Crea il mio profilo
Accesso pubblico
Visualizza tutto6 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Huy Kang KimSchool of Cybersecurity, Korea UniversityEmail verificata su korea.ac.kr
- Ji Young WooSoonchunhyang UniversityEmail verificata su sch.ac.kr
- Young-Seob JeongProfessorEmail verificata su chungbuk.ac.kr
- Seonghoon JeongPostdoctoral Researcher, BK21FOUR R&E Center for Cybersecurity, Korea UniversityEmail verificata su korea.ac.kr
- Mee Lan HanAssistant Professor, Dept. of AI Cyber Security, Korea University SejongEmail verificata su korea.ac.kr
- Taekyoung (Ted) KwonSeoul National UniversityEmail verificata su mmlab.snu.ac.kr
- Hyun-chul KimDept. of Software, Sangmyung University, South KoreaEmail verificata su smu.ac.kr
- Jeffrey SpauldingAdjunct Professor, Canisius CollegeEmail verificata su canisius.edu
- Byung Il KwakAssistant Professor, Division of Software, Hallym UniversityEmail verificata su hallym.ac.kr
- Marina BlantonUniversity at Buffalo (SUNY)Email verificata su buffalo.edu
- Jeremy BlackburnAssociate Professor, Computer Science, Binghamton UniversityEmail verificata su binghamton.edu
- Haewoon KwakLuddy School of Informatics, Computing, and Engineering, Indiana University BloomingtonEmail verificata su iu.edu
- Chen YuanResearch Scientist, Meta Platforms, Inc.Email verificata su fb.com
- Hee Chan HanGraduate School of Information Security, Korea UniversityEmail verificata su korea.ac.kr
- Kim HanaKorea UniversityEmail verificata su yanolja.com
- Kui RenProfessor and Dean of Computer Science, Zhejiang University, ACM/IEEE FellowEmail verificata su zju.edu.cn
- Joongheon KimKorea University Professor (Electrical Engineering) | USC PhD (Computer Science)Email verificata su korea.ac.kr
- Kim Sang-Hyunsoonchunhyang universityEmail verificata su schmc.ac.kr
- Sunoh ChoiAssociate Professor, Jeonbuk National UniversityEmail verificata su jbnu.ac.kr
- Yechan HanSoonchunhyang UniversityEmail verificata su sch.ac.kr