


default search action
Juho Kim
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Juho Kim 0001 — KAIST, School of Computing, Korea (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j18]Juho Kim
:
PokerKit: A Comprehensive Python Library for Fine-Grained Multivariant Poker Game Simulations. IEEE Trans. Games 17(1): 32-39 (2025) - [i10]Ali Raeisdanaei, Juho Kim, Michael Liao, Sparsh Kochhar:
An LLM-Integrated Framework for Completion, Management, and Tracing of STPA. CoRR abs/2503.12043 (2025) - [i9]Hyoungwook Jin, Yoonsu Kim, Dongyun Jung, Seungju Kim, Kiyoon Choi, Jinho Son, Juho Kim:
Investigating Large Language Models in Diagnosing Students' Cognitive Skills in Math Problem-solving. CoRR abs/2504.00843 (2025) - 2024
- [j17]MyoungJun Cheong
, Juho Kim
, Do-Hyun Park
, Hyoung-Nam Kim
:
Temporal-Feature-Based Classification of Active Sonar Targets in a Deep-Water Environment. IEEE Trans. Aerosp. Electron. Syst. 60(5): 7380-7392 (2024) - [c29]Juho Kim:
Recording and Describing Poker Hands. CoG 2024: 1-8 - [c28]Haechan Kim, Junho Myung, Seoyoung Kim, Sungpah Lee, Dongyeop Kang, Juho Kim:
LearnerVoice: A Dataset of Non-Native English Learners' Spontaneous Speech. INTERSPEECH 2024 - [i8]Haechan Kim, Junho Myung, Seoyoung Kim, Sungpah Lee, Dongyeop Kang, Juho Kim:
LearnerVoice: A Dataset of Non-Native English Learners' Spontaneous Speech. CoRR abs/2407.04280 (2024) - [i7]Juho Kim:
GPU-Accelerated Counterfactual Regret Minimization. CoRR abs/2408.14778 (2024) - [i6]Juho Kim, Michael Guerzhoy:
Observing the Southern US Culture of Honor Using Large-Scale Social Media Analysis. CoRR abs/2410.13887 (2024) - 2023
- [j16]John C. Tang, Kori Inkpen, Paul Luff, Geraldine Fitzpatrick, Naomi Yamashita, Juho Kim:
Living Through a Crisis: How COVID-19 Has Transformed the Way We Work, Live, and Research. Comput. Support. Cooperative Work. 32(2): 211-213 (2023) - [j15]Yunsu Kim, Juho Kim, Jungpyo Hong, Jongwon Seok:
The Tacotron-Based Signal Synthesis Method for Active Sonar. Sensors 23(1): 28 (2023) - [i5]Juho Kim:
PokerKit: A Comprehensive Python Library for Fine-Grained Multi-Variant Poker Game Simulations. CoRR abs/2308.07327 (2023) - [i4]Juho Kim:
PadChannel: Improving CNN Performance through Explicit Padding Encoding. CoRR abs/2311.07623 (2023) - [i3]Juho Kim:
Poker Hand History File Format Specification. CoRR abs/2312.11753 (2023) - 2022
- [c27]Seokbyum Kim, Mujun Choi, Juho Kim:
BTI-Aware Cell Characterization based on Neural Network. DCIS 2022: 1-4 - [c26]Myeongwoo Jin, Doekkeun Oh, Juho Kim:
High-Level Synthesis Considering Layer Assignment on Timing in 3D-IC. ISOCC 2022: 386-387 - [c25]Myeongwoo Jin, Doekkeun Oh, Juho Kim:
Delay Impact on Process Variation of Interconnect throughout technology scaling. ISOCC 2022: 388-389 - 2020
- [j14]Sarah A. Christensen, Juho Kim, Nicholas Chia, Oluwasanmi Koyejo, Mohammed El-Kebir:
Detecting evolutionary patterns of cancers using consensus trees. Bioinform. 36(Supplement-2): i684-i691 (2020) - [c24]Deok Keun Oh, Mu Jun Choi, Juho Kim:
Symmetrical Buffered Clock Tree Synthesis Considering NBTI. ISCAS 2020: 1-5
2010 – 2019
- 2019
- [j13]Deok Keun Oh, Mu Jun Choi, Juho Kim:
Thermal-aware 3D Symmetrical Buffered Clock Tree Synthesis. ACM Trans. Design Autom. Electr. Syst. 24(3): 28:1-28:22 (2019) - 2018
- [c23]Juho Kim, Christopher Malon, Asim Kadav:
Teaching Syntax by Adversarial Distraction. FEVER@EMNLP 2018: 79-84 - [c22]Deok Keun Oh, Mu Jun Choi, Juho Kim:
Thermal-Aware 3D Symmetrical Buffered Clock Tree Synthesis. ICCD 2018: 9-16 - [i2]Juho Kim, Christopher Malon, Asim Kadav:
Teaching Syntax by Adversarial Distraction. CoRR abs/1810.11067 (2018) - 2017
- [c21]Sang Guun Yoo
, Hugo Pérez Vaca, Juho Kim:
Enhanced Misuse Cases for Prioritization of Security Requirements. ICIME 2017: 1-10 - [c20]Juho Kim, Nate Russell, Jian Peng:
Scalable Visualization for High-dimensional Single-cell Data. PSB 2017 - [i1]Keunwoo Choi, Deokjin Joo, Juho Kim:
Kapre: On-GPU Audio Preprocessing Layers for a Quick Implementation of Deep Neural Network Models with Keras. CoRR abs/1706.05781 (2017) - 2016
- [c19]Juho Kim:
Organic Crowdsourcing Systems. AAAI Spring Symposia 2016 - [c18]Jeong-Won Kim, Deok Keun Oh, Juho Kim:
Performance optimization in FinFET-based circuit using TILOS-like gate sizing. ISIC 2016: 1-4 - 2014
- [j12]Seung-Hoon Kang, Keunyoung Park, Juho Kim:
Cost effective data wiping methods for mobile phone. Multim. Tools Appl. 71(2): 643-655 (2014) - [j11]Sang Guun Yoo
, Seung-Hoon Kang, Juho Kim:
SERA: a secure energy reliability aware data gathering for sensor networks. Multim. Tools Appl. 73(2): 617-646 (2014) - [j10]Tae-Hoon Bok
, Juho Kim, Jinho Bae
, Chong Hyun Lee
, Dong-Guk Paeng
:
Implementation of a Rotational Ultrasound Biomicroscopy System Equipped with a High-Frequency Angled Needle Transducer - Ex Vivo Ultrasound Imaging of Porcine Ocular Posterior Tissues. Sensors 14(9): 17807-17816 (2014) - [c17]Seunghak Yu, Juho Kim, Hyeyoung Min, Sungroh Yoon:
Ensemble learning for robust prediction of microRNA-mRNA interactions. BigComp 2014: 45-46 - [c16]Juho Kim, Seunghak Yu, Sungroh Yoon:
Ensemble algorithms for DNA motif finding. ICEIC 2014: 1-2 - 2013
- [j9]Seung-Hoon Kang, Keunyoung Park, Sang Guun Yoo
, Juho Kim:
DDoS avoidance strategy for service availability. Clust. Comput. 16(2): 241-248 (2013) - [j8]Sang Guun Yoo
, Hyukjun Lee, Juho Kim:
A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j7]Sangwoo Han, Byung-Su Kim, Juho Kim:
Variation-Aware Aging Analysis in Digital ICs. IEEE Trans. Very Large Scale Integr. Syst. 21(12): 2214-2225 (2013) - [c15]Juho Kim:
Toolscape: enhancing the learning experience of how-to videos. CHI Extended Abstracts 2013: 2707-2712 - 2012
- [j6]Sang Guun Yoo
, Keunyoung Park, Juho Kim:
A Security-Performance-Balanced User Authentication Scheme for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 8 (2012) - [j5]Sang Guun Yoo
, Keunyoung Park, Juho Kim:
Confidential information protection system for mobile devices. Secur. Commun. Networks 5(12): 1452-1461 (2012) - [c14]Keunyoung Park, Yong-Soo Kim, Juho Kim:
Selective Application of VPN by Service Using Port Number in SSL-Based Host-to-Gateway VPN Environment. ICHIT (1) 2012: 598-607 - 2011
- [c13]Eser Kandogan, Juho Kim
, Thomas P. Moran, Pablo Pedemonte:
How a freeform spatial interface supports simple problem solving tasks. CHI 2011: 925-934 - [c12]Sangwoo Han, Joohee Choung, Byung-Su Kim, Bong Hyun Lee, Hungbok Choi, Juho Kim:
Statistical aging analysis with process variation consideration. ICCAD 2011: 412-419 - [c11]Keunyoung Park, Sang Guun Yoo
, Juho Kim:
Security Requirements Prioritization Based on Threat Modeling and Valuation Graph. ICHIT (2) 2011: 142-152 - [c10]Yunho Lee, Sang Guun Yoo
, Juho Kim, Soojin Lee:
Specification-Based Intrusion Detection System for WiBro. ICHIT (1) 2011: 445-455 - 2010
- [j4]Keunyoung Park, Sang Guun Yoo
, Taejun Kim, Juho Kim:
JTAG Security System Based on Credentials. J. Electron. Test. 26(5): 549-557 (2010) - [c9]Sangwoo Han, Juho Kim:
NBTI-aware statistical timing analysis framework. SoCC 2010: 158-163
2000 – 2009
- 2009
- [c8]Ranjitha Kumar, Juho Kim
, Scott R. Klemmer:
Automatic retargeting of web page content. CHI Extended Abstracts 2009: 4237-4242 - 2008
- [c7]Naeun Zang
, Eunsuk Park, Juho Kim:
Efficient cell characterization for SSTA. APCCAS 2008: 1012-1015 - 2007
- [c6]Youse Kim, Naeun Zang
, Juho Kim:
Stochastic glitch elimination considering path correlation. SoCC 2007: 169-172 - 2006
- [c5]Hosun Shin, Naeun Zang
, Juho Kim:
Stochastic Glitch Estimation and Path Balancing for Statistical Optimization. SoCC 2006: 85-88 - 2002
- [j3]Sungjae Kim, Hyungwoo Lee, Juho Kim:
Concurrent Gate Re-Sizing and Buffer Insertion to Reduce Glitch Power in CMOS Digital Circuit Design. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 234-240 (2002) - 2001
- [c4]Hidetoshi Onodera, Andrew B. Kahng, Wayne Wei-Ming Dai, Sani R. Nassif, Juho Kim, Akira Tanabe, Toshihiro Hattori:
Beyond the red brick wall (panel): challenges and solutions in 50nm physical design. ASP-DAC 2001: 267-268
1990 – 1999
- 1998
- [j2]Juho Kim, David Hung-Chang Du:
Performance optimization by gate sizing and path sensitization. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 17(5): 459-462 (1998) - [j1]Yanbin Jiang, Sachin S. Sapatnekar
, Cyrus Bamji, Juho Kim:
Interleaving buffer insertion and transistor sizing into a single optimization. IEEE Trans. Very Large Scale Integr. Syst. 6(4): 625-633 (1998) - [c3]Yanbin Jiang, Sachin S. Sapatnekar, Cyrus Bamji, Juho Kim:
Combined transistor sizing with buffer insertion for timing optimization. CICC 1998: 605-608 - [c2]Dong-Eun Lee, Seung-Il Kang, Jae-Hong Song, Juho Kim:
CADIC: computer-aided design on internet with cryptosystem. SMC 1998: 2670-2674 - 1997
- [c1]Juho Kim, Cyrus Bamji, Yanbin Jiang, Sachin S. Sapatnekar:
Concurrent transistor sizing and buffer insertion by considering cost-delay tradeoffs. ISPD 1997: 130-135
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-19 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint