Constructing minimum connected dominating sets with bounded diameters in wireless networks D Kim, Y Wu, Y Li, F Zou, DZ Du
IEEE Transactions on Parallel and Distributed Systems 20 (2), 147-157, 2008
226 2008 On security and privacy issues of fog computing supported Internet of Things environment K Lee, D Kim, D Ha, U Rajput, H Oh
2015 6th International Conference on the Network of the Future (NOF), 1-3, 2015
216 2015 A new comprehensive RSU installation strategy for cost-efficient VANET deployment D Kim, Y Velasco, W Wang, RN Uma, R Hussain, S Lee
IEEE Transactions on Vehicular Technology 66 (5), 4200-4211, 2016
167 2016 Minimum latency multiple data mule trajectory planning in wireless sensor networks D Kim, RN Uma, BH Abay, W Wu, W Wang, AO Tokuta
IEEE Transactions on Mobile Computing 13 (4), 838-851, 2013
78 2013 A better approximation algorithm for computing connected dominating sets in unit ball graphs D Kim, Z Zhang, X Li, W Wang, W Wu, DZ Du
IEEE Transactions on Mobile Computing 9 (8), 1108-1118, 2010
70 2010 Minimizing data collection latency in wireless sensor network with multiple mobile elements D Kim, BH Abay, RN Uma, W Wu, W Wang, AO Tokuta
2012 Proceedings IEEE INFOCOM, 504-512, 2012
63 2012 A new constant factor approximation for computing 3-connected m-dominating sets in homogeneous wireless networks D Kim, W Wang, X Li, Z Zhang, W Wu
2010 Proceedings IEEE INFOCOM, 1-9, 2010
59 2010 Secure and privacy-aware incentives-based witness service in social internet of vehicles clouds R Hussain, D Kim, J Son, J Lee, CA Kerrache, A Benslimane, H Oh
IEEE Internet of Things Journal 5 (4), 2441-2448, 2018
55 2018 On theoretical trajectory planning of multiple drones to minimize latency in search-and-reconnaissance operations D Kim, L Xue, D Li, Y Zhu, W Wang, AO Tokuta
IEEE transactions on mobile computing 16 (11), 3156-3166, 2017
54 2017 On construction of quality fault-tolerant virtual backbone in wireless networks W Wang, D Kim, MK An, W Gao, X Li, Z Zhang, W Wu
IEEE/ACM Transactions on Networking 21 (5), 1499-1510, 2012
54 2012 Vehicle witnesses as a service: Leveraging vehicles as witnesses on the road in vanet clouds R Hussain, F Abbas, J Son, D Kim, S Kim, H Oh
2013 IEEE 5th International Conference on Cloud Computing Technology and …, 2013
50 2013 Minimum Data-Latency-Bound -Sink Placement Problem in Wireless Sensor Networks D Kim, W Wang, N Sohaee, C Ma, W Wu, W Lee, DZ Du
IEEE/ACM Transactions on Networking 19 (5), 1344-1353, 2011
50 2011 Current status and security trend of osint YW Hwang, IY Lee, H Kim, H Lee, D Kim
Wireless Communications and Mobile Computing 2022 (1), 1290129, 2022
48 2022 Rumor restriction in online social networks S Li, Y Zhu, D Li, D Kim, H Huang
2013 IEEE 32nd international performance computing and communications …, 2013
48 2013 New dominating sets in social networks X Zhu, J Yu, W Lee, D Kim, S Shan, DZ Du
Journal of Global Optimization 48 (4), 633-642, 2010
44 2010 Constructing connected dominating sets with bounded diameters inwireless networks Y Li, D Kim, F Zou, DZ Du
International Conference on Wireless Algorithms, Systems and Applications …, 2007
42 2007 An unsupervised anomaly detection framework for detecting anomalies in real time through network system’s log files analysis V Zeufack, D Kim, D Seo, A Lee
High-Confidence Computing 1 (2), 100030, 2021
41 2021 Maximum lifetime combined barrier-coverage of weak static sensors and strong mobile sensors D Kim, W Wang, J Son, W Wu, W Lee, AO Tokuta
IEEE Transactions on Mobile Computing 16 (7), 1956-1966, 2016
40 2016 Conditional proxy re-encryption for secure big data group sharing in cloud environment J Son, D Kim, R Hussain, H Oh
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2014
37 2014 Identity-based key agreement protocols in a multiple PKG environment H Lee, D Kim, S Kim, H Oh
Computational Science and Its Applications–ICCSA 2005: International …, 2005
35 2005