Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Junbeom HurKorea UniversityVerified email at isslab.korea.ac.kr
Dongyoung KooHansung UniversityVerified email at nslab.kaist.ac.kr
Taehun KimSchool of Cybersecurity, Korea UniversityVerified email at korea.ac.kr
Hyunsoo YoonProfessor of Computer Science, KAISTVerified email at kaist.ac.kr
kwangjo kimProfessor, Computer Science Department, KAISTVerified email at kaist.ac.kr
Fayozbek RustamovSejong University, South KoreaVerified email at sju.ac.kr
Seokmin LeeSchool of Cybersecurity, Korea UniversityVerified email at korea.ac.kr
Cheolsoo ParkAssociate Professor, Kwangwoon UniversityVerified email at kw.ac.kr
Ki-Woong ParkSejong UniversityVerified email at sejong.ac.kr
Woomin LeeSchool of Cybersecurity, Korea UniversityVerified email at korea.ac.kr
Youngmin KimSchool of Electronic and Electrical Engineering, Hongik University, Seoul, KoreaVerified email at hongik.ac.kr
Hoyoung YuVerified email at q-semi.com
Hyungjune ShinKorea UniversityVerified email at isslab.korea.ac.kr
Seunghee ShinState University of New York at BinghamtonVerified email at binghamton.edu
Seungwoo HanTokyo University of Agriculture and TechnologyVerified email at sip.tuat.ac.jp
Suwhan BaekPosco Holdings AI R&D LaboratoriesVerified email at posco-inc.com
Hyunwoo J. KimKorea UniversityVerified email at korea.ac.kr
C. HahnSeoul National University of Science and TechnologyVerified email at seoultech.ac.kr
Taehyun KimIndependent
Follow![Youngjoo Shin](https://usercontent.cljtscd.com/citations?view_op=view_photo&user=Db9Vqw4AAAAJ&citpid=14)