| A survey about consensus algorithms used in blockchain. GT Nguyen, K Kim Journal of Information processing systems 14 (1), 2018 | 814 | 2018 |
| Socialfilter: Introducing social trust to collaborative spam mitigation M Sirivianos, K Kim, X Yang 2011 Proceedings IEEE INFOCOM, 2300-2308, 2011 | 105 | 2011 |
| Design and implementation of intrusion detection system using convolutional neural network for DoS detection SN Nguyen, VQ Nguyen, J Choi, K Kim Proceedings of the 2nd international conference on machine learning and soft …, 2018 | 86 | 2018 |
| Dynatops: A dynamic topic-based publish/subscribe architecture Y Zhao, K Kim, N Venkatasubramanian Proceedings of the 7th ACM international conference on Distributed event …, 2013 | 56 | 2013 |
| Design of a platform for collecting and analyzing agricultural big data VQ Nguyen, SN Nguyen, K Kim 디지털콘텐츠학회논문지 18 (1), 149-158, 2017 | 41 | 2017 |
| Assessing the impact of resource attack in software defined network HTN Tri, K Kim 2015 International Conference on Information Networking (ICOIN), 420-425, 2015 | 38 | 2015 |
| FaceTrust: Assessing the credibility of online personas via social networks M Sirivianos, K Kim, X Yang Proceedings of the 4th USENIX Conference on Hot Topics in Security, 1-6, 2009 | 37 | 2009 |
| Real-time earthquake detection using convolutional neural network and social data N Van Quan, HJ Yang, K Kim, AR Oh 2017 IEEE third international conference on multimedia Big Data (BigMM), 154-157, 2017 | 31 | 2017 |
| Assessing the impact of geographically correlated failures on overlay-based data dissemination K Kim, N Venkatasubramanian 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010 | 31 | 2010 |
| LSTM-based collaborative source-side DDoS attack detection S Yeom, C Choi, K Kim IEEE Access 10, 44033-44045, 2022 | 30 | 2022 |
| DFS: A de-fragmented file system WH Ahn, K Kim, Y Choi, D Park Proceedings. 10th IEEE International Symposium on Modeling, Analysis and …, 2002 | 30 | 2002 |
| Empirical study on SAT-encodings of the at-most-one constraint VH Nguyen, VQ Nguyen, K Kim, P Barahona The 9th International Conference on Smart Media and Applications, 470-475, 2020 | 25 | 2020 |
| A review of reinforcement learning for fixed-wing aircraft control tasks DJ Richter, RA Calix, K Kim IEEE Access, 2024 | 24 | 2024 |
| A smart evacuation guidance system for large buildings VQ Nguyen, HT Vu, VH Nguyen, K Kim Electronics 11 (18), 2938, 2022 | 21 | 2022 |
| Gsford: Towards a reliable geo-social notification system K Kim, Y Zhao, N Venkatasubramanian 2012 IEEE 31st Symposium on Reliable Distributed Systems, 267-272, 2012 | 21 | 2012 |
| Assessing the impact of dos attacks on iot gateway Y Lee, W Lee, G Shin, K Kim International Conference on Multimedia and Ubiquitous Engineering, 252-257, 2017 | 20 | 2017 |
| Reducing replication overhead for data durability in DHT based P2P system K Kim, D Park IEICE transactions on information and systems 90 (9), 1452-1455, 2007 | 20 | 2007 |
| Subway: Peer-to-Peer Clustering Of Clients for Web Proxy. K Kim, D Park PDPTA, 1683-1688, 2003 | 20 | 2003 |
| Farecast: Fast, reliable application layer multicast for flash dissemination K Kim, S Mehrotra, N Venkatasubramanian ACM/IFIP/USENIX International Conference on Distributed Systems Platforms …, 2010 | 19 | 2010 |
| Efficient and scalable client clustering for web proxy cache KB Kim, D PARK IEICE TRANSACTIONS on Information and Systems 86 (9), 1577-1585, 2003 | 19 | 2003 |