BibTeX records: Dongkwan Kim

download as .bib file

@inproceedings{DBLP:conf/iclr/KimO21,
  author    = {Dongkwan Kim and
               Alice H. Oh},
  title     = {How to Find Your Friendly Neighborhood: Graph Attention Design with
               Self-Supervision},
  booktitle = {9th International Conference on Learning Representations, {ICLR} 2021,
               Virtual Event, Austria, May 3-7, 2021},
  publisher = {OpenReview.net},
  year      = {2021},
  url       = {https://openreview.net/forum?id=Wi5KUNlqWty},
  timestamp = {Wed, 23 Jun 2021 17:36:39 +0200},
  biburl    = {https://dblp.org/rec/conf/iclr/KimO21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/KimKPYK21,
  author    = {Eunsoo Kim and
               Dongkwan Kim and
               CheolJun Park and
               Insu Yun and
               Yongdae Kim},
  title     = {BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications
               for {L3} Protocols},
  booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS}
               2021, virtually, February 21-25, 2021},
  publisher = {The Internet Society},
  year      = {2021},
  url       = {https://www.ndss-symposium.org/ndss-paper/basespec-comparative-analysis-of-baseband-software-and-cellular-specifications-for-l3-protocols/},
  timestamp = {Thu, 17 Jun 2021 15:42:26 +0200},
  biburl    = {https://dblp.org/rec/conf/ndss/KimKPYK21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KimKKKJK20,
  author    = {Mingeun Kim and
               Dongkwan Kim and
               Eunsoo Kim and
               Suryeon Kim and
               Yeongjin Jang and
               Yongdae Kim},
  title     = {FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic
               Analysis},
  booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
               Event / Austin, TX, USA, 7-11 December, 2020},
  pages     = {733--745},
  publisher = {{ACM}},
  year      = {2020},
  url       = {https://doi.org/10.1145/3427228.3427294},
  doi       = {10.1145/3427228.3427294},
  timestamp = {Tue, 15 Dec 2020 12:22:00 +0100},
  biburl    = {https://dblp.org/rec/conf/acsac/KimKKKJK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-10749,
  author    = {Dongkwan Kim and
               Eunsoo Kim and
               Sang Kil Cha and
               Sooel Son and
               Yongdae Kim},
  title     = {Revisiting Binary Code Similarity Analysis using Interpretable Feature
               Engineering and Lessons Learned},
  journal   = {CoRR},
  volume    = {abs/2011.10749},
  year      = {2020},
  url       = {https://arxiv.org/abs/2011.10749},
  eprinttype = {arXiv},
  eprint    = {2011.10749},
  timestamp = {Wed, 25 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/corr/abs-2011-10749.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aclnut/SeonwooPKO19,
  author    = {Yeon Seonwoo and
               Sungjoon Park and
               Dongkwan Kim and
               Alice Oh},
  editor    = {Wei Xu and
               Alan Ritter and
               Tim Baldwin and
               Afshin Rahimi},
  title     = {Additive Compositionality of Word Vectors},
  booktitle = {Proceedings of the 5th Workshop on Noisy User-generated Text, W-NUT@EMNLP
               2019, Hong Kong, China, November 4, 2019},
  pages     = {387--396},
  publisher = {Association for Computational Linguistics},
  year      = {2019},
  url       = {https://doi.org/10.18653/v1/D19-5551},
  doi       = {10.18653/v1/D19-5551},
  timestamp = {Thu, 05 Aug 2021 17:36:17 +0200},
  biburl    = {https://dblp.org/rec/conf/aclnut/SeonwooPKO19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/LeeKKSK19,
  author    = {Sangsup Lee and
               Daejun Kim and
               Dongkwan Kim and
               Sooel Son and
               Yongdae Kim},
  editor    = {Alex Gantman and
               Cl{\'{e}}mentine Maurice},
  title     = {Who Spent My EOS? On the (In)Security of Resource Management of {EOS.IO}},
  booktitle = {13th {USENIX} Workshop on Offensive Technologies, {WOOT} 2019, Santa
               Clara, CA, USA, August 12-13, 2019},
  publisher = {{USENIX} Association},
  year      = {2019},
  url       = {https://www.usenix.org/conference/woot19/presentation/lee},
  timestamp = {Mon, 01 Feb 2021 08:41:53 +0100},
  biburl    = {https://dblp.org/rec/conf/woot/LeeKKSK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsdm/KimKO19,
  author    = {Jooyeon Kim and
               Dongkwan Kim and
               Alice H. Oh},
  editor    = {J. Shane Culpepper and
               Alistair Moffat and
               Paul N. Bennett and
               Kristina Lerman},
  title     = {Homogeneity-Based Transmissive Process to Model True and False News
               in Social Networks},
  booktitle = {Proceedings of the Twelfth {ACM} International Conference on Web Search
               and Data Mining, {WSDM} 2019, Melbourne, VIC, Australia, February
               11-15, 2019},
  pages     = {348--356},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3289600.3291009},
  doi       = {10.1145/3289600.3291009},
  timestamp = {Sat, 30 May 2020 20:02:29 +0200},
  biburl    = {https://dblp.org/rec/conf/wsdm/KimKO19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/HongPKKHCSLK18,
  author    = {Byeongdo Hong and
               Shinjo Park and
               Hongil Kim and
               Dongkwan Kim and
               Hyunwook Hong and
               Hyunwoo Choi and
               Jean{-}Pierre Seifert and
               Sung{-}Ju Lee and
               Yongdae Kim},
  title     = {Peeking Over the Cellular Walled Gardens - {A} Method for Closed Network
               Diagnosis -},
  journal   = {{IEEE} Trans. Mob. Comput.},
  volume    = {17},
  number    = {10},
  pages     = {2366--2380},
  year      = {2018},
  url       = {https://doi.org/10.1109/TMC.2018.2804913},
  doi       = {10.1109/TMC.2018.2804913},
  timestamp = {Fri, 07 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tmc/HongPKKHCSLK18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-09702,
  author    = {Jooyeon Kim and
               Dongkwan Kim and
               Alice Oh},
  title     = {Homogeneity-Based Transmissive Process to Model True and False News
               in Social Networks},
  journal   = {CoRR},
  volume    = {abs/1811.09702},
  year      = {2018},
  url       = {http://arxiv.org/abs/1811.09702},
  eprinttype = {arXiv},
  eprint    = {1811.09702},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1811-09702.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/HongCKKHNK17,
  author    = {Hyunwook Hong and
               Hyunwoo Choi and
               Dongkwan Kim and
               Hongil Kim and
               Byeongdo Hong and
               Jiseong Noh and
               Yongdae Kim},
  title     = {When Cellular Networks Met IPv6: Security Problems of Middleboxes
               in IPv6 Cellular Networks},
  booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2017, Paris, France, April 26-28, 2017},
  pages     = {595--609},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {https://doi.org/10.1109/EuroSP.2017.34},
  doi       = {10.1109/EuroSP.2017.34},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/eurosp/HongCKKHNK17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HongKHKCLK16,
  author    = {Hyunwook Hong and
               Hongil Kim and
               Byeongdo Hong and
               Dongkwan Kim and
               Hyunwoo Choi and
               Eunkyu Lee and
               Yongdae Kim},
  editor    = {Dooho Choi and
               Sylvain Guilley},
  title     = {Pay as You Want: Bypassing Charging System in Operational Cellular
               Networks},
  booktitle = {Information Security Applications - 17th International Workshop, {WISA}
               2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10144},
  pages     = {148--160},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-56549-1\_13},
  doi       = {10.1007/978-3-319-56549-1\_13},
  timestamp = {Tue, 14 May 2019 10:00:35 +0200},
  biburl    = {https://dblp.org/rec/conf/wisa/HongKHKCLK16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KimKKHJHKK15,
  author    = {Hongil Kim and
               Dongkwan Kim and
               Minhee Kwon and
               HyungSeok Han and
               Yeongjin Jang and
               Dongsu Han and
               Taesoo Kim and
               Yongdae Kim},
  editor    = {Indrajit Ray and
               Ninghui Li and
               Christopher Kruegel},
  title     = {Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations},
  booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages     = {328--339},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2810103.2813718},
  doi       = {10.1145/2810103.2813718},
  timestamp = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/KimKKHJHKK15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SonSKPNCCK15,
  author    = {Yunmok Son and
               Hocheol Shin and
               Dongkwan Kim and
               Young{-}Seok Park and
               Juhwan Noh and
               Kibum Choi and
               Jungwoo Choi and
               Yongdae Kim},
  editor    = {Jaeyeon Jung and
               Thorsten Holz},
  title     = {Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors},
  booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
               D.C., USA, August 12-14, 2015},
  pages     = {881--896},
  publisher = {{USENIX} Association},
  year      = {2015},
  url       = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/son},
  timestamp = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl    = {https://dblp.org/rec/conf/uss/SonSKPNCCK15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimPCK15,
  author    = {Dongkwan Kim and
               Suwan Park and
               Kibum Choi and
               Yongdae Kim},
  editor    = {Howon Kim and
               Dooho Choi},
  title     = {BurnFit: Analyzing and Exploiting Wearable Devices},
  booktitle = {Information Security Applications - 16th International Workshop, {WISA}
               2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9503},
  pages     = {227--239},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-31875-2\_19},
  doi       = {10.1007/978-3-319-31875-2\_19},
  timestamp = {Tue, 14 May 2019 10:00:35 +0200},
  biburl    = {https://dblp.org/rec/conf/wisa/KimPCK15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkPYKK14,
  author    = {Shinjo Park and
               Suwan Park and
               Insu Yun and
               Dongkwan Kim and
               Yongdae Kim},
  editor    = {Kyung Hyune Rhee and
               Jeong Hyun Yi},
  title     = {Analyzing Security of Korean USIM-Based {PKI} Certificate Service},
  booktitle = {Information Security Applications - 15th International Workshop, {WISA}
               2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8909},
  pages     = {95--106},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-15087-1\_8},
  doi       = {10.1007/978-3-319-15087-1\_8},
  timestamp = {Tue, 14 May 2019 10:00:35 +0200},
  biburl    = {https://dblp.org/rec/conf/wisa/ParkPYKK14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icer/EdwardsSPAKT09,
  author    = {Stephen H. Edwards and
               Jason Snyder and
               Manuel A. P{\'{e}}rez{-}Qui{\~{n}}ones and
               Anthony Allevato and
               Dongkwan Kim and
               Betsy Tretola},
  editor    = {Michael J. Clancy and
               Michael E. Caspersen and
               Raymond Lister},
  title     = {Comparing effective and ineffective behaviors of student programmers},
  booktitle = {Proceedings of the Fifth International Workshop on Computing Education
               Research, {ICER} 2009, Berkeley, CA, USA, August 10-11, 2009},
  pages     = {3--14},
  publisher = {{ACM}},
  year      = {2009},
  url       = {https://doi.org/10.1145/1584322.1584325},
  doi       = {10.1145/1584322.1584325},
  timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icer/EdwardsSPAKT09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics