Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu
- Xiaoqi JiaInstitute of Information Engineering, CASVerified email at iie.ac.cn
- Dinghao WuPennsylvania State UniversityVerified email at psu.edu
- Kamal TahaKhalifa University, UAEVerified email at ku.ac.ae
- A. Taufiq AsyhariProfessor, Monash UniversityVerified email at monash.edu
- Paul D YooDy Director, Data Analytics Institute, Birkbeck College, University of London, United KingdomVerified email at ieee.org
- Chan Yeob YeunKhalfia UniversityVerified email at kustar.ac.ae
- Deguang KongGoogleVerified email at google.com
- George KesidisProfessor of Computer Science and Engineering, Pennsylvania State University; Professor of Electrical Engineering, Pennsylvania Verified email at engr.psu.edu
- XI XIONGComputer Science and Engineering, Pennsylvania State UniversityVerified email at cse.psu.edu
- Shengzhi ZhangBoston University MET CollegeVerified email at bu.edu
- Kun BaiAmazonVerified email at amazon.com
- Qijun GuTexas State UniversityVerified email at txstate.edu
- kichang kim인하대 정보통신공학과 교수Verified email at inha.ac.kr
Follow
Yoon-Chan Jhi
Director of Software Security in Technology Research at Samsung SDS, Seoul, Korea
Verified email at samsung.com