Get my own profile
Public access
View all0 articles
1 article
available
not available
Based on funding mandates
Co-authors
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu
Xiaoqi JiaInstitute of Information Engineering, CASVerified email at iie.ac.cn
Dinghao WuPennsylvania State UniversityVerified email at psu.edu
Kamal TahaKhalifa University, UAEVerified email at ku.ac.ae
A. Taufiq AsyhariAssociate Professor, Birmingham City University, UKVerified email at ieee.org
Deguang KongGoogleVerified email at google.com
Chan Yeob YeunKhalfia UniversityVerified email at kustar.ac.ae
George KesidisProfessor of Computer Science and Engineering, Pennsylvania State University; Professor of Electrical Engineering, Pennsylvania Verified email at engr.psu.edu
XI XIONGComputer Science and Engineering, Pennsylvania State UniversityVerified email at cse.psu.edu
Shengzhi ZhangBoston University MET CollegeVerified email at bu.edu
Kun BaiAmazonVerified email at amazon.com
Qijun GuTexas State UniversityVerified email at txstate.edu
kichang kim인하대 정보통신공학과 교수Verified email at inha.ac.kr
Follow

Yoon-Chan Jhi
Director of Software Security in Samsung SDS Research Center, Seoul, Korea
Verified email at samsung.com