Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu
Xiaoqi JiaInstitute of Information Engineering, CASVerified email at iie.ac.cn
Dinghao WuPennsylvania State UniversityVerified email at psu.edu
Kamal TahaKhalifa University, UAEVerified email at ku.ac.ae
A. Taufiq AsyhariProfessor, Monash UniversityVerified email at monash.edu
Paul D YooDy Director, Data Analytics Institute, Birkbeck College, University of London, United KingdomVerified email at ieee.org
Chan Yeob YeunKhalfia UniversityVerified email at kustar.ac.ae
Deguang KongGoogleVerified email at google.com
George KesidisProfessor of Computer Science and Engineering, Pennsylvania State University; Professor of Electrical Engineering, Pennsylvania Verified email at engr.psu.edu
XI XIONGComputer Science and Engineering, Pennsylvania State UniversityVerified email at cse.psu.edu
Shengzhi ZhangBoston University MET CollegeVerified email at bu.edu
Kun BaiAmazonVerified email at amazon.com
Qijun GuTexas State UniversityVerified email at txstate.edu
kichang kim인하대 정보통신공학과 교수Verified email at inha.ac.kr
Follow![Yoon-Chan Jhi](/citations/images/avatar_scholar_128.png)
![Yoon-Chan Jhi](/citations/images/avatar_scholar_128.png)
Yoon-Chan Jhi
Director of Software Security in Technology Research at Samsung SDS, Seoul, Korea
Verified email at samsung.com