Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Haneul KoKyung Hee UniversityVerified email at khu.ac.kr
YANGHEE CHOISeoul National University/Hallym UniversityVerified email at snu.ac.kr
Taekyoung (Ted) KwonSeoul National UniversityVerified email at mmlab.snu.ac.kr
Jaewook LeeAssistant Professor in Pukyong National UniversityVerified email at pknu.ac.kr
Dongeun SuhSamsung ElectronicsVerified email at samsung.com
Xuemin (Sherman) ShenUniversity Professor, University of WaterlooVerified email at uwaterloo.ca
Wonjun LeeIEEE Fellow, Professor, School of Cybersecurity, Korea University, SeoulVerified email at korea.ac.kr
Y. KimVerified email at korea.ac.kr
Victor C. M. LeungSMBU / Shenzhen University / The University of British ColumbiaVerified email at ieee.org
Kideok ChoNetwork Defines, Inc.Verified email at mmlab.snu.ac.kr
Jong-Hyouk Lee (이종혁)Dept. of Computer and Information Security, Sejong UniversityVerified email at sejong.ac.kr
Dr. Humphrey RutagemwaResearch Scientist, Communications Research CentreVerified email at ised-isde.gc.ca
György DánProfessor, KTH Royal Institute of TechnologyVerified email at kth.se
Heejun RohInha University, Incheon, Republic of KoreaVerified email at inha.ac.kr
Munyoung LeeSenior Researcher, ETRIVerified email at etri.re.kr
Lin CaiProfessor, University of Victoria, IEEE/EIC/CAE Fellow, NSERC Steacie Fellow, RSC College MemberVerified email at ece.uvic.ca
Ding-Zhu DuProfessor of Computer Science, University of Texas at DallasVerified email at utdallas.edu
Jianping PanUniversity of VictoriaVerified email at uvic.ca
Chung G. KangKorea UniversityVerified email at korea.ac.kr
Amjad AliResearch Fellow at Hamad Bin Khalifa University, Doha, QatarVerified email at korea.ac.kr