³» ÇÁ·ÎÇÊ ¸¸µé±â
°ø°³ ¾×¼¼½º
¸ðµÎ º¸±âÀÚ·á 2°³
ÀÚ·á 1°³
°ø°³
ºñ°ø°³
ÀçÁ¤ Áö¿ø ¿ä±¸»çÇ× ±âÁØ
°øµ¿ ÀúÀÚ
Anand SivasubramaniamDistinguished Professor of Computer Science & Engineering, Penn State Universitycse.psu.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Di WangMicrosoftmicrosoft.comÀÇ À̸ÞÀÏ È®ÀεÊ
Bhuvan UrgaonkarProfessor, Penn Statecse.psu.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State Universityist.psu.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Yulong ZhangGooglegoogle.comÀÇ À̸ÞÀÏ È®ÀεÊ
Hosam K. FathyProfessor of Mechanical Engineering, University of Marylandumd.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Kai ChenInstitute of Information Engineering, Chinese Academy of Sciencesiie.ac.cnÀÇ À̸ÞÀÏ È®ÀεÊ
Sencun ZhuPennsylvania State Universitycse.psu.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Sriram GovindanMicrosoft Corporationmicrosoft.comÀÇ À̸ÞÀÏ È®ÀεÊ
Aman KansalMicrosoft Researchmicrosoft.comÀÇ À̸ÞÀÏ È®ÀεÊ
Dinghao WuPennsylvania State Universitypsu.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Heqing HuangIBM Thomas J. Watson Research Centerus.ibm.comÀÇ À̸ÞÀÏ È®ÀεÊ
Dawn SongProfessor of Computer Science, UC Berkeleycs.berkeley.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Hui XueUniversity of Illinois at Urbana Champaignuiuc.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Min ZhengThe Chinese University of Hong Kongcse.cuhk.edu.hkÀÇ À̸ÞÀÏ È®ÀεÊ