Get my own profile
Public access
View all53 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Murali ManiUniversity of Michigan-FlintVerified email at umich.edu
Seog-Chan OhStaff Research at General Motors R&DVerified email at gm.com
Suhang WangPennsylvania State UniversityVerified email at psu.edu
Kai ShuAssistant Professor of Computer Science, Illinois Institute of TechnologyVerified email at iit.edu
Bo LuoProfessor, The University of KansasVerified email at ku.edu
Huan LiuProfessor of Computer Science and Engineering, Arizona State UniversityVerified email at asu.edu
Thai LeThe University of MississippiVerified email at olemiss.edu
Soundar KumaraAllen, E & Allen, M., Pearce Professor of Industrial Engeering, Professor of Computer Science andVerified email at psu.edu
Byung-Won OnDepartment of Software Convergence Engineering, Kunsan National UniversityVerified email at kunsan.ac.kr
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Jaewoo Kang (강재우)Dept of Computer Science and Engineering, Korea UniversityVerified email at korea.ac.kr
Min-Yen Kan (靳民彦)Associate Professor, National University of SingaporeVerified email at comp.nus.edu.sg
Limeng CuiAmazonVerified email at amazon.com
Kyungsik HanHanyang UniversityVerified email at hanyang.ac.kr
Su YanIBM ResearchVerified email at us.ibm.com
Jongwuk LeeSungkyunkwan University, KoreaVerified email at skku.edu
Prasenjit MitraVisiting Professor, L3S Research Center, Hannover, Germany & Professor of IST, Penn State UniversityVerified email at psu.edu
Sang-Wook KimProfessor of Computer Science and Engineering, Hanyang UniversityVerified email at hanyang.ac.kr
Wang-Chien LeePennsylvania State UniversityVerified email at cse.psu.edu
Deepak MahudeswaranArizona State UniversityVerified email at asu.edu