Get my own profile
Public access
View all18 articles
1 article
available
not available
Based on funding mandates
Co-authors
Seunghyun YoonAssistant Professor, Korea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
Dan Dongseong KIMDeputy Director, UQ Cybersecurity; Associate Professor, The University of QueenslandVerified email at uq.edu.au
Jin-Hee ChoComputer Science Department, Virginia TechVerified email at vt.edu
Terrence J MooreUS Army Research LaboratoryVerified email at army.mil
Kyung-Joon ParkProfessor, DGISTVerified email at dgist.ac.kr
Wooyeol ChoiChosun UniversityVerified email at chosun.ac.kr
Ryangsoo KIMSenior Researcher, Electronics and Telecommunications Research InstituteVerified email at etri.re.kr
Yonggang KimComputer Science and Engineering, Kongju National UniversityVerified email at kongju.ac.kr
Jargalsaikhan NarantuyaKakaoenterpriseVerified email at kakaoenterprise.com
Eun-Chan ParkDongguk UniversityVerified email at dongguk.edu
Sunghwan KimSamsung Research, Samsung ElectronicsVerified email at samsung.com
Yohan KimDongseo UniversityVerified email at dongseo.ac.kr
Taewoon KimPusan National UniversityVerified email at pusan.ac.kr