, a convolutional neural network (CNN) has been very successful in a variety of computer vision tasks. Features of a CNN are automatically generated, however, they can be further...

    Junbong Kim, Minki Lee, Jongeun Choi, Kisung Seo in Computer Vision – ECCV 2018 Workshops (2019)

  7. No Access

    Chapter and Conference Paper

    Resource Optimized Neural Architecture Search for 3D Medical Image Segmentation

    Neural Architecture Search (NAS), a framework which automates the task of designing neural networks, has recently been actively studied in the field of deep learning. However, there are only a few NAS methods ...

    Woong Bae, Seungho Lee, Yeha Lee in Medical Image Computing and Computer Assis… (2019)

  8. Chapter and Conference Paper

    Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation

    We initiate a systematic study of pseudorandom functions (PRFs) that are computable by simple matrix branching programs; we refer to these objects as “matrix PRFs”. Matrix PRFs are attractive due to their sim...

    Yilei Chen, Minki Hhan, Vinod Vaikuntanathan, Hoeteck Wee in Theory of Cryptography (2019)

  9. No Access

    Chapter and Conference Paper

    Quantum Random Oracle Model with Auxiliary Input

    The random oracle model (ROM) is an idealized model where hash functions are modeled as random functions that are only accessible as oracles. Although the ROM has been used for proving many cryptographic schem...

    Minki Hhan, Keita Xagawa, Takashi Yamakawa in Advances in Cryptology – ASIACRYPT 2019 (2019)

  10. No Access

    Chapter and Conference Paper

    Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map

    We present a new cryptanalytic algorithm on obfuscations based on GGH15 multilinear map. Our algorithm, statistical zeroizing attack, directly distinguishes two distributions from obfuscation while it follows the...

    Jung Hee Cheon, Wonhee Cho, Minki Hhan, Jiseung Kim in Advances in Cryptology – CRYPTO 2019 (2019)

  11. No Access

    Article

    Popularity-based covering sets for energy proportionality in shared-nothing clusters

    Energy management for large-scale clusters has been the subject of significant research attention in recent years. The principle of energy proportionality states that we can save energy by activating only a subse...

    Minki Kim, Haengrae Cho in The Journal of Supercomputing (2018)

  12. Chapter and Conference Paper

    Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem

    In this paper, we propose cryptanalyses of all existing indistinguishability obfuscation (iO) candidates based on branching programs (BP) over GGH13 multilinear map for all recommended parameter settings. To achi...

    Jung Hee Cheon, Minki Hhan, Jiseung Kim in Advances in Cryptology – CRYPTO 2018 (2018)

  13. No Access

    Article

    A revised cache allocation algorithm for VoD multicast service

    The Internet is replacing the traditional telephone network as the ubiquitous network infrastructure. Internet customers are increasing at an exponential rate and will continue to increase in the near future. ...

    Hyun Jong Lee, Wonhyuk Lee, Seunghae Kim, Minki Noh in Multimedia Tools and Applications (2015)

  14. No Access

    Chapter and Conference Paper

    Improved Fast Handover Protocol Using HMIPv6 Based on IEEE 802.16e Network

    Since the Wibro service realize mobile network on the public, it has been considered that it is not enough to support real time service at vehicular speed. The standard Fast Mobile IPv6 Handover Protocol using...

    Gyodu Koo, KiSung Yu, Minki Noh in Computational Science and Its Applications… (2007)

  15. No Access

    Chapter and Conference Paper

    A Rule Based Approach to Network Fault and Security Diagnosis with Agent Collaboration

    This paper introduces rule-based reasoning (RBR) Expert System for network fault and security diagnosis and a mechanism for optimization. In this system, we use agent collaboration mechanism which is the proce...

    Siheung Kim, Seong ** Ahn, **wok Chung in Artificial Intelligence and Simulation (2005)

  16. Chapter and Conference Paper

    A Study on TCP Buffer Management Algorithm for Improvement of Network Performance in Grid Environment

    The Grid is the environment that connects high performance computing resource, which are scattered geographically as related network. The Grid, which started in the mid of 1990, has studied and laid across in ...

    Yonghwan Jeong, Minki Noh, Hyewon K. Lee in Computational Science - ICCS 2004 (2004)