​
Login / Signup
Jiye Kim
Publication Activity (10 Years)
Years Active: 2014-2023
Publications (10 Years): 19
Top Topics
Elliptic Curve
Key Agreement
Diffie Hellman
Sensor Networks
Top Venues
Sensors
CSA/CUTE
IMCOM
CoRR
</>
Publications
</>
Sohee Jang
,
Jiye Kim
,
Yeon-Ju Kim
,
Joon-Hyuk Chang
Adaptive Time-Scale Modification for Improving Speech Intelligibility Based On Phoneme Clustering For Streaming Services.
ICASSP
(2023)
Jiye Kim
,
Seungbeom Lee
,
Dongwoo Kim
,
Sungsoo Ahn
,
Jaesik Park
Substructure-Atom Cross Attention for Molecular Representation Learning.
CoRR
(2022)
Dongmyung Shin
,
Younghoon Kim
,
Chungseok Oh
,
Hongjun An
,
Juhyung Park
,
Jiye Kim
,
Jongho Lee
DeepRF: Deep Reinforcement Learning Designed RadioFrequency Waveform in MRI.
CoRR
(2021)
Jaeuk Lee
,
Jiye Kim
,
Joon-Hyuk Chang
Zero-Shot Voice Cloning Using Variational Embedding with Attention Mechanism.
IC-NIDC
(2021)
Dongmyung Shin
,
Younghoon Kim
,
Chungseok Oh
,
Hongjun An
,
Juhyung Park
,
Jiye Kim
,
Jongho Lee
Deep reinforcement learning-designed radiofrequency waveform in MRI.
Nat. Mach. Intell.
3 (11) (2021)
Hwajeong Seo
,
Jiye Kim
,
Howon Kim
,
Zhe Liu
Personal identification number entry for Google glass.
Comput. Electr. Eng.
63 (2017)
Donghoon Lee
,
Dongwoo Kang
,
Jiye Kim
,
Dongho Won
Software Birthmark Method Using Combined Structure-Based and API-Based.
J. Softw.
12 (2) (2017)
Jongho Moon
,
Youngsook Lee
,
Jiye Kim
,
Dongho Won
Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User.
Secur. Commun. Networks
2017 (2017)
Hakjun Lee
,
Jiye Kim
,
Jaewook Jung
,
Youngsook Lee
,
Dongho Won
An enhanced unlinkable anonymous payment scheme based on near field commnication.
IMCOM
(2017)
Jongho Moon
,
Jiye Kim
,
Donghoon Lee
,
Dongho Won
Security Enhancement of Robust Anonymous Two-Factor Authenticated Key Exchange Scheme for Mobile Client-Server Environment.
ACIT/CSII/BCD
(2017)
Chunyi Quan
,
Jaewook Jung
,
Jiye Kim
,
Qimin Sun
,
Donghoon Lee
,
Dongho Won
Cryptanalysis and improvement of a biometric and smart card based remote user authentication scheme.
IMCOM
(2017)
Chunyi Quan
,
Hakjun Lee
,
Dongwoo Kang
,
Jiye Kim
,
Seokhyang Cho
,
Dongho Won
Cryptanalysis and Improvement of an Advanced Anonymous and Biometrics-Based Multi-server Authentication Scheme Using Smart Cards.
AHFE (9)
(2017)
Jaewook Jung
,
Donghoon Lee
,
Jiye Kim
,
Youngsook Lee
,
Dongwoo Kang
,
Dongho Won
Cryptanalysis and Improvement of Efficient Password-Based User Authentication Scheme using Hash Function.
IMCOM
(2016)
Jiye Kim
,
Jongho Moon
,
Jaewook Jung
,
Dongho Won
Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks.
J. Sensors
2016 (2016)
Jongho Mun
,
Jiye Kim
,
Dongho Won
An Improvement of User Authentication Framework for Cloud Computing.
J. Comput.
11 (6) (2016)
Jaewook Jung
,
Jiye Kim
,
Younsung Choi
,
Dongho Won
An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.
Sensors
16 (8) (2016)
Fikadu B. Degefa
,
Donghoon Lee
,
Jiye Kim
,
Younsung Choi
,
Dongho Won
Performance and security enhanced authentication and key agreement protocol for SAE/LTE network.
Comput. Networks
94 (2016)
Jongho Moon
,
Younsung Choi
,
Jiye Kim
,
Dongho Won
An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.
J. Medical Syst.
40 (3) (2016)
Donghoon Lee
,
Dongwoo Kang
,
Younsung Choi
,
Jiye Kim
,
Dongho Won
API-Based Software Birthmarking Method Using Fuzzy Hashing.
IEICE Trans. Inf. Syst.
(7) (2016)
Jongho Mun
,
Jiye Kim
,
Donghoon Lee
,
Dongho Won
Cryptanalysis of biometric-based multi-server authentication scheme using smart card.
QSHINE
(2015)
Jiye Kim
,
Donghoon Lee
,
Younsung Choi
,
Youngsook Lee
,
Dongho Won
Security Improvement of Portable Key Management Using a Mobile Phone.
ICCSA (4)
(2015)
Jaewook Jung
,
Younsung Choi
,
Donghoon Lee
,
Jiye Kim
,
Jongho Mun
,
Dongho Won
Cryptanalysis of Dynamic ID-Based User Authentication Scheme Using Smartcards Without Verifier Tables.
CSA/CUTE
(2015)
Jongho Mun
,
Jiseon Yu
,
Jiye Kim
,
Hyungkyu Yang
,
Dongho Won
Cryptanalysis of Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem.
CSA/CUTE
(2015)
Yoonji Song
,
Jiye Kim
Mingle: Wearable Devices for Enhancing Communications and Activities between the Blind and Ordinary People through a Waltz.
CHI Extended Abstracts
(2015)
Hanwook Lee
,
Jongho Mun
,
Jiye Kim
,
Youngsook Lee
,
Dongho Won
Secure Deletion for Flash-Based Self-Encrypting Drives.
CSA/CUTE
(2015)
Younsung Choi
,
Donghoon Lee
,
Jiye Kim
,
Jaewook Jung
,
Junghyun Nam
,
Dongho Won
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography.
Sensors
14 (6) (2014)
Jiye Kim
,
Donghoon Lee
,
Woongryul Jeon
,
Youngsook Lee
,
Dongho Won
Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks.
Sensors
14 (4) (2014)