Get my own profile
Public access
View all14 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Taesoo KimGeorgia Institute of TechnologyVerified email at gatech.edu
- Chengyu SongUC RiversideVerified email at cs.ucr.edu
- Wenke LeeJohn P. Imlay Jr. Chair and Professor of Computer Science at Georgia TechVerified email at cc.gatech.edu
- Sangho LeeResearcher of Microsoft Research RedmondVerified email at microsoft.com
- Byoungyoung LeeSeoul National UniversityVerified email at snu.ac.kr
- Tielei WangGeorgia TechVerified email at gatech.edu
- Simon Pak Ho ChungResearch Scientist, Georgia Institute of TechnologyVerified email at mail.gatech.edu
- Insu YunKAISTVerified email at kaist.ac.kr
- Changwoo MinIgaliaVerified email at igalia.com
- Billy LauResearch Scientist, Georgia Institute of TechnologyVerified email at cc.gatech.edu
- Jaehyuk LeeNVIDIAVerified email at nvidia.com
- Dongkwan KimKorea Advanced Institute of Science and TechnologyVerified email at kaist.ac.kr
- Yongdae KimProfessor of Electrical Engineering, KAIST, KoreaVerified email at kaist.ac.kr
- Brent ByungHoon KangGraduate School of Information Security, KAIST (Korea Advanced Institute of Science and Technology)Verified email at kaist.ac.kr
- Jinsoo JangChungnam National UniversityVerified email at cnu.ac.kr
- Long LuAssociate Professor of Computer Science, Northeastern UniversityVerified email at northeastern.edu
- Mingeun KimHyundai Motor CompanyVerified email at kaist.ac.kr
- Eunsoo KimKAISTVerified email at kaist.ac.kr
- Alexandra BoldyrevaProfessor, School of Cybersecurity and Privacy, Georgia Institute of TechnologyVerified email at gatech.edu
- Nohyun KwakVerified email at kaist.ac.kr