Kim, Hodong
172  results:
Search for persons X
?
1

Deep Learning-Based Detection for Multiple Cache Side-Chann..:

Kim, Hodong ; Hahn, Changhee ; Kim, Hyunwoo J...
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 1672-1686 , 2024
 
?
2

Introduction:

, In: The Cambridge History of the Mongol Empire,
Biran, Michal ; Kim, Hodong - p. 1-16 , 2023
 
?
3

Improved fast neutron detection using CNN-based pulse shape..:

Yoon, Seonkwang ; Lee, Chaehun ; Seo, Hee.
Nuclear Engineering and Technology.  55 (2023)  11 - p. 3925-3934 , 2023
 
?
4

Epilogue: The Mongol Empire, Nomadic Culture, and World His..:

, In: The Cambridge History of the Mongol Empire,
Biran, Michal ; Kim, Hodong - p. 852-876 , 2023
 
?
5

Mongol Imperial Institutions:

, In: The Cambridge History of the Mongol Empire,
Kim, Hodong - p. 399-443 , 2023
 
?
 
?
8

Comparative investigation of detector responses and measure..:

Yoon, Seonkwang ; Lee, Chaehun ; Seo, Hee.
Measurement Science and Technology.  35 (2023)  1 - p. 015038 , 2023
 
?
9

VerSA: Verifiable Secure Aggregation for Cross-Device Feder..:

Hahn, Changhee ; Kim, Hodong ; Kim, Minjae.
IEEE Transactions on Dependable and Secure Computing.  20 (2023)  1 - p. 36-52 , 2023
 
?
11

PCIe Side-channel Attack on I/O Device via RDMA-enabled Net..:

, In: 2022 13th International Conference on Information and Communication Technology Convergence (ICTC),
Kim, Hodong ; Hur, Junbeom - p. 1468-1470 , 2022
 
?
14

Fast neutron-gamma discrimination in organic scintillators ..:

Yoon, Seonkwang ; Lee, Chaehun ; Won, Byung-Hee...
Journal of the Korean Physical Society.  80 (2022)  5 - p. 427-433 , 2022
 
?
15

Exploiting Metaobjects to Reinforce Data Leakage Attacks:

, In: Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses,
Jeong, Hoyong ; Kim, Hodong ; Hur, Junbeom - p. 17-29 , 2022
 
1-15