Get my own profile
Public access
View all14 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Taesoo KimGeorgia Institute of TechnologyVerified email at gatech.edu
Chengyu SongUC RiversideVerified email at cs.ucr.edu
Wenke LeeJohn P. Imlay Jr. Chair and Professor of Computer Science at Georgia TechVerified email at cc.gatech.edu
Sangho LeeResearcher of Microsoft Research RedmondVerified email at microsoft.com
Byoungyoung LeeSeoul National University (SNU)Verified email at snu.ac.kr
Tielei WangGeorgia TechVerified email at gatech.edu
Simon Pak Ho ChungResearch Scientist, Georgia Institute of TechnologyVerified email at mail.gatech.edu
Changwoo MinIgaliaVerified email at igalia.com
Insu YunKAISTVerified email at kaist.ac.kr
Billy LauResearch Scientist, Georgia Institute of TechnologyVerified email at cc.gatech.edu
Jaehyuk LeeNVIDIAVerified email at nvidia.com
Dongkwan KimSamsung SDSVerified email at kaist.ac.kr
Yongdae KimProfessor of Electrical Engineering, KAIST, KoreaVerified email at kaist.ac.kr
Brent ByungHoon KangGraduate School of Information Security, KAIST (Korea Advanced Institute of Science and Technology)Verified email at kaist.ac.kr
Jinsoo JangChungnam National UniversityVerified email at cnu.ac.kr
Long LuAssociate Professor of Computer Science, Northeastern UniversityVerified email at northeastern.edu
Mingeun KimHyundai Motor CompanyVerified email at kaist.ac.kr
Eunsoo KimKAISTVerified email at kaist.ac.kr
Mohannad IsmailVirginia TechVerified email at vt.edu
Alexandra BoldyrevaProfessor, School of Cybersecurity and Privacy, Georgia Institute of TechnologyVerified email at gatech.edu