default search action
Yohan Ko
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Yebon Kim, Jinhyo Jung, Hyunjun Kim, Hwisoo So, Yohan Ko, Aviral Shrivastava, Kyoungwoo Lee, Uiwon Hwang:
Adversarial Defense on Harmony: Reverse Attack for Robust AI Models Against Adversarial Attacks. IEEE Access 12: 176485-176497 (2024) - [c10]Jinhyo Jung, Hwisoo So, Woobin Ko, Sumedh Shridhar Joshi, Yebon Kim, Yohan Ko, Aviral Shrivastava, Kyoungwoo Lee:
Maintaining Sanity: Algorithm-based Comprehensive Fault Tolerance for CNNs. DAC 2024: 59:1-59:6 - 2022
- [j5]Jinhyo Jung, Yohan Ko, Hwisoo So, Kyoungwoo Lee, Aviral Shrivastava:
Root cause analysis of soft-error-induced failures from hardware and software perspectives. J. Syst. Archit. 130: 102652 (2022) - [j4]Hwisoo So, Moslem Didehban, Yohan Ko, Aviral Shrivastava, Kyoungwoo Lee:
EXPERTISE: An Effective Software-level Redundant Multithreading Scheme against Hardware Faults. ACM Trans. Archit. Code Optim. 19(4): 53:1-53:26 (2022) - 2021
- [c9]Yohan Ko, Hwisoo So, Jinhyo Jung, Kyoungwoo Lee, Aviral Shrivastava:
Comprehensive Failure Analysis against Soft Errors from Hardware and Software Perspectives. ICCD 2021: 204-207
2010 – 2019
- 2018
- [c8]Hwisoo So, Moslem Didehban, Yohan Ko, Aviral Shrivastava, Kyoungwoo Lee:
EXPERT: Effective and flexible error protection by redundant multithreading. DATE 2018: 533-538 - 2017
- [j3]Yohan Ko, Reiley Jeyapaul, Youngbin Kim, Kyoungwoo Lee, Aviral Shrivastava:
Protecting Caches from Soft Errors: A Microarchitect's Perspective. ACM Trans. Embed. Comput. Syst. 16(4): 93:1-93:28 (2017) - [c7]Jonghoon Shin, Hyunchoong Kim, Dayoung Lee, Yohan Ko, Kyoungwoo Lee, Seong-il Hahm, TaeJun Kwon:
Indoor localization in home environments using appearance frequency information. SMC 2017: 2718-2723 - 2016
- [j2]Yohan Ko, Jihoon Kang, Jongwon Lee, Yongjoo Kim, Joonhyun Kim, Hwisoo So, Kyoungwoo Lee, Yunheung Paek:
Software-Based Selective Validation Techniques for Robust CGRAs Against Soft Errors. ACM Trans. Embed. Comput. Syst. 15(1): 20:1-20:26 (2016) - [c6]Karthik Tanikella, Yohan Ko, Reiley Jeyapaul, Kyoungwoo Lee, Aviral Shrivastava:
gemV: A validated toolset for the early exploration of system reliability. ASAP 2016: 159-163 - [c5]Yohan Ko, Hyunjun Kim, Hwansoo Han:
Escalating Memory Accesses to Shared Memory by Profiling Reuse. IMCOM 2016: 32:1-32:8 - [c4]Yohan Ko, Kyoungwoo Lee:
Multi-level cache vulnerability estimation: The first step to protect memory. SMC 2016: 1165-1170 - [c3]Hyunchoong Kim, Jonghoon Shin, Soohwan Kim, Yohan Ko, Kyoungwoo Lee, Hojung Cha, Seong-il Hahm, TaeJun Kwon:
Collaborative classification for daily activity recognition with a smartwatch. SMC 2016: 3707-3712 - 2015
- [c2]Yohan Ko, Reiley Jeyapaul, Youngbin Kim, Kyoungwoo Lee, Aviral Shrivastava:
Guidelines to design parity protected write-back L1 data cache. DAC 2015: 24:1-24:6 - 2013
- [j1]Jongwon Lee, Yohan Ko, Kyoungwoo Lee, Jonghee M. Youn, Yunheung Paek:
Dynamic code duplication with vulnerability awareness for soft error detection on VLIW architectures. ACM Trans. Archit. Code Optim. 9(4): 48:1-48:24 (2013) - [c1]Jihoon Kang, Yohan Ko, Jongwon Lee, Yongjoo Kim, Hwisoo So, Kyoungwoo Lee, Yunheung Paek:
Selective validations for efficient protections on Coarse-Grained Reconfigurable Architectures. ASAP 2013: 95-98
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint