Get my own profile
Public access
View all32 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Seog-Chan OhStaff Research at General Motors R&DVerified email at gm.com
Murali ManiUniversity of Michigan-FlintVerified email at umich.edu
Bo LuoProfessor, The University of KansasVerified email at ku.edu
Byung-Won OnDepartment of Software Convergence Engineering, Kunsan National UniversityVerified email at kunsan.ac.kr
Soundar KumaraAllen, E & Allen, M., Pearce Professor of Industrial Engeering, Professor of Computer Science andVerified email at psu.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Jaewoo Kang (강재우)Dept of Computer Science and Engineering, Korea UniversityVerified email at korea.ac.kr
Suhang WangPennsylvania State UniversityVerified email at psu.edu
Min-Yen Kan (靳民彦)Associate Professor, National University of SingaporeVerified email at comp.nus.edu.sg
Huan LiuProfessor of Computer Science and Engineering, Arizona State UniversityVerified email at asu.edu
Kai ShuAssistant Professor of Computer Science, Illinois Institute of TechnologyVerified email at iit.edu
Prasenjit MitraProfessor of Information Sciences and Technology, The Pennsylvania State UniversityVerified email at psu.edu
Su YanIBM ResearchVerified email at us.ibm.com
Sang-Wook KimProfessor of Computer Science and Engineering, Hanyang UniversityVerified email at hanyang.ac.kr
Kyungsik HanAjou UniversityVerified email at ajou.ac.kr
Fengjun LiUniversity of KansasVerified email at ku.edu
Wang-Chien LeePennsylvania State UniversityVerified email at cse.psu.edu
Jongwuk LeeSungkyunkwan University, KoreaVerified email at skku.edu
Thai LePennsylvania State UniversityVerified email at psu.edu
Makoto MURATAKeio UniversityVerified email at asahi-net.or.jp
Dongwon Lee
Associate Professor, The Pennsylvania State University
Verified email at psu.edu - Homepage