Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Haneul KoKyung Hee UniversityVerified email at khu.ac.kr
YANGHEE CHOISeoul National University/Hallym UniversityVerified email at snu.ac.kr
Taekyoung (Ted) KwonSeoul National UniversityVerified email at mmlab.snu.ac.kr
Jaewook LeeAssistant Professor in Pukyong National UniversityVerified email at pknu.ac.kr
Xuemin (Sherman) ShenUniversity Professor, University of WaterlooVerified email at uwaterloo.ca
Dongeun SuhSamsung ElectronicsVerified email at samsung.com
Y. KimVerified email at korea.ac.kr
Wonjun LeeIEEE Fellow, Professor, School of Cybersecurity, Korea University, SeoulVerified email at korea.ac.kr
Kideok ChoNetwork Defines, Inc.Verified email at mmlab.snu.ac.kr
Victor C. M. LeungShenzhen University / The University of British ColumbiaVerified email at ieee.org
Jong-Hyouk Lee (이종혁)Dept. of Computer and Information Security, Sejong UniversityVerified email at sejong.ac.kr
Dr. Humphery RutagemwaResearch Scientist, Communications Research Centre Verified email at crc.gc.ca
György DánProfessor, KTH Royal Institute of TechnologyVerified email at kth.se
Munyoung LeeSenior Researcher, ETRIVerified email at mmlab.snu.ac.kr
Lin CaiProfessor, University of Victoria, IEEE Fellow, NSERC Steacie Fellow, RSC College Member, EIC FellowVerified email at ece.uvic.ca
Ding-Zhu DuProfessor of Computer Science, University of Texas at DallasVerified email at utdallas.edu
Heejun RohDept. of Cyber Security, Graduate School, Korea University, Sejong, Rep. of KoreaVerified email at korea.ac.kr
Jianping PanUniversity of VictoriaVerified email at uvic.ca
Chung G. KangKorea UniversityVerified email at korea.ac.kr
Ji Hoon LeeUniversity of Colorado BoulderVerified email at colorado.edu