Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Adrian PerrigProfessor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab FellowVerified email at inf.ethz.ch
Seunghoon WooAssistant Professor at Korea University Software Security & Privacy LabVerified email at korea.ac.kr
Hyunsang ChoiSK TelecomVerified email at sktelecom.com
Young-Koo LeeKyung Hee UniversityVerified email at khu.ac.kr
Sungyoung LeeComputer Science and Engineering, Kyung Hee UniversityVerified email at oslab.khu.ac.kr
Jehyun LeeTrustwaveVerified email at trustwave.com
Jonghoon KwonNetwork Security Group, ETH Zürich, SwitzerlandVerified email at inf.ethz.ch
Riaz Ahmed ShaikhAssociate Professor, School of Computing Sciences, University of East Anglia, UKVerified email at uea.ac.uk
Wan Yeon LeeProfessor of Computer Science, Dongduk Women's UniversityVerified email at dongduk.ac.kr
Seulbae KimAssistant Professor, Pohang University of Science and Technology (POSTECH)Verified email at postech.ac.kr
Hakjoo OhProfessor, Department of Computer Science and Engineering, Korea UniversityVerified email at korea.ac.kr
Jong KimProfessor of Computer Science, POSTECHVerified email at postech.ac.kr
Brian J. d'AuriolGwangju Institute of Science and Technology, Gwangju, KoreaVerified email at acm.org
Munkhbayar Bat-ErdeneHead of Information Network and Security DepartmentVerified email at must.edu.mn
Syed Muhammad Khaliq-ur-Rahman...Professor, Mohammad Ali Jinnah University, KarachiVerified email at ieee.org
Bruno SinopoliElectrical and Systems Engineering, Washington University inVerified email at wustl.edu
Tiffany Hyun-Jin KimCarnegie Mellon UniversityVerified email at ece.cmu.edu
Yilin MoAssociate Professor, Department of Automation, Tsinghua UniversityVerified email at tsinghua.edu.cn
Canh NgoUniversity of AmsterdamVerified email at uva.nl
Bin ZhuMicrosoft Research AsiaVerified email at microsoft.com
Follow