Get my own profile
Co-authors
Adrian PerrigProfessor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab FellowVerified email at inf.ethz.ch
Hyunsang ChoiSK TelecomVerified email at sktelecom.com
Young-Koo LeeKyung Hee UniversityVerified email at khu.ac.kr
Sungyoung LeeComputer Science and Engineering, Kyung Hee UniversityVerified email at oslab.khu.ac.kr
Jonghoon KwonNetwork Security Group, ETH Zürich, SwitzerlandVerified email at inf.ethz.ch
Seunghoon WooKorea University Software Security & Privacy LabVerified email at korea.ac.kr
Riaz Ahmed ShaikhAssociate Professor, School of Computing Sciences, University of East Anglia, UKVerified email at uea.ac.uk
Wan Yeon LeeProfessor of Computer Science, Dongduk Women's UniversityVerified email at dongduk.ac.kr
Seulbae KimPh.D student, Georgia Institute of TechnologyVerified email at gatech.edu
Jong KimProfessor of Computer Science, POSTECHVerified email at postech.ac.kr
Hakjoo OhAssociate Professor, Department of Computer Science and Engineering, Korea UniversityVerified email at korea.ac.kr
Brian J. d'AuriolGwangju Institute of Science and Technology, Gwangju, KoreaVerified email at acm.org
Munkhbayar Bat-ErdeneHead of Information Network and Security DepartmentVerified email at must.edu.mn
Syed Muhammad Khaliq-ur-Rahman...Associate Professor, Mohammad Ali Jinnah University, KarachiVerified email at ieee.org
Canh NgoUniversity of AmsterdamVerified email at uva.nl
Bruno SinopoliElectrical and Systems Engineering, Washington University inVerified email at wustl.edu
Tiffany Hyun-Jin KimCarnegie Mellon UniversityVerified email at ece.cmu.edu
Yilin MoAssociate Professor, Department of Automation, Tsinghua UniversityVerified email at tsinghua.edu.cn
Bin ZhuMicrosoft Research AsiaVerified email at microsoft.com
Saewoong Bahk (박세웅)Seoul National University, Electrical and Computer EngineeringVerified email at snu.ac.kr
Follow