default search action
Donghyun Kim 0001
Person information
- affiliation: Georgia State University, Atlanta, GA, USA
- affiliation: Kennesaw State University, Marietta, Department of Computer Science
- affiliation: North Carolina Central University, Durham, Department of Mathematics and Physics
- affiliation: University of Texas at Dallas, Richardson
- affiliation: Hanyang University, Department of Computer Science and Engineering
Other persons with the same name
- Donghyun Kim (aka: DongHyun Kim, Dong-Hyun Kim, Dong Hyun Kim) — disambiguation page
- Donghyun Kim 0002 — Massachusetts Institute of Technology, Cambridge, MA, USA (and 1 more)
- Donghyun Kim 0003 — Hanwha Systems Co., Ltd., Yongin Research and Development Center, South Korea
- Donghyun Kim 0004 — Korea Advanced Institute of Science and Technology (KAIST), Electrical Engineering Department, Daejeon, South Korea
- Donghyun Kim 0005 (aka: Dong Hyun Kim 0005) — Sungkyunkwan University, Department of Smart Factory Convergence, Suwon, Republic of Korea
- Donghyun Kim 0006 — MIT-IBM Watson AI Lab (and 1 more)
- Donghyun Kim 0007 — NAVER Corporation, Seongnam, South Korea (and 2 more)
- Donghyun Kim 0008 (aka: Dong-Hyun Kim 0008) — Yonsei University, Department of Electrical and Electronic Engineering, College of Engineering, Seoul, Korea (and 1 more)
- Donghyun Kim 0009 — Hanyang University, Department of Electrical Engineering, Ansan, Korea
- Donghyun Kim 0010 (aka: Dong Hyun Kim 0010) — Yonsei University, Department of Electrical and Electronic Engineering, Seoul, Korea
- Donghyun Kim 0012 (aka: Dong Hyun Kim 0012) — NAVER Corp, Seongnam, South Korea
- Donghyun Kim 0013 — Yonsei University, School of Electrical and Electronic Engineering, Seoul, Korea (and 2 more)
- Donghyun Kim 0014 — Qualcomm, Inc., San Diego, CA, USA (and 1 more)
- Donghyun Kim 0016 — University of Illinois Urbana-Champaign, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j57]Hunmin Lee, Mingon Kang, Donghyun Kim, Daehee Seo, Yingshu Li:
Epidemic Vulnerability Index for Effective Vaccine Distribution Against Pandemic. IEEE ACM Trans. Comput. Biol. Bioinform. 20(6): 3332-3342 (2023) - [c53]Donghyun Kim, Seungho Jeon, Jiho Shin, Jung-Taek Seo:
OCR Meets the Dark Web: Identifying the Content Type Regarding Illegal and Cybercrime. WISA 2023: 201-212 - 2021
- [j56]Jhilakshi Sharma, Donghyun Kim, Ahyoung Lee, Daehee Seo:
On Differential Privacy-Based Framework for Enhancing User Data Privacy in Mobile Edge Computing Environment. IEEE Access 9: 38107-38118 (2021) - [j55]Gyeong-Jin Ra, Donghyun Kim, Daehee Seo, Im-Yeong Lee:
A Federated Framework for Fine-Grained Cloud Access Control for Intelligent Big Data Analytic by Service Providers. IEEE Access 9: 47084-47095 (2021) - [j54]Moonsu Jang, Donghyun Kim, Daehee Seo, Yongmin Ju, Seungho Ryu, Hyunsoo Yoon:
An intelligent recommendation algorithm for red team strategy in edge computing powered massive Cyber Defense Exercise. Comput. Commun. 165: 141-148 (2021) - [j53]Majun Shi, Zishen Yang, Donghyun Kim, Wei Wang:
Non-monotone submodular function maximization under k-system constraint. J. Comb. Optim. 41(1): 128-142 (2021) - [j52]Zishen Yang, Wei Wang, Donghyun Kim:
On multi-path routing for reliable communications in failure interdependent complex networks. J. Comb. Optim. 41(1): 170-196 (2021) - [j51]Won-Bin Kim, Daehee Seo, Donghyun Kim, Im-Yeong Lee:
Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication. Secur. Commun. Networks 2021: 5599996:1-5599996:14 (2021) - [j50]Won-Bin Kim, Daehee Seo, Donghyun Kim, Im-Yeong Lee:
Group Delegated ID-Based Proxy Reencryption for the Enterprise IoT-Cloud Storage Environment. Wirel. Commun. Mob. Comput. 2021: 7641389:1-7641389:12 (2021) - [j49]Peng Wang, Zhipeng Cai, Donghyun Kim, Wei Li:
Detection Mechanisms of One-Pixel Attack. Wirel. Commun. Mob. Comput. 2021: 8891204:1-8891204:8 (2021) - [j48]Si-Wan Noh, Donghyun Kim, Zhipeng Cai, Kyung-Hyune Rhee:
A Novel User Collusion-Resistant Decentralized Multi-Authority Attribute-Based Encryption Scheme Using the Deposit on a Blockchain. Wirel. Commun. Mob. Comput. 2021: 9506796:1-9506796:15 (2021) - [c52]Jhilakshi Sharma, Donghyun Kim, Ahyoung Lee, Daehee Seo:
Differential Privacy using Fuzzy Convolution Neural Network (DP-FCNN) with Laplace Mechanism and Authenticated Access in Edge Computing. IMCOM 2021: 1-5 - [c51]Hunmin Lee, Mingon Kang, Yingshu Li, Daehee Seo, Donghyun Kim:
Epidemic Vulnerability Index for Effective Vaccine Distribution Against Pandemic. ISBRA 2021: 22-34 - [i2]Hunmin Lee, Yueyang Liu, Donghyun Kim, Yingshu Li:
Robust Convergence in Federated Learning through Label-wise Clustering. CoRR abs/2112.14244 (2021) - 2020
- [j47]Donghyun Kim, My T. Thai, R. N. Uma:
Guest Editorial Introduction to the Special Section on Scalability and Privacy in Social Networks. IEEE Trans. Netw. Sci. Eng. 7(2): 843-844 (2020) - [j46]Junggab Son, Donghyun Kim, Md. Zakirul Alam Bhuiyan, Rahman Mitchel Tashakkori, Jungtaek Seo, Dong Hoon Lee:
Privacy Enhanced Location Sharing for Mobile Online Social Networks. IEEE Trans. Sustain. Comput. 5(2): 279-290 (2020) - [c50]Mingyu Lee, Hanbyeol Kang, Junbeom Kwak, Donghyun Kim, Hyeonho Jeong, Jung-Taek Seo:
Proposed On-site Document Sharing System using FIDO. ICEA 2020: 43:1-43:6 - [e4]Donghyun Kim, R. N. Uma, Zhipeng Cai, Dong Hoon Lee:
Computing and Combinatorics - 26th International Conference, COCOON 2020, Atlanta, GA, USA, August 29-31, 2020, Proceedings. Lecture Notes in Computer Science 12273, Springer 2020, ISBN 978-3-030-58149-7 [contents]
2010 – 2019
- 2019
- [c49]Junggab Son, Euiseong Ko, Uday Bhaskar Boyanapalli, Donghyun Kim, Youngsoon Kim, Mingon Kang:
Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis*. ICNC 2019: 159-163 - [e3]Dan Lo, Donghyun Kim, Eric Gamess:
Proceedings of the 2019 ACM Southeast Conference, ACM SE '19, Kennesaw, GA, USA, April 18-20, 2019. ACM 2019, ISBN 978-1-4503-6251-1 [contents] - 2018
- [j45]Zaixin Lu, Donghyun Kim:
Guest Editorial: Special Issue on Combinatorial Optimization and Applications. Algorithmica 80(6): 1769-1770 (2018) - [j44]Rasheed Hussain, Donghyun Kim, Junggab Son, Jooyoung Lee, Chaker Abdelaziz Kerrache, Abderrahim Benslimane, Heekuck Oh:
Secure and Privacy-Aware Incentives-Based Witness Service in Social Internet of Vehicles Clouds. IEEE Internet Things J. 5(4): 2441-2448 (2018) - [j43]Bei Liu, Wei Wang, Donghyun Kim, Yingshu Li, Sung-Sik Kwon, Yaolin Jiang:
On Practical Construction of Quality Fault-Tolerant Virtual Backbone in Homogeneous Wireless Networks. IEEE/ACM Trans. Netw. 26(1): 412-421 (2018) - [c48]Donghyun Kim, Euiseong Ko, Junggab Son, Yeojin Kim, Jungtaek Seo:
A Lightweight and Transparent Compensation Mechanism for Fog-Cloud Storage Framework. BigDataService 2018: 254-259 - [c47]Yeojin Kim, Donghyun Kim, Junggab Son, Wei Wang, Youngtae Noh:
A New Fog-Cloud Storage Framework with Transparency and Auditability. ICC 2018: 1-7 - [c46]Joong-Lyul Lee, Jaejin Hwang, Hyesung Park, Donghyun Kim:
On latency-aware tree topology construction for emergency responding VANET applications. INFOCOM Workshops 2018: 57-63 - [e2]Donghyun Kim, R. N. Uma, Alexander Zelikovsky:
Combinatorial Optimization and Applications - 12th International Conference, COCOA 2018, Atlanta, GA, USA, December 15-17, 2018, Proceedings. Lecture Notes in Computer Science 11346, Springer 2018, ISBN 978-3-030-04650-7 [contents] - 2017
- [j42]Donghyun Kim, Yeojin Kim, Deying Li, Jungtaek Seo:
A new maximum fault-tolerance barrier-coverage problem in hybrid sensor network and its polynomial time exact algorithm. Ad Hoc Networks 63: 14-19 (2017) - [j41]Junggab Son, Donghyun Kim, Md. Zakirul Alam Bhuiyan, Rasheed Hussain, Heekuck Oh:
A new outsourcing conditional proxy re-encryption suitable for mobile cloud environment. Concurr. Comput. Pract. Exp. 29(14) (2017) - [j40]Neda Zarayeneh, Euiseong Ko, Jung Hun Oh, Sang C. Suh, Chunyu Liu, Jean Gao, Donghyun Kim, Mingon Kang:
Integration of multi-omics data for integrative gene regulatory network inference. Int. J. Data Min. Bioinform. 18(3): 223-239 (2017) - [j39]Yi Hong, Deying Li, Donghyun Kim, Wenping Chen, Jiguo Yu, Alade O. Tokuta:
Maximizing target-temporal coverage of mission-driven camera sensor networks. J. Comb. Optim. 34(1): 279-301 (2017) - [j38]Donghyun Kim, Wei Wang, Junggab Son, Weili Wu, Wonjun Lee, Alade O. Tokuta:
Maximum Lifetime Combined Barrier-Coverage of Weak Static Sensors and Strong Mobile Sensors. IEEE Trans. Mob. Comput. 16(7): 1956-1966 (2017) - [j37]Donghyun Kim, Lirong Xue, Deying Li, Yuqing Zhu, Wei Wang, Alade O. Tokuta:
On Theoretical Trajectory Planning of Multiple Drones To Minimize Latency in Search-and-Reconnaissance Operations. IEEE Trans. Mob. Comput. 16(11): 3156-3166 (2017) - [j36]Wei Wang, Bei Liu, Donghyun Kim, Deying Li, Jingyi Wang, Wei Gao:
A New Constant Factor Approximation to Construct Highly Fault-Tolerant Connected Dominating Set in Unit Disk Graph. IEEE/ACM Trans. Netw. 25(1): 18-28 (2017) - [j35]Donghyun Kim, Yesenia Velasco, Wei Wang, R. N. Uma, Rasheed Hussain, Sejin Lee:
A New Comprehensive RSU Installation Strategy for Cost-Efficient VANET Deployment. IEEE Trans. Veh. Technol. 66(5): 4200-4211 (2017) - [j34]Rasheed Hussain, Junggab Son, Donghyun Kim, Michele Nogueira, Heekuck Oh, Alade O. Tokuta, Jungtaek Seo:
PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability. Wirel. Commun. Mob. Comput. 2017 (2017) - [c45]Euiseong Ko, Mingon Kang, Hyung Jae Chang, Donghyun Kim:
Graph-Theory Based Simplification Techniques for Efficient Biological Network Analysis. BigDataService 2017: 277-280 - [c44]Zishen Yang, Donghyun Kim, Wei Wang:
On Interdependent Failure Resilient Multi-path Routing in Smart Grid Communication Network. COCOA (2) 2017: 76-93 - 2016
- [j33]Donghyun Kim, Hyunbum Kim, Deying Li, Sung-Sik Kwon, Alade O. Tokuta, Jorge Arturo Cobb:
Maximum lifetime dependable barrier-coverage in wireless sensor networks. Ad Hoc Networks 36: 296-307 (2016) - [j32]Ling Guo, Deying Li, Yuqing Zhu, Donghyun Kim, Yi Hong, Wenping Chen:
Enhancing barrier coverage with β quality of monitoring in wireless camera sensor networks. Ad Hoc Networks 51: 62-79 (2016) - [j31]Cláudio Silva, Michele Nogueira, Donghyun Kim, Eduardo Cerqueira, Aldri Santos:
Cognitive radio based connectivity management for resilient end-to-end communications in VANETs. Comput. Commun. 79: 1-8 (2016) - [j30]Donghyun Kim, Hao Guo, Wei Wang, Joonglyul Lee, Sung-Sik Kwon, Alade O. Tokuta:
On efficient vaccine distribution strategy to suppress pandemic using social relation. Discret. Math. Algorithms Appl. 8(1): 1650010:1-1650010:13 (2016) - [j29]Wei Wang, Donghyun Kim, Matthew Tetteh, Jun Liang, Wonjun Lee:
On cost-aware biased respondent group selection for minority opinion survey. Discret. Math. Algorithms Appl. 8(4): 1650061:1-1650061:12 (2016) - [j28]Donghyun Kim, Jiaofei Zhong, Minhyuk Lee, Deying Li, Yingshu Li, Alade O. Tokuta:
Efficient respondents selection for biased survey using homophily-high social relation graph. Discret. Math. Algorithms Appl. 8(4): 1650071:1-1650071:11 (2016) - [j27]Xiuzhen Cheng, Yunchuan Sun, Zhipeng Cai, Jiguo Yu, Donghyun Kim, Jin Liu:
Editorial for special issue on Big Data and knowledge extraction for Cyber-Physical Systems 2016. Int. J. Distributed Sens. Networks 12(10) (2016) - [j26]Biaofei Xu, Yuqing Zhu, Deying Li, Donghyun Kim, Weili Wu:
Minimum (k, ω)-angle barrier coverage in wireless camera sensor networks. Int. J. Sens. Networks 21(3): 179-188 (2016) - [j25]Hyun-Sik Kim, Inki Kim, Kyungsik Han, Donghyun Kim, Jong-Soo Seo, Mingoo Kang:
An Adaptive Buffering Method for Practical HTTP Live Streaming on Smart OTT STBs. KSII Trans. Internet Inf. Syst. 10(3): 1416-1428 (2016) - [j24]Donghyun Kim, Wei Wang, Deying Li, Joonglyul Lee, Weili Wu, Alade O. Tokuta:
A joint optimization of data ferry trajectories and communication powers of ground sensors for long-term environmental monitoring. J. Comb. Optim. 31(4): 1550-1568 (2016) - [j23]Bei Liu, Wei Wang, Donghyun Kim, Deying Li, Jingyi Wang, Alade O. Tokuta, Yaolin Jiang:
On Approximating Minimum 3-Connected m-Dominating Set Problem in Unit Disk Graph. IEEE/ACM Trans. Netw. 24(5): 2690-2701 (2016) - [j22]Biaofei Xu, Yuqing Zhu, Donghyun Kim, Deying Li, Huaipan Jiang, Alade O. Tokuta:
Strengthening barrier-coverage of static sensor network with mobile sensor nodes. Wirel. Networks 22(1): 1-10 (2016) - [j21]Xianliang Liu, Wei Wang, Donghyun Kim, Zishen Yang, Alade O. Tokuta, Yaolin Jiang:
The first constant factor approximation for minimum partial connected dominating set problem in growth-bounded graphs. Wirel. Networks 22(2): 553-562 (2016) - [c43]Junggab Son, Donghyun Kim, HyungGeun Oh, Dongsoo Ha, Wonjun Lee:
Toward VANET Utopia: A New Privacy Preserving Trustworthiness Management Scheme for VANET. BDCloud-SocialCom-SustainCom 2016: 301-308 - [c42]Neda Zarayeneh, Jung Hun Oh, Donghyun Kim, Chunyu Liu, Jean Gao, Sang C. Suh, Mingon Kang:
Integrative Gene Regulatory Network inference using multi-omics data. BIBM 2016: 1336-1340 - [c41]Bei Liu, Wei Wang, Donghyun Kim, Yingshu Li, Sung-Sik Kwon:
A Simpler Constant Factor Approximation for the k-Connected m-Domination Set Problem in Unit Disk Graph. ICCCN 2016: 1-8 - [c40]Junggab Son, Donghyun Kim, Rahman Mitchel Tashakkori, Alade O. Tokuta, Heekuck Oh:
A New Mobile Online Social Network Based Location Sharing with Enhanced Privacy Protection. ICCCN 2016: 1-9 - [c39]Donghyun Kim, Yesenia Velasco, Zishen Yang, Wei Wang, Rasheed Hussain, R. N. Uma:
Cost effective mobile and static road side unit deployment for vehicular adhoc networks. ICNC 2016: 1-5 - [r1]Donghyun Kim, Wei Wang, Weili Wu, Alade O. Tokuta:
Fault-Tolerant Connected Dominating Set. Encyclopedia of Algorithms 2016: 741-745 - 2015
- [j20]Yi Hong, Donovan Bradley, Donghyun Kim, Deying Li, Alade O. Tokuta, Zhiming Ding:
Construction of higher spectral efficiency virtual backbone in wireless networks. Ad Hoc Networks 25: 228-236 (2015) - [j19]Huan Ma, Yuqing Zhu, Deying Li, Donghyun Kim, Jun Liang:
Improving the influence under IC-N model in social networks. Discret. Math. Algorithms Appl. 7(3): 1550037:1-1550037:13 (2015) - [j18]Meng Yang, Donghyun Kim, Deying Li, Wenping Chen, Alade O. Tokuta:
Maximum lifetime suspect monitoring on the street with battery-powered camera sensors. Wirel. Networks 21(4): 1093-1107 (2015) - [c38]Donghyun Kim, Hao Guo, Yuchao Li, Wei Wang, Sung-Sik Kwon, Alade O. Tokuta:
Social Relation Based Long-Term Vaccine Distribution Planning to Suppress Pandemic. CSoNet 2015: 26-34 - [c37]Donghyun Kim, Wei Wang, Matthew Tetteh, Jun Liang, Soyoon Park, Wonjun Lee:
Biased Respondent Group Selection Under Limited Budget for Minority Opinion Survey. CSoNet 2015: 182-192 - [c36]Ling Guo, Yuqing Zhu, Deying Li, Donghyun Kim:
PTZ Camera Scheduling for Selected Area Coverage in Visual Sensor Networks. ICDCS 2015: 379-388 - [c35]Wei Wang, Bei Liu, Donghyun Kim, Deying Li, Jingyi Wang, Yaolin Jiang:
A better constant approximation for minimum 3-connected m-dominating set problem in unit disk graph using Tutte decomposition. INFOCOM 2015: 1796-1804 - [c34]Rasheed Hussain, Donghyun Kim, Alade O. Tokuta, Hayk M. Melikyan, Heekuck Oh:
Covert communication based privacy preservation in mobile vehicular networks. MILCOM 2015: 55-60 - [c33]Donghyun Kim, Junggab Son, Wei Wang, Deying Li, Alade O. Tokuta, Sunghyun Cho:
Bandwidth-aware breach-free barrier construction with VANET nodes for realtime fugitive search. MILCOM 2015: 1021-1026 - [c32]Junggab Son, Donghyun Kim, Rasheed Hussain, Alade Tokuta, Sung-Sik Kwon, Jung-Taek Seo:
Privacy aware incentive mechanism to collect mobile data while preventing duplication. MILCOM 2015: 1242-1247 - [c31]Rasheed Hussain, Donghyun Kim, Michele Nogueira, Junggab Son, Alade O. Tokuta, Heekuck Oh:
A New Privacy-Aware Mutual Authentication Mechanism for Charging-on-the-Move in Online Electric Vehicles. MSN 2015: 108-115 - [c30]Kanghyo Lee, Donghyun Kim, Dongsoo Ha, Ubaidullah Rajput, Heekuck Oh:
On security and privacy issues of fog computing supported Internet of Things environment. NOF 2015: 1-3 - [e1]Zaixin Lu, Donghyun Kim, Weili Wu, Wei Li, Ding-Zhu Du:
Combinatorial Optimization and Applications - 9th International Conference, COCOA 2015, Houston, TX, USA, December 18-20, 2015, Proceedings. Lecture Notes in Computer Science 9486, Springer 2015, ISBN 978-3-319-26625-1 [contents] - [i1]Rasheed Hussain, Donghyun Kim, Michele Nogueira, Junggab Son, Alade O. Tokuta, Heekuck Oh:
PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability. CoRR abs/1504.05276 (2015) - 2014
- [j17]Yi Hong, Donghyun Kim, Deying Li, Ling Guo, Junggab Son, Alade O. Tokuta:
Two new multi-path routing algorithms for fault-tolerant communications in smart grid. Ad Hoc Networks 22: 3-12 (2014) - [j16]Yi Hong, Junghyun Kim, Donghyun Kim, Deying Li, Alade O. Tokuta:
Desperate Coverage Problem in Mission-Driven Camera Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j15]Donghyun Kim, Deying Li, Omid Asgari, Yingshu Li, Alade O. Tokuta, Heekuck Oh:
Computing an effective decision making group of a society using social network analysis. J. Comb. Optim. 28(3): 577-587 (2014) - [j14]Jabre L. Thornton, Donghyun Kim, Sung-Sik Kwon, Deying Li, Alade O. Tokuta:
k-Fragility Maximization Problem to Attack Robust Terrorist Networks. J. Inform. and Commun. Convergence Engineering 12(1): 33-38 (2014) - [j13]Donghyun Kim, R. N. Uma, Baraki H. Abay, Weili Wu, Wei Wang, Alade O. Tokuta:
Minimum Latency Multiple Data MULETrajectory Planning in Wireless Sensor Networks. IEEE Trans. Mob. Comput. 13(4): 838-851 (2014) - [c29]Donghyun Kim, Jiaofei Zhong, Minhyuk Lee, Deying Li, Alade O. Tokuta:
Efficient Respondents Selection for Biased Survey Using Online Social Networks. COCOON 2014: 608-615 - [c28]Songsong Li, Yuqing Zhu, Deying Li, Donghyun Kim, Huan Ma, Hejiao Huang:
Influence maximization in social networks with user attitude modification. ICC 2014: 3913-3918 - [c27]Ling Guo, Donghyun Kim, Deying Li, Wenping Chen, Alade O. Tokuta:
Constructing belt-barrier providing β-quality of monitoring with minimum camera sensors. ICCCN 2014: 1-8 - [c26]Junggab Son, Hyunbum Kim, Donghyun Kim, Heekuck Oh:
On secure data sharing in cloud environment. ICUIMC 2014: 6:1-6:7 - [c25]Junggab Son, Donghyun Kim, Rasheed Hussain, Heekuck Oh:
Conditional proxy re-encryption for secure big data group sharing in cloud environment. INFOCOM Workshops 2014: 541-546 - [c24]Lirong Xue, Donghyun Kim, Yuqing Zhu, Deying Li, Wei Wang, Alade O. Tokuta:
Multiple heterogeneous data ferry trajectory planning in wireless sensor networks. INFOCOM 2014: 2274-2282 - [c23]Rasheed Hussain, Zeinab Rezaeifar, Donghyun Kim, Alade O. Tokuta, Heekuck Oh:
On Secure, Privacy-Aware, and Efficient Beacon Broadcasting among One-Hop Neighbors in VANETs. MILCOM 2014: 1427-1434 - [c22]Haiming Luo, Hongwei Du, Donghyun Kim, Qiang Ye, Rongrong Zhu, Jinglan Jia:
Imperfection Better Than Perfection: Beyond Optimal Lifetime Barrier Coverage in Wireless Sensor Networks. MSN 2014: 24-29 - [c21]Joonglyul Lee, Donghyun Kim, Lidan Fan, Hyung Jae Chang:
Barrier-Coverage for City Block Monitoring in Bandwidth Sensitive Vehicular Adhoc Networks. MSN 2014: 80-87 - [c20]Junggab Son, Donghyun Kim, Sejin Lee, Heekuck Oh, Alade O. Tokuta, Hayk M. Melikyan:
Trade-off between Service Granularity and User Privacy in Smart Meter Operation. MSN 2014: 288-293 - [c19]Biaofei Xu, Donghyun Kim, Deying Li, Joonglyul Lee, Huaipan Jiang, Alade O. Tokuta:
Fortifying Barrier-Coverage of Wireless Sensor Network with Mobile Sensor Nodes. WASA 2014: 368-377 - 2013
- [j12]Donghyun Kim, Wei Wang, Weili Wu, Deying Li, Changcun Ma, Nassim Sohaee, Wonjun Lee, Yuexuan Wang, Ding-Zhu Du:
On bounding node-to-sink latency in wireless sensor networks with multiple sinks. Int. J. Sens. Networks 13(1): 13-29 (2013) - [j11]Wei Wang, Donghyun Kim, Min Kyung An, Wei Gao, Xianyue Li, Zhao Zhang, Weili Wu:
On Construction of Quality Fault-Tolerant Virtual Backbone in Wireless Networks. IEEE/ACM Trans. Netw. 21(5): 1499-1510 (2013) - [c18]Rasheed Hussain, Fizza Abbas, Junggab Son, Donghyun Kim, Sangjin Kim, Heekuck Oh:
Vehicle Witnesses as a Service: Leveraging Vehicles as Witnesses on the Road in VANET Clouds. CloudCom (1) 2013: 439-444 - [c17]Donghyun Kim, Deying Li, Omid Asgari, Yingshu Li, Alade O. Tokuta:
A Dominating Set Based Approach to Identify Effective Leader Group of Social Network. COCOON 2013: 841-848 - [c16]Yi Hong, Donghyun Kim, Deying Li, Wenping Chen, Alade O. Tokuta, Zhiming Ding:
Target-Temporal Effective-Sensing Coverage in Mission-Driven Camera Sensor Networks. ICCCN 2013: 1-9 - [c15]Songsong Li, Yuqing Zhu, Deying Li, Donghyun Kim, Hejiao Huang:
Rumor restriction in Online Social Networks. IPCCC 2013: 1-10 - [c14]Donghyun Kim, Glenn R. Frye, Sung-Sik Kwon, Hyung Jae Chang, Alade O. Tokuta:
On Combinatoric Approach to Circumvent Internet Censorship Using Decoy Routers. MILCOM 2013: 593-598 - [c13]Meng Yang, Donghyun Kim, Deying Li, Wenping Chen, Hongwei Du, Alade O. Tokuta:
Sweep-Coverage with Energy-Restricted Mobile Wireless Sensor Nodes. WASA 2013: 486-497 - [c12]Yi Hong, Donghyun Kim, Deying Li, Biaofei Xu, Wenping Chen, Alade O. Tokuta:
Maximum lifetime effective-sensing partial target-coverage in camera sensor networks. WiOpt 2013: 619-626 - 2012
- [j10]Hongjie Du, Weili Wu, Shan Shan, Donghyun Kim, Wonjun Lee:
Constructing weakly connected dominating set for secure clustering in distributed sensor network. J. Comb. Optim. 23(2): 301-307 (2012) - [c11]Donghyun Kim, Jiwoong Kim, Deying Li, Sung-Sik Kwon, Alade O. Tokuta:
On sleep-wakeup scheduling of non-penetrable barrier-coverage of wireless sensors. GLOBECOM 2012: 321-327 - [c10]Jun Duan, Donghyun Kim, Wenping Chen, Deying Li:
A New Localized Geometric Routing with Guaranteed Delivery on 3-D Wireless Networks. ICCCN 2012: 1-7 - [c9]Xiaofeng Gao, Yi Zhu, Donghyun Kim, Jianzhong Li, Weili Wu:
A Novel Multi-Channel Data Broadcast Scheme for Multimedia Database Systems. ICPADS 2012: 132-139 - [c8]Donghyun Kim, Baraki H. Abay, R. N. Uma, Weili Wu, Wei Wang, Alade O. Tokuta:
Minimizing data collection latency in wireless sensor network with multiple mobile elements. INFOCOM 2012: 504-512 - [c7]Deying Li, Donghyun Kim, Qinghua Zhu, Lin Liu, Weili Wu:
Minimum Total Communication Power Connected Dominating Set in Wireless Networks. WASA 2012: 132-141 - 2011
- [j9]Donghyun Kim, Wei Wang, Nassim Sohaee, Changcun Ma, Weili Wu, Wonjun Lee, Ding-Zhu Du:
Minimum Data-Latency-Bound $k$-Sink Placement Problem in Wireless Sensor Networks. IEEE/ACM Trans. Netw. 19(5): 1344-1353 (2011) - 2010
- [j8]Xianyue Li, Feng Zou, Yaochun Huang, Donghyun Kim, Weili Wu:
A Better Constant-Factor Approximation for Selected-Internal Steiner Minimum Tree. Algorithmica 56(3): 333-341 (2010) - [j7]Changcun Ma, Donghyun Kim, Yuexuan Wang, Wei Wang, Nassim Sohaee, Weili Wu:
Hardness of k-Vertex-Connected Subgraph Augmentation Problem. J. Comb. Optim. 20(3): 249-258 (2010) - [j6]Xu Zhu, Jieun Yu, Wonjun Lee, Donghyun Kim, Shan Shan, Ding-Zhu Du:
New dominating sets in social networks. J. Glob. Optim. 48(4): 633-642 (2010) - [j5]Donghyun Kim, Wei Wang, Ling Ding, Jihwan Lim, Heekuck Oh, Weili Wu:
Minimum average routing path clustering problem in multi-hop 2-D underwater sensor networks. Optim. Lett. 4(3): 383-392 (2010) - [j4]Donghyun Kim, Zhao Zhang, Xianyue Li, Wei Wang, Weili Wu, Ding-Zhu Du:
A Better Approximation Algorithm for Computing Connected Dominating Sets in Unit Ball Graphs. IEEE Trans. Mob. Comput. 9(8): 1108-1118 (2010) - [c6]Donghyun Kim, Wei Wang, Xianyue Li, Zhao Zhang, Weili Wu:
A New Constant Factor Approximation for Computing 3-Connected m-Dominating Sets in Homogeneous Wireless Networks. INFOCOM 2010: 2739-2747
2000 – 2009
- 2009
- [j3]Wei Wang, Donghyun Kim, James Willson, Bhavani Thuraisingham, Weili Wu:
A Better Approximation for Minimum Average Routing Path Clustering Problem in 2-d Underwater Sensor Networks. Discret. Math. Algorithms Appl. 1(2): 175-192 (2009) - [j2]Wei Wang, Donghyun Kim, Nassim Sohaee, Changcun Ma, Weili Wu:
A PTAS for Minimum d-Hop Underwater Sink Placement Problem in 2-d Underwater Sensor Networks. Discret. Math. Algorithms Appl. 1(2): 283-290 (2009) - [j1]Donghyun Kim, Yiwei Wu, Yingshu Li, Feng Zou, Ding-Zhu Du:
Constructing Minimum Connected Dominating Sets with Bounded Diameters in Wireless Networks. IEEE Trans. Parallel Distributed Syst. 20(2): 147-157 (2009) - 2008
- [c5]Feng Zou, Xianyue Li, Donghyun Kim, Weili Wu:
Two Constant Approximation Algorithms for Node-Weighted Steiner Tree in Unit Disk Graphs. COCOA 2008: 278-285 - [c4]Xianyue Li, Yaochun Huang, Feng Zou, Donghyun Kim, Weili Wu:
(1+rho)-Approximation for Selected-Internal Steiner Minimum Tree. COCOON 2008: 568-576 - [c3]Feng Zou, Xianyue Li, Donghyun Kim, Weili Wu:
Construction of Minimum Connected Dominating Set in 3-Dimensional Wireless Network. WASA 2008: 134-140 - [c2]Donghyun Kim, Xianyue Li, Feng Zou, Zhao Zhang, Weili Wu:
Recyclable Connected Dominating Set for Large Scale Dynamic Wireless Networks. WASA 2008: 560-569 - 2005
- [c1]Hoonjung Lee, Donghyun Kim, Sangjin Kim, Heekuck Oh:
Identity-Based Key Agreement Protocols in a Multiple PKG Environment. ICCSA (4) 2005: 877-886
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint