Follow
Junsoo Kim
Junsoo Kim
Seoul National University of Science and Technology, Dep. of Electrical and Information Engineering
Verified email at seoultech.ac.kr - Homepage
Title
Cited by
Cited by
Year
Encrypting controller using fully homomorphic encryption for security of cyber-physical systems
J Kim, C Lee, H Shim, JH Cheon, A Kim, M Kim, Y Song
IFAC-PapersOnLine 49 (22), 175-180, 2016
1522016
Toward a secure drone system: Flying with real-time homomorphic authenticated encryption
JH Cheon, K Han, SM Hong, HJ Kim, J Kim, S Kim, H Seo, H Shim, ...
IEEE access 6, 24325-24339, 2018
1232018
Detection of sensor attack and resilient state estimation for uniformly observable nonlinear systems having redundant sensors
J Kim, C Lee, H Shim, Y Eun, JH Seo
IEEE Transactions on Automatic Control 64 (3), 1162-1169, 2018
692018
Dynamic controller that operates over homomorphically encrypted data for infinite time horizon
J Kim, H Shim, K Han
IEEE Transactions on Automatic Control, 2022
512022
Need for controllers having integer coefficients in homomorphically encrypted dynamic system
JH Cheon, K Han, H Kim, J Kim, H Shim
2018 IEEE Conference on Decision and Control (CDC), 5020-5025, 2018
492018
Fully distributed resilient state estimation based on distributed median solver
JG Lee, J Kim, H Shim
IEEE Transactions on Automatic Control 65 (9), 3935-3942, 2020
482020
Detection of sensor attack and resilient state estimation for uniformly observable nonlinear systems
J Kim, C Lee, H Shim, Y Eun, JH Seo
2016 IEEE 55th Conference on Decision and Control (CDC), 1297-1302, 2016
232016
Comprehensive introduction to fully homomorphic encryption for dynamic feedback controller via LWE-based cryptosystem
J Kim, H Shim, K Han
Privacy in dynamical systems, 209-230, 2020
192020
Encrypted state estimation in networked control systems
J Kim, H Shim
2019 IEEE 58th Conference on Decision and Control (CDC), 7190-7195, 2019
172019
Local identification of sensor attack and distributed resilient state estimation for linear systems
J Kim, JG Lee, C Lee, H Shim, JH Seo
2018 IEEE Conference on Decision and Control (CDC), 2056-2061, 2018
172018
Comparison of encrypted control approaches and tutorial on dynamic systems using learning with errors-based homomorphic encryption
J Kim, D Kim, Y Song, H Shim, H Sandberg, KH Johansson
Annual Reviews in Control 54, 200-218, 2022
152022
Design procedure for dynamic controllers based on LWE-based homomorphic encryption to operate for infinite time horizon
J Kim, H Shim, K Han
2020 59th IEEE conference on decision and control (CDC), 5463-5468, 2020
102020
Method for running dynamic systems over encrypted data for infinite time horizon without bootstrapping and re-encryption
J Kim, H Shim, H Sandberg, KH Johansson
2021 60th IEEE conference on decision and control (CDC), 5614-5619, 2021
92021
Zero-dynamics attack on homomorphically encrypted control system
J Lee, J Kim, H Shim
2020 20th International Conference on Control, Automation and Systems (ICCAS …, 2020
82020
Model-free undetectable attacks on linear systems using LWE-based encryption
R Alisic, J Kim, H Sandberg
IEEE Control Systems Letters 7, 1249-1254, 2023
72023
Authenticated computation of control signal from dynamic controllers
JH Cheon, D Kim, J Kim, S Lee, H Shim
2020 59th IEEE Conference on Decision and Control (CDC), 3249-3254, 2020
52020
Toward nonlinear dynamic control over encrypted data for infinite time horizon
J Kim, F Farokhi, I Shames, H Shim
arXiv preprint arXiv:2110.06270, 2021
42021
Method for processing dynamic data by fully homomorphic encryption method
H Shim, J Cheon, Y Song, M Kim, J Kim, C Lee
US Patent 10,924,262, 2021
42021
Distributed aggregation over homomorphically encrypted data under switching networks
D Lee, J Kim, H Shim
2020 59th IEEE Conference on Decision and Control (CDC), 5495-5500, 2020
32020
Comparison of encrypted control approaches and tutorial on dynamic systems using lwe-based homomorphic encryption
J Kim, D Kim, Y Song, H Shim, H Sandberg, KH Johansson
arXiv preprint arXiv:2210.05560, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20