I Luk Kim
I Luk Kim
Verified email at - Homepage
Cited by
Cited by
SWATShare–A web platform for collaborative research and education through online sharing, simulation and visualization of SWAT models
MA Rajib, V Merwade, IL Kim, L Zhao, C Song, S Zhe
Environmental Modelling & Software 75, 498-512, 2016
J-force: Forced execution on javascript
K Kim, IL Kim, CH Kim, Y Kwon, Y Zheng, X Zhang, D Xu
Proceedings of the 26th international conference on World Wide Web, 897-906, 2017
An improved anonymous authentication scheme for distributed mobile cloud computing services
SA Chaudhry, IL Kim, S Rho, MS Farash, T Shon
Cluster Computing 22 (1), 1595-1609, 2019
Apex: automatic programming assignment error explanation
D Kim, Y Kwon, P Liu, IL Kim, DM Perry, X Zhang, G Rodriguez-Rivera
ACM SIGPLAN Notices 51 (10), 311-327, 2016
A2c: Self destructing exploit executions via input perturbation
Y Kwon, B Saltaformaggio, IL Kim, KH Lee, X Zhang, D Xu
Proceedings of The Network and Distributed System Security Symposium, 2017
Watershed modeling with remotely sensed big data: MODIS leaf area index improves hydrology and water quality predictions
A Rajib, IL Kim, HE Golden, CR Lane, SV Kumar, Z Yu, S Jeyalakshmi
Remote sensing 12 (13), 2148, 2020
MyGeoHub—A sustainable and evolving geospatial science gateway
R Kalyanam, L Zhao, C Song, L Biehl, D Kearney, IL Kim, J Shin, ...
Future Generation Computer Systems 94, 820-832, 2019
A novel approach to detection of mobile rogue access points
I Kim, J Seo, T Shon, J Moon
Security and Communication Networks 7 (10), 1510-1516, 2014
GABBs-Reusable Geospatial Data Analysis Building Blocks for Science Gateways.
L Zhao, CX Song, R Kalyanam, L Biehl, R Campbell, L Delgass, ...
IWSG, 2017
Adbudgetkiller: Online advertising budget draining attack
IL Kim, W Wang, Y Kwon, Y Zheng, Y Aafer, W Meng, X Zhang
Proceedings of the 2018 World Wide Web Conference, 297-307, 2018
Design and implementation of fuzzing framework based on IoT applications
TL Munea, I Luk Kim, T Shon
Wireless Personal Communications 93 (2), 365-382, 2017
Finding client-side business flow tampering vulnerabilities
IL Kim, Y Zheng, H Park, W Wang, W You, Y Aafer, X Zhang
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
I Luk Kim
IL Kim
Wireless Personal Communications 8, A2c, 2017
Pad: Programming third-party web advertisement censorship
W Wang, Y Kwon, Y Zheng, Y Aafer, IL Kim, WC Lee, Y Liu, W Meng, ...
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
SWATShare–A web-portal for hydrology research and education using Soil Water And Assessment Tool
MA Rajib, V Merwade, IL Kim, S Zhe, L Zhao, C Song
SWATShare–A web-portal for hydrology research and education using Soil Water And Assessment Tool
MA Rajib, V Merwade, IL Kim, S Zhe, L Zhao, C Song
Development of high performance computing tools for estimation of high-resolution surface energy balance products using sUAS information
A Nassar, A Torres-Rua, V Merwade, S Dey, L Zhao, IL Kim, WP Kustas, ...
Autonomous Air and Ground Sensing Systems for Agricultural Optimization and …, 2021
Adjust: Runtime mitigation of resource abusing third-party online ads
W Wang, IL Kim, Y Zheng
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
MyGeoHub Geospatial Gateway
R Kalyanam, L Zhao, R Campbell, D Kearney, IL Kim, J Shin, L Biehl, ...
demo at Gateways 2017 conference, Ann Arbor, MI, 2017
Bridging Hydroinformatics Services Between HydroShare and SWATShare
V Merwade, L Zhao, CX Song, DG Tarboton, JL Goodall, M Stealey, ...
AGU Fall Meeting Abstracts 2016, H41B-1332, 2016
The system can't perform the operation now. Try again later.
Articles 1–20