Get my own profile
Public access
View all85 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Thai LeAssistant Professor in Computer Science, Indiana UniversityVerified email at iu.edu
- Suhang WangPennsylvania State UniversityVerified email at psu.edu
- Kai ShuAssistant Professor of Computer Science, Emory UniversityVerified email at emory.edu
- Huan LiuRegents Professor, Arizona State UniversityVerified email at asu.edu
- Seog-Chan OhStaff Research at General Motors R&DVerified email at gm.com
- Murali ManiUniversity of Michigan-FlintVerified email at umich.edu
- Bo LuoProfessor, The University of KansasVerified email at ku.edu
- Adaku UchenduMIT Lincoln LaboratoryVerified email at ll.mit.edu
- Soundar KumaraAllen, E & Allen, M., Pearce Professor of Industrial Engeering, Professor of Computer Science andVerified email at psu.edu
- Byung-Won OnDepartment of Software Convergence Engineering, Kunsan National UniversityVerified email at kunsan.ac.kr
- Limeng CuiAmazonVerified email at amazon.com
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- Jaewoo Kang (강재우)Dept of Computer Science and Engineering, Korea UniversityVerified email at korea.ac.kr
- Kyungsik HanHanyang UniversityVerified email at hanyang.ac.kr
- Min-Yen Kan (靳民彦)Associate Professor, National University of SingaporeVerified email at comp.nus.edu.sg
- Jongwuk LeeSungkyunkwan University, South KoreaVerified email at skku.edu
- Aiping XiongThe Pennsylvania State UniversityVerified email at psu.edu
- Su YanApple Inc.Verified email at apple.com
- Sang-Wook KimProfessor of Computer Science and Engineering, Hanyang UniversityVerified email at hanyang.ac.kr
- HAESEUNG SEOThe Pennsylvania State UniversityVerified email at psu.edu