Get my own profile
Public access
View all88 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Thai LeAssistant Professor in Computer Science, Indiana UniversityVerified email at iu.edu
Suhang WangPennsylvania State UniversityVerified email at psu.edu
Kai ShuAssistant Professor of Computer Science, Emory UniversityVerified email at emory.edu
Huan LiuRegents Professor, Arizona State UniversityVerified email at asu.edu
Seog-Chan OhStaff Research at General Motors R&DVerified email at gm.com
Murali ManiUniversity of Michigan-FlintVerified email at umich.edu
Adaku UchenduMIT Lincoln LaboratoryVerified email at ll.mit.edu
Bo LuoProfessor, The University of KansasVerified email at ku.edu
Soundar KumaraAllen, E & Allen, M., Pearce Professor of Industrial Engeering, Professor of Computer Science andVerified email at psu.edu
Byung-Won OnDepartment of Software Convergence Engineering, Kunsan National UniversityVerified email at kunsan.ac.kr
Limeng CuiAmazonVerified email at amazon.com
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Jaewoo Kang (강재우)Dept of Computer Science and Engineering, Korea UniversityVerified email at korea.ac.kr
Kyungsik HanHanyang UniversityVerified email at hanyang.ac.kr
Min-Yen Kan (靳民彦)Associate Professor, National University of SingaporeVerified email at comp.nus.edu.sg
Jongwuk LeeSungkyunkwan University, South KoreaVerified email at skku.edu
Aiping XiongThe Pennsylvania State UniversityVerified email at psu.edu
Sang-Wook KimProfessor of Computer Science and Engineering, Hanyang UniversityVerified email at hanyang.ac.kr
Su YanApple Inc.Verified email at apple.com
HAESEUNG SEOThe Pennsylvania State UniversityVerified email at psu.edu