Jongeun Kim

ORCID: 0000-0003-3978-4650
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Machine Learning and Algorithms
  • Energy Efficient Wireless Sensor Networks
  • Wireless Communication Networks Research
  • Advanced Authentication Protocols Security
  • Security in Wireless Sensor Networks
  • Advanced Multi-Objective Optimization Algorithms
  • Anomaly Detection Techniques and Applications
  • Computational Drug Discovery Methods
  • Complex Network Analysis Techniques
  • Machine Learning and Data Classification
  • Bluetooth and Wireless Communication Technologies
  • IPv6, Mobility, Handover, Networks, Security
  • Network Packet Processing and Optimization
  • Sentiment Analysis and Opinion Mining
  • Advanced MIMO Systems Optimization
  • Human Pose and Action Recognition
  • Water Systems and Optimization
  • Antenna Design and Analysis
  • Advanced Text Analysis Techniques
  • Facility Location and Emergency Management
  • Advanced Control Systems Optimization
  • Advanced Wireless Communication Techniques
  • Network Security and Intrusion Detection
  • Metaheuristic Optimization Algorithms Research
  • Advanced Statistical Methods and Models

University of Minnesota
2010-2024

University of Florida
2019

Gyeongsang National University
2018

Hormel (United States)
2010

Dankook University
2005

This archive is distributed in association with the INFORMS Journal on Computing under GNU GPLv3. The software and data this repository are a snapshot of that were used research reported paper Learning Symbolic Expressions: Mixed-Integer Formulations, Cuts, Heuristics by Jongeun Kim, Sven Leyffer, Prasanna Balaprakash. based SHA development repository.

10.1287/ijoc.2022.0050.cd article EN INFORMS journal on computing 2023-07-19

10.1016/j.ejor.2019.07.042 article EN publisher-specific-oa European Journal of Operational Research 2019-07-25

Although multivariate outlier detection techniques have been actively studied in various fields, domestic studies on the water quality management of waterworks are relatively inadequate and performed a small range. In this study, dataset were collected from G_water treatment plants South Korea classified by statistical correlation. For groups with significant correlations, we compared analyzed performance applying distance isolation forest techniques. group insignificant correlation,...

10.4491/ksee.2018.40.12.473 article EN cc-by-nc Journal of Korean Society of Environmental Engineers 2018-12-28

Capitalizing on the relationships between tree ensembles and multilinear functions Tree are machine learning models used for regression classification that combine predictions of multiple trees. When such trained embedded into optimization in form constraints or objectives, a key question is deriving best integer programming formulations them. In “A Reciprocity Between Ensemble Optimization Multilinear Optimization,” J. Kim, J.-P. Richard, M. Tawarmalani establish polynomial-size reduction...

10.1287/opre.2022.0150 article EN Operations Research 2024-08-29

In this paper we consider the problem of learning a regression function without assuming its functional form. This is referred to as symbolic regression. An expression tree typically used represent solution function, which determined by assigning operators and operands nodes. The can be formulated nonconvex mixed-integer nonlinear program (MINLP), where binary variables are assign expressions propagate data values through such square, square root, exponential. We extend formulation adding...

10.1287/ijoc.2022.0050 article EN INFORMS journal on computing 2023-07-19

Slogans play a crucial role in building the brand's identity of firm. A slogan is expected to reflect firm's vision and value propositions memorable likeable ways. Automating generation slogans with such characteristics challenging. Previous studies developted tested syntactic control summarization models which are not capable generating distinctive slogans. We introduce novel apporach that leverages pre-trained transformer T5 model noise perturbation on newly proposed 1:N matching pair...

10.48550/arxiv.2310.04472 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Abstract Protein kinases are involved in a number of signaling cascades and they considered as one the major classes potential drug targets. Overexpression protein is often found many human cancers. Fyn, member Src family tyrosine kinases, plays critical role T-cell receptor signaling, brain function, cell adhesion-mediated signaling. More importantly, Fyn has oncogenic carcinogenesis processes, including skin cancer development. These properties make an ideal molecular target for...

10.1158/1538-7445.am10-361 article EN Cancer Research 2010-04-01

제한된 연산 및 통신 능력을 갖는 센서 노드에서는 전통적인 공개키 기반의 보안 기법들을 사용할 수 없으므로, 두 노드 사이의 안전한 통신이 네트워크의 중요한 연구 과제가 되었으며 직접 통신을 위한 다양한 세션키 설정 프로토콜들이 제안되었다. 본 연구에서는 기존의 대표적인 프로토콜들을 방법, 세션키의 유일성, 연결성, 과부하, 공격 취약성 등의 기준 측도에 의해 분석하고, 분석 결과를 토대로 안전하고 효율적인 프로토콜을 기준안을 제시하였다. 또한, 제시된 만족시키는 개선된 생성 제안하고, 제안 프로토콜의 성능적 우수성을 상세한 분석을 통해 Because the traditional public key-based cryptosystems are unsuitable for sensor node with limited computational and communication capability, a secure between two neighbor nodes becomes an...

10.3745/kipstc.2006.13c.2.137 article EN The KIPS Transactions PartC 2006-04-01

본 논문에서는 취약점 검색공격 탐지시스템 DS-NVSA(Detection System of Network Vulnerability Scan Attacks)에서 서버와 에이전트들 사이의 상호연동을 위한 안전한 통신 프레임워크를 제안한다. 기존 시스템과의 위하여 제안 프레임워크는 IETF의 IDWG에서 제안한 IDMEF와 IAP를 확장 적용하였다. 또한 공개키 기반의 환경을 지원하지 못하는 네트워크 시스템을 위해 대칭키 암호화 프로토콜 SKTLS(Symmetric Key based Transport Layer Security Protocol)를 제시하였다. 제안된 DS-NVSA 이외에도 기존의 이기종 침입탐지 시스템의 제사용과 탐지 영역의 확대를 제공하며, 기업내 통합 보안환경시스템 ESM(Enterprise Management) 시스템에도 적용될 수 있다. In this paper, we propose a secure communication framework for...

10.3745/kipstc.2003.10c.1.001 article EN The KIPS Transactions PartC 2003-02-01

This technical report presents the 2nd winning model for AQTC, a task newly introduced in CVPR 2022 LOng-form VidEo Understanding (LOVEU) challenges. challenge faces difficulties with multi-step answers, multi-modal, and diverse changing button representations video. We address this problem by proposing new context ground module attention mechanism more effective feature mapping. In addition, we also perform analysis over number of buttons ablation study different step networks video...

10.48550/arxiv.2206.14555 preprint EN cc-by arXiv (Cornell University) 2022-01-01
Coming Soon ...