Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
YANGHEE CHOISeoul National University/Hallym UniversityVerified email at snu.ac.kr
Haneul KoKorea UniversityVerified email at korea.ac.kr
Taekyoung (Ted) KwonSeoul National UniversityVerified email at mmlab.snu.ac.kr
Xuemin (Sherman) ShenUniversity Professor, University of WaterlooVerified email at uwaterloo.ca
Jaewook LeeETRIVerified email at etri.re.kr
Dongeun SuhSamsung ElectronicsVerified email at samsung.com
Wonjun LeeIEEE Fellow, Professor, School of Cybersecurity, Korea University, SeoulVerified email at korea.ac.kr
Y. KimVerified email at korea.ac.kr
Kideok ChoNetwork Defines, Inc.Verified email at mmlab.snu.ac.kr
Victor C. M. LeungShenzhen University / The University of British ColumbiaVerified email at ieee.org
Jong-Hyouk Lee (이종혁)Dept. of Computer and Information Security, Sejong UniversityVerified email at sejong.ac.kr
Dr. Humphery RutagemwaResearch Scientist, Communications Research Centre Verified email at crc.gc.ca
Lin CaiProfessor, University of Victoria, IEEE Fellow, NSERC Steacie Fellow, RSC College Member, EIC FellowVerified email at ece.uvic.ca
Heejun RohDept. of Cyber Security, Graduate School, Korea University, Sejong, Rep. of KoreaVerified email at korea.ac.kr
Munyoung LeeSenior Researcher, ETRIVerified email at mmlab.snu.ac.kr
György DánProfessor, KTH Royal Institute of TechnologyVerified email at kth.se
Ding-Zhu DuProfessor of Computer Science, University of Texas at DallasVerified email at utdallas.edu
Chung G. KangKorea UniversityVerified email at korea.ac.kr
Jianping PanUniversity of VictoriaVerified email at uvic.ca
Ved P. KafleResearch Manager, National Institute of Information and Communications TechnologyVerified email at nict.go.jp