Immediate Impact
55 standout
Citing Papers
AI-Driven Cloud Security: Examining the Impact of User Behavior Analysis on Threat Detection
2024 Standout
Deep learning for unmanned aerial vehicles detection: A review
2024 Standout
Works of Junsoo Kim being referenced
Toward a Secure Drone System: Flying With Real-Time Homomorphic Authenticated Encryption
2018
Encrypting Controller using Fully Homomorphic Encryption for Security of Cyber-Physical Systems**The work of J. Kim, C. Lee, and H. Shim was supported by ICT R & D program of MSIP/IITP Grant number 14-824-09-013, Resilient Cyber-Physical Systems Research. The work of J. H. Cheon, A. Kim, M. Kim, and Y. Song was supported by IT R & D program of MSIP/KEIT [No. 0450-21060006] and Samsung Electronics Co., Ltd. (No. 0421-20150074).
2016
Author Peers
| Author | Last Decade | Papers | Cites | ||||
|---|---|---|---|---|---|---|---|
| Junsoo Kim | 158 | 131 | 33 | 127 | 19 | 325 | |
| Cheolhyeon Kwon | 74 | 207 | 16 | 161 | 28 | 331 | |
| Qirui Zhang | 72 | 273 | 18 | 194 | 17 | 351 | |
| Tianju Sui | 125 | 235 | 10 | 216 | 20 | 367 | |
| Attila A. Yavuz | 194 | 54 | 43 | 145 | 29 | 364 | |
| Moritz Schulze Darup | 157 | 205 | 35 | 91 | 38 | 346 | |
| Kenneth Radke | 117 | 129 | 12 | 146 | 18 | 302 | |
| Kun Li | 118 | 35 | 40 | 172 | 21 | 306 | |
| Rajasekhar Anguluri | 129 | 106 | 23 | 38 | 14 | 301 | |
| Daniel-Ioan Curiac | 67 | 45 | 101 | 159 | 33 | 318 | |
| Yu Luo | 51 | 146 | 28 | 110 | 22 | 315 |
All Works
Login with ORCID to disown or claim papers
Loading papers...