KAIST - COMPUTER SCIENCE

  • korea
  • search
  • login

Directions

 
  • 2018

  • Learning fault localisation for both humans and machines using multi-objective GP

    Choi, Kabdo, Sohn, Jeongju, Shin Yoo
    The 10th International Symposium on Search-Based Software Engineering (SSBSE)
    2018

    []

  • Learning without peeking: Secure multi-party computation genetic programming

    Kim, Jinhan, Epitropakis, Michael G., Shin Yoo
    The 10th International Symposium on Search-Based Software Engineering (SSBSE)
    2018

    []

  • Leveraging the Crowd to Detect and Reduce the Spread of Fake News and Misinformation

    JOOYEON KIM, Tabibian, Behzad, Alice Oh, Scholkopf, Bernhard, Gomez-Rodrigues, Manuel
    ACM International Conference on Web Search and Data Mining(WSDM)
    2018

    [] []

  • Lifelong Learning with Dynamically Expandable Networks

    Jaehong Yoon, Eunho Yang, Lee, Jeongtae, Hwang Sung Ju
    International Conference on Learning Representations (ICLR)
    2018

    [] []

  • Live Migration of Virtual Machines and Containers over Wide Area Networks with Distributed Mobility Management

    Jaehee Ha, JAE HYUN PARK, Sang Yup Han, Myungchul Kim
    International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous)
    2018

    []

  • Location Digest: A placeness service to discover community experience using social media

    Gaurav Kalra, Hoang Minh Nguyen, Wondeuk Yoon, Dongman Lee, Daeyoung KIM
    The 4th IEEE International Smart Cities Conference (ISC2)
    2018

    []

  • Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86

    Hojoon Lee, CHIHYUN SONG, Kang, Brent Byunghoon
    Conference on Computer and Communications Security(CCS)
    2018

    [] []

  • MC-Fluid: Multi-Core Fluid-Based Mixed-Criticality Scheduling

    Lee, Jaewoo, Ramanathan, Saravanan, Kieu-My Phan, Easwaran, Arvind, Insik Shin, Lee, Insup
    IEEE TRANSACTIONS ON COMPUTERS
    2018

    []

  • MUSIC: Mutation Analysis Tool with High Configurability and Extensibility

    Loc Phan Duy, 김윤호, Moonzoo Kim
    2018 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)
    2018

    []

  • Malicious URL protection based on attackers' habitual behavioral analysis

    SUNGJIN KIM, Kim, Jinbok, Kang, Brent Byunghoon
    COMPUTERS & SECURITY
    2018

    [] []

  • Mapping System with Virtual Reality for Mobile Robot Teleoperation

    Kim, Seungwoon, Kim, Ihan, Ha, Jisu, Sungho Jo
    International Conference on Control, Automation and Systems (ICCAS 2018)
    2018

    []

  • Mashup Recommendation for Trigger Action Programming

    In-Young Ko, Noe Dominguez Porras
    International Conference on Web Engineering (ICWE 2018)
    2018

    []

  • Median Filtered Image Restoration and Anti-Forensics Using Adversarial Networks

    Dongkyu Kim, HANUL JANG, SEUNGMIN MUN, Sunghee Choi, Heung-Kyu LEE
    IEEE SIGNAL PROCESSING LETTERS
    2018

    []

  • Micro-NGO: Tackling wicked social problems with problem solving and action planning support in chat

    Lee, S, Kim, JH, Juho Kim
    ACM Conference on Human Factors in Computing Systems(CHI)
    2018

    []

  • Minimizing the Two-Round Even-Mansour Cipher

    Chen, Shan, Lampe, Rodolphe, 이주영, Seurin, Yannick, Steinberger, John
    JOURNAL OF CRYPTOLOGY
    2018

    []

  • MoHiD: A Scalable Mobility Platform based on Hierarchical Distributed Hash Table

    Haeun Kim, JAE HYUN PARK, Sang Yup Han, Myungchul Kim
    Hawaii International Conference on System Sciences (HICSS-51)
    2018

    []

  • Monte-Carlo Tree Search for Constrained MDPs

    Jongmin Lee, Geonhyeong Kim, Pascal Poupart, Kee-Eung Kim
    ICML/IJCAI:SLA:AAMAS Workshop on Planning and Learning (PAL)
    2018

    [] []

  • Multi-Criteria Matrix Localization and Integration for Personalized Collaborative Filtering in IoT environments

    Han-Gyu Ko, In-Young Ko, Dongman Lee
    MULTIMEDIA TOOLS AND APPLICATIONS
    2018

    []

  • Multi-Level Contention-Free Policy for Real-Time Multiprocessor Scheduling

    백형부, 이진규, Insik Shin
    JOURNAL OF SYSTEMS AND SOFTWARE
    2018

    []

  • Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network

    Hyun Kwon, Kim, Yongchul, Park, Ki-Woong, Hyunsoo Yoon, Choi, Daeseon
    IEEE ACCESS
    2018

    []