Get my own profile
Public access
View all14 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Taesoo KimGeorgia Institute of TechnologyVerified email at gatech.edu
Chengyu SongUC RiversideVerified email at cs.ucr.edu
Wenke LeeJohn P. Imlay Jr. Chair and Professor of Computer Science at Georgia TechVerified email at cc.gatech.edu
Sangho LeeResearcher of Microsoft Research RedmondVerified email at microsoft.com
Byoungyoung LeeSeoul National UniversityVerified email at snu.ac.kr
Tielei WangGeorgia TechVerified email at gatech.edu
Simon Pak Ho ChungResearch Scientist, Georgia Institute of TechnologyVerified email at mail.gatech.edu
Insu YunKAISTVerified email at kaist.ac.kr
Changwoo MinIgaliaVerified email at igalia.com
Billy LauResearch Scientist, Georgia Institute of TechnologyVerified email at cc.gatech.edu
Jaehyuk LeeGeorgia Institute of TechnologyVerified email at gatech.edu
Dongkwan KimKorea Advanced Institute of Science and TechnologyVerified email at kaist.ac.kr
Yongdae KimProfessor of Electrical Engineering, KAIST, KoreaVerified email at kaist.ac.kr
Brent ByungHoon KangGraduate School of Information Security, KAIST (Korea Advanced Institute of Science and Technology)Verified email at kaist.ac.kr
Jinsoo JangChungnam National UniversityVerified email at cnu.ac.kr
Long LuAssociate Professor of Computer Science, Northeastern UniversityVerified email at northeastern.edu
Mingeun KimHyundai Motor CompanyVerified email at kaist.ac.kr
Eunsoo KimKAISTVerified email at kaist.ac.kr
Alexandra BoldyrevaProfessor, School of Cybersecurity and Privacy, Georgia Institute of TechnologyVerified email at gatech.edu
Nohyun KwakVerified email at kaist.ac.kr