Match!
Kuinam J. Kim
Kyonggi University
99Publications
7H-index
284Citations
Publications 103
Newest
Source
#1Hyun-Joo Kim (Electronics and Telecommunications Research Institute)H-Index: 27
#2Jin Han Kang (Electronics and Telecommunications Research Institute)H-Index: 29
Last.Hyuncheol Kim (Namseoul University)H-Index: 5
view all 6 authors...
Conventional malware detection technologies have the limitation to detect malware because recent malware uses a variety of the avoidance techniques such as obfuscation, packing, anti-virtualization, anti-emulation, encapsulation technology in order to evade the detection of malware. To overcome this limitation, it is necessary to obtain new detection technology which is able to quickly analyze massive malware and its variants, and take the rapid response to cyber intrusion. Therefore in this pap...
8 CitationsSource
#1Kuinam J. KimH-Index: 7
#2Hyuncheol KimH-Index: 5
Track 1. Mobile and Wireless Technology -- Track 2. Technology of AI and IoT with Wireless and Advanced Networking -- Track 3. Applications.
#1Donghwoon Kwon (Texas A&M University–Commerce)H-Index: 5
#2Hyun-Joo Kim (Electronics and Telecommunications Research Institute)H-Index: 27
Last.Kuinam J. Kim (KGU: Kyonggi University)H-Index: 7
view all 6 authors...
A great deal of attention has been given to deep learning over the past several years, and new deep learning techniques are emerging with improved functionality. Many computer and network applications actively utilize such deep learning algorithms and report enhanced performance through them. In this study, we present an overview of deep learning methodologies, including restricted Bolzmann machine-based deep belief network, deep neural network, and recurrent neural network, as well as the machi...
70 CitationsSource
#1Hyun-Joo Kim (Electronics and Telecommunications Research Institute)H-Index: 27
#2Jin Han Kang (Electronics and Telecommunications Research Institute)H-Index: 29
Last.Kuinam J. Kim (KGU: Kyonggi University)H-Index: 7
view all 5 authors...
To respond to recent network threats that are using increasingly intelligent techniques, the intelligent security technology on cloud computing is required. Especially it supports small and medium enterprises to build IT security solution with low cost and less effort because it is provided as Security as a Service on a cloud environment. In this paper, we particularly propose the network threat detection and classification method based on machine learning, which is a part of the intelligent thr...
2 CitationsSource
#1Nakhoon Baek (KNU: Kyungpook National University)H-Index: 8
#2Kuinam J. KimH-Index: 7
Latest 3D graphics libraries, including OpenGL and OpenGL ES, provide programmable rendering pipelines. These programmable pipelines naturally requires special-purpose programming languages. It is so called OpenGL Shading Language in the case of OpenGL. In this paper, we show a new compact design scheme for the implementation of OpenGL SL offline compilers. This scheme is used for our OpenGL SL offline compiler prototype implementation. Our implementation shows feasibility and correctness with r...
Source
#1Hye-Young Kim (Hongik University)H-Index: 5
#2Kuinam J. Kim (KGU: Kyonggi University)H-Index: 7
The emergence of mobile cloud computing indicates that abundant applications such as mobile games are available. Clouds have many interesting characteristics including on demand service, measured service, scalable elastic service, “anytime, anywhere” network access in cloud networks. Benefit due to the service controlled by communication between objects is now being increased by people who use these services in real life. In a very large scale mobile gaming environment with limited wireless netw...
1 CitationsSource
#1Nakhoon Baek (KNU: Kyungpook National University)H-Index: 8
#2Kuinam J. KimH-Index: 7
OpenGL Safety Critical Profile (OpenGL SC) is a variation of the famous three-dimensional graphics library Open Graphics Library (OpenGL), for safety critical environment. It has been widely used for three-dimensional graphics output in military, avionics, and medical applications. In the year of 2015, OpenGL SC 2.0 was newly released as the newest and specialized three-dimensional graphics standard for safety-critical applications. In this paper, we represent the high-level design schemes of th...
Source
#1Kuinam J. KimH-Index: 7
#2Nakhoon Baek (KNU: Kyungpook National University)H-Index: 8
Debugging and profiling features are more important for 3D graphics application libraries, including OpenGL. To support integrated development environment (IDE) and/or human-readable profiling messages, we need lots of profiling and debugging messages. These messages should be generated from each of the OpenGL function. Additionally, some debugging extensions are also required for more convenience. We aimed to provide preliminary profiling information from the existing OpenGL ES drivers and/or i...
Source
#1Kuinam J. KimH-Index: 7
#2Nikolai JoukovH-Index: 15
Source
12345678910