Open Access System for Information Sharing

Login Library
KIM, JONG(김종) scopus

Co-researchers

    Keyword

    Publication & Time Cited Count (For the Last 5 years)

    Results 1-20 of 93 (Search time: 0.002 seconds).
    Conference

    Proc. the European Conference on Computer Vision (ECCV) 2022 Workshop on Adversarial Robustness in the Real World (AROW), page. 467 - 482, 2022-10-23

    Conference

    Conference on Blockchain Technology-2022, page. 185 - 202, 2022-09-29

    Conference

    5th IEEE International Conference on Blockchain, Blockchain 2022, page. 340 - 347, 2022-08-23

    Conference

    37th Annual Computer Security Applications Conference, ACSAC 2021, page. 586 - 595, 2021-12-08

    Conference

    21th World Conference on Information Security Applications (WISA), 2020-08-26

    Conference

    20th World Conference on Information Security Applications (WISA), 2019-08-24

    Conference

    ACM ASIA Conference on Computer and Communications Security (AsiaCCS), 2019-07-11

    Conference

    International Conference on Compiler Construction, 2019-02-16

    Conference

    IEEE/ACM International Symposium on Microarchitecture, page. 455 - 468, 2018-10-22

    Conference

    World Conference on Information Security Applications, 2018-08-23

    Conference

    IEEE/IFIP International Conference on Dependable Systems and Networks, 2018-06-25

    Conference

    International Symposium on Rapid System Prototyping, 2017-10-20

    Conference

    18th World Conference on Information Security Applications, 2017-08-25

    Conference

    The 18th Annual ACM SIGPLAN / SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems, 2017-06-21

    Conference

    The ACM Symposium on Access Control Models and Technologies (SACMAT), 2017-06-21

    Conference

    Proc. 32nd Annual Computer Security Applications Conference (ACSAC 2016), 2016-12-08

    Conference

    Proc. 17th International Workshop on Information Security Applications (WISA 2016), 2016-08-26

    Conference

    Proc. 22nd ACM Conference on Computer and Communications Security (CCS 2015), 2015-10-12

    1 2 3 4 5

    Browse