Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Sencun ZhuPennsylvania State UniversityVerified email at psu.edu
Xiaoqi JiaInstitute of Information Engineering, CASVerified email at iie.ac.cn
Dinghao WuPennsylvania State UniversityVerified email at psu.edu
Kamal TahaKhalifa University, UAEVerified email at ku.ac.ae
A. Taufiq AsyhariProfessor, Monash UniversityVerified email at monash.edu
Paul D YooDy Director, Data Science and AI institute (BIDA+), University of London, United KingdomVerified email at ieee.org
Chan Yeob YeunKhalfia UniversityVerified email at kustar.ac.ae
Deguang KongGoogleVerified email at google.com
George KesidisProfessor of Computer Science and Engineering, Pennsylvania State University; Professor of Electrical Engineering, Pennsylvania Verified email at engr.psu.edu
XI XIONGComputer Science and Engineering, Pennsylvania State UniversityVerified email at cse.psu.edu
Shengzhi ZhangBoston University MET CollegeVerified email at bu.edu
Kun BaiAmazonVerified email at amazon.com
Qijun GuTexas State UniversityVerified email at txstate.edu
kichang kim인하대 정보통신공학과 교수Verified email at inha.ac.kr
Seokhyeon Moon (Mun)Technology Research, Samsung SDSVerified email at samsung.com
Jiseong BakLABRADOR LABS Inc.Verified email at labradorlabs.ai
Hakjoo OhProfessor, Department of Computer Science and Engineering, Korea UniversityVerified email at korea.ac.kr
Follow

Yoon-Chan Jhi
Director of Software Security in Technology Research at Samsung SDS, Seoul, Korea
Verified email at samsung.com