Immediate Impact

55 standout
Sub-graph 1 of 23

Citing Papers

AI-Driven Cloud Security: Examining the Impact of User Behavior Analysis on Threat Detection
2024 Standout
Deep learning for unmanned aerial vehicles detection: A review
2024 Standout
4 intermediate papers

Works of Junsoo Kim being referenced

Toward a Secure Drone System: Flying With Real-Time Homomorphic Authenticated Encryption
2018
Encrypting Controller using Fully Homomorphic Encryption for Security of Cyber-Physical Systems**The work of J. Kim, C. Lee, and H. Shim was supported by ICT R & D program of MSIP/IITP Grant number 14-824-09-013, Resilient Cyber-Physical Systems Research. The work of J. H. Cheon, A. Kim, M. Kim, and Y. Song was supported by IT R & D program of MSIP/KEIT [No. 0450-21060006] and Samsung Electronics Co., Ltd. (No. 0421-20150074).
2016

Author Peers

Author Last Decade Papers Cites
Junsoo Kim 158 131 33 127 19 325
Cheolhyeon Kwon 74 207 16 161 28 331
Qirui Zhang 72 273 18 194 17 351
Tianju Sui 125 235 10 216 20 367
Attila A. Yavuz 194 54 43 145 29 364
Moritz Schulze Darup 157 205 35 91 38 346
Kenneth Radke 117 129 12 146 18 302
Kun Li 118 35 40 172 21 306
Rajasekhar Anguluri 129 106 23 38 14 301
Daniel-Ioan Curiac 67 45 101 159 33 318
Yu Luo 51 146 28 110 22 315

All Works

Loading papers...

Rankless by CCL
2026