³» ÇÁ·ÎÇÊ ¸¸µé±â
°ø°³ ¾×¼¼½º
¸ðµÎ º¸±âÀÚ·á 55°³
ÀÚ·á 26°³
°ø°³
ºñ°ø°³
ÀçÁ¤ Áö¿ø ¿ä±¸»çÇ× ±âÁØ
°øµ¿ ÀúÀÚ
XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at Bloomingtonindiana.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State Universityist.psu.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Shengzhi ZhangBoston University MET Collegebu.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Ruigang LiangInstitute of Information Engineering, Chinese Academy of Sciencesiie.ac.cnÀÇ À̸ÞÀÏ È®ÀεÊ
Guozhu MengAssociate Professor with Chinese Academy of Sciencesiie.ac.cnÀÇ À̸ÞÀÏ È®ÀεÊ
Heqing HuangIBM Thomas J. Watson Research Centerus.ibm.comÀÇ À̸ÞÀÏ È®ÀεÊ
Yue ZhaoUniversity of Chinese Academy of Sciencesiie.ac.cnÀÇ À̸ÞÀÏ È®ÀεÊ
Nan ZhangFacebook Inc.indiana.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Haixu TangProfessor, Indiana Universityindiana.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Yeonjoon LeeAssistant Professor of College of Computing, Hanyang Universityhanyang.ac.krÀÇ À̸ÞÀÏ È®ÀεÊ
Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-Champaignillinois.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Yuxuan ChenShandong Universitysdu.edu.cnÀÇ À̸ÞÀÏ È®ÀεÊ
Xuejing YuanSchool of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876bupt.edu.cnÀÇ À̸ÞÀÏ È®ÀεÊ
Yi ChenIndiana University Bloomingtoniu.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Jin Li ×Ý进Professor @Guangzhou Universitygzhu.edu.cnÀÇ À̸ÞÀÏ È®ÀεÊ
Tongxin LiPeking Universitypku.edu.cnÀÇ À̸ÞÀÏ È®ÀεÊ
Peiyuan ZongInstitute of Information Engineering, Chinese Academy of Sciencesiie.ac.cnÀÇ À̸ÞÀÏ È®ÀεÊ
Yunhui LongUniversity of Illinois at Urbana-Champaignillinois.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Xiaojing LiaoIndiana University Bloomingtonindiana.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Luyi XingAssistant Professor of Computer Science, Indiana University Bloomingtonindiana.eduÀÇ À̸ÞÀÏ È®ÀεÊ