Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Adrian PerrigProfessor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab FellowVerified email at inf.ethz.ch
Hyunsang ChoiVerified email at korea.ac.kr
Riaz Ahmed ShaikhAssociate Professor, Computer Science Dept., King Abdulaziz UniversityVerified email at kau.edu.sa
Wan Yeon LeeProfessor of Computer Science, Dongduk Women's UniversityVerified email at dongduk.ac.kr
Jong KimProfessor of Computer Science, POSTECHVerified email at postech.ac.kr
Brian J. d'AuriolVerified email at acm.org
Seulbae KimPh.D student, Georgia Institute of TechnologyVerified email at gatech.edu
Seunghoon WooKorea University Computer & Communication Security LabVerified email at korea.ac.kr
Hakjoo OhAssociate Professor, Department of Computer Science and Engineering, Korea UniversityVerified email at korea.ac.kr
Munkhbayar Bat-ErdeneAssociate ProfessorVerified email at must.edu.mn
Canh NgoUniversity of AmsterdamVerified email at uva.nl
Syed Muhammad Khaliq-ur-Rahman...Associate Professor, Mohammad Ali Jinnah University, KarachiVerified email at ieee.org
Bruno SinopoliElectrical and Systems Engineering, Washington University inVerified email at wustl.edu
Tiffany Hyun-Jin KimCarnegie Mellon UniversityVerified email at ece.cmu.edu
Yilin MoAssociate Professor, Department of Automation, Tsinghua UniversityVerified email at tsinghua.edu.cn
Bin ZhuMicrosoft Research AsiaVerified email at microsoft.com
Saewoong Bahk (박세웅)Seoul National University, Electrical and Computer EngineeringVerified email at snu.ac.kr
Euijin ChooUniversity of AlbertaVerified email at ualberta.ca
Hoh Peter InProfessor of Computer Science, Korea UniversityVerified email at korea.ac.kr
Sangki YunFacebookVerified email at fb.com
Follow