Get my own profile
Public access
View all67 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Thai LeUniversity of MississippiVerified email at olemiss.edu
Suhang WangPennsylvania State UniversityVerified email at psu.edu
Seog-Chan OhStaff Research at General Motors R&DVerified email at gm.com
Murali ManiUniversity of Michigan-FlintVerified email at umich.edu
Kai ShuAssistant Professor of Computer Science, Illinois Institute of TechnologyVerified email at iit.edu
Bo LuoProfessor, The University of KansasVerified email at ku.edu
Huan LiuRegents Professor of CSE, Arizona State UniversityVerified email at asu.edu
Soundar KumaraAllen, E & Allen, M., Pearce Professor of Industrial Engeering, Professor of Computer Science andVerified email at psu.edu
Byung-Won OnDepartment of Software Convergence Engineering, Kunsan National UniversityVerified email at kunsan.ac.kr
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Jaewoo Kang (강재우)Dept of Computer Science and Engineering, Korea UniversityVerified email at korea.ac.kr
Limeng CuiAmazonVerified email at amazon.com
Min-Yen Kan (靳民彦)Associate Professor, National University of SingaporeVerified email at comp.nus.edu.sg
Kyungsik HanHanyang UniversityVerified email at hanyang.ac.kr
Su YanIBM ResearchVerified email at us.ibm.com
Jongwuk LeeSungkyunkwan University, KoreaVerified email at skku.edu
Sang-Wook KimProfessor of Computer Science and Engineering, Hanyang UniversityVerified email at hanyang.ac.kr
Prasenjit MitraVisiting Professor, L3S Research Center, Leibniz Universitat Hannover, Germany & Professor of ISTVerified email at psu.edu
Wang-Chien LeePennsylvania State UniversityVerified email at cse.psu.edu
Deepak MahudeswaranVerified email at asu.edu