Get my own profile
Public access
View all66 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Thai LeUniversity of MississippiVerified email at olemiss.edu
Suhang WangPennsylvania State UniversityVerified email at psu.edu
Kai ShuAssistant Professor of Computer Science, Illinois Institute of TechnologyVerified email at iit.edu
Seog-Chan OhStaff Research at General Motors R&DVerified email at gm.com
Murali ManiUniversity of Michigan-FlintVerified email at umich.edu
Huan LiuRegents Professor, Arizona State UniversityVerified email at asu.edu
Bo LuoProfessor, The University of KansasVerified email at ku.edu
Soundar KumaraAllen, E & Allen, M., Pearce Professor of Industrial Engeering, Professor of Computer Science andVerified email at psu.edu
Byung-Won OnDepartment of Software Convergence Engineering, Kunsan National UniversityVerified email at kunsan.ac.kr
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Jaewoo Kang (강재우)Dept of Computer Science and Engineering, Korea UniversityVerified email at korea.ac.kr
Limeng CuiAmazonVerified email at amazon.com
Min-Yen Kan (靳民彦)Associate Professor, National University of SingaporeVerified email at comp.nus.edu.sg
Kyungsik HanHanyang UniversityVerified email at hanyang.ac.kr
Jongwuk LeeSungkyunkwan University, KoreaVerified email at skku.edu
Su YanIBM ResearchVerified email at us.ibm.com
Sang-Wook KimProfessor of Computer Science and Engineering, Hanyang UniversityVerified email at hanyang.ac.kr
Prasenjit MitraVisiting Professor, L3S Research Ctr., Leibniz Universitat Hannover & Prof. of IST, Penn State Univ.Verified email at psu.edu
Wang-Chien LeePennsylvania State UniversityVerified email at cse.psu.edu
Jin Yea JangKorea Electronics Technology InstituteVerified email at snu.ac.kr