Match!
Kwangjo Kim
KAIST
244Publications
34H-index
5,204Citations
Publications 240
Newest
Sep 19, 2019 in ICML (International Conference on Machine Learning)
#1Harry Chandra Tanuwidjaja (KAIST)H-Index: 2
#2Rakyong Choi (KAIST)H-Index: 1
Last.Kwangjo Kim (KAIST)H-Index: 34
view all 3 authors...
There are challenges and issues when machine learning algorithm needs to access highly sensitive data for the training process. In order to address these issues, several privacy-preserving deep learning techniques, including Secure Multi-Party Computation and Homomorphic Encryption in Neural Network have been developed. There are also several methods to modify the Neural Network, so that it can be used in privacy-preserving environment. However, there is trade-off between privacy and performance...
Source
Source
#1Jaemin Park (Electronics and Telecommunications Research Institute)
#2Sungjin Park (Electronics and Telecommunications Research Institute)
Last.Kwangjo Kim (KAIST)H-Index: 34
view all 4 authors...
Abstract Software Guard Extensions (SGX) is a good candidate to address sensitive information disclosure in cloud computing because SGX creates enclaves for applications that protect security sensitive code and data from malicious access. However, existing SGX-enabled Virtual Machine Managers (VMMs) do not provide live migration of SGX-enabled Virtual Machines (VMs). This management operation is impossible because the VMM cannot directly access the Enclave Page Cache (EPC) pages where the VM’s e...
Source
#1Kwangjo KimH-Index: 34
view all 3 authors...
1 Citations
#1Hyeongcheol An (KAIST)
#2Rakyong Choi (KAIST)H-Index: 1
Last.Kwangjo Kim (KAIST)H-Index: 34
view all 3 authors...
The blockchain technique was first proposed called Bitcoin in 2008 and is a distributed database technology. Public Key Infrastructure (PKI) system, which is one of the key management systems, is a centralized system. There is a possibility of single point failure in currently used centralized PKI system. Classical digital signature algorithm; ECDSA has used the well-known cryptocurrencies such as Bitcoin and Ethereum. Using the Shor’s algorithm, it is vulnerable to an attack by the quantum adve...
Source
#1Muhamad Erza Aminanto (KAIST)H-Index: 4
#2Rakyong Choi (KAIST)H-Index: 1
Last.Kwangjo Kim (KAIST)H-Index: 34
view all 5 authors...
The recent advances in mobile technologies have resulted in Internet of Things (IoT)-enabled devices becoming more pervasive and integrated into our daily lives. The security challenges that need to be overcome mainly stem from the open nature of a wireless medium, such as a Wi-Fi network. An impersonation attack is an attack in which an adversary is disguised as a legitimate party in a system or communications protocol. The connected devices are pervasive, generating high-dimensional data on a ...
32 CitationsSource
Last.Kwangjo KimH-Index: 34
view all 5 authors...
#2Rakyong ChoiH-Index: 1
Last.Kwangjo KimH-Index: 34
view all 4 authors...
#1Sungsook KimH-Index: 1
#2Jeeun LeeH-Index: 1
Last.Kwangjo KimH-Index: 34
view all 4 authors...
12345678910