Get my own profile
Public access
View all6 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Ji Young WooSoonchunhyang UniversityVerified email at sch.ac.kr
- Huy Kang KimSchool of Cybersecurity, Korea UniversityVerified email at korea.ac.kr
- Young-Seob JeongProfessorVerified email at chungbuk.ac.kr
- Seonghoon JeongSookmyung Women's UniversityVerified email at sookmyung.ac.kr
- Mee Lan HanAssistant Professor, Dept. of AI Cyber Security, Korea University (Sejong)Verified email at korea.ac.kr
- Taekyoung (Ted) KwonSeoul National UniversityVerified email at mmlab.snu.ac.kr
- Hyun-chul KimDept. of Software, Sangmyung University, South KoreaVerified email at smu.ac.kr
- Jaeyun KimSoonchynhyang UniversityVerified email at sch.ac.kr
- Jeffrey SpauldingAdjunct Professor, Canisius CollegeVerified email at canisius.edu
- Marina BlantonUniversity at Buffalo (SUNY)Verified email at buffalo.edu
- Byung Il KwakAssistant Professor, Division of Software, Hallym UniversityVerified email at hallym.ac.kr
- Chen YuanResearch Scientist, Meta Platforms, Inc.Verified email at fb.com
- Jeremy BlackburnAssociate Professor, Binghamton University School of ComputingVerified email at binghamton.edu
- Haewoon KwakLuddy School of Informatics, Computing, and Engineering, Indiana University BloomingtonVerified email at iu.edu
- Hee Chan HanGraduate School of Information Security, Korea UniversityVerified email at korea.ac.kr
- Kim HanaKorea UniversityVerified email at yanolja.com
- Yechan HanSoonchunhyang UniversityVerified email at sch.ac.kr
- Kui RenProfessor and Dean of Computer Science, Zhejiang University, ACM/IEEE FellowVerified email at zju.edu.cn
- Joongheon KimKorea University Professor (Electrical Engineering) | USC PhD (Computer Science)Verified email at korea.ac.kr
- Kim Sang-Hyunsoonchunhyang universityVerified email at schmc.ac.kr