Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Sunghun KimAssociate Professor of Computer Science, The Hong Kong University of Science and TechnologyVerified email at cse.ust.hk
- Song WangAssociate Professor at York University, CanadaVerified email at eecs.yorku.ca
- Lin TanMary J. Elmore New Frontiers Professor, Computer Science, Purdue UniversityVerified email at purdue.edu
- Dongsun KimKorea UniversityVerified email at korea.ac.kr
- Jaewoo SongDepartment of Computer Science and Engineering, The Hong Kong University of Science and TechnologyVerified email at connect.ust.hk
- Sinno Jialin PanThe Chinese University of Hong KongVerified email at cuhk.edu.hk
- Hoh Peter InProfessor of Computer Science, Korea UniversityVerified email at korea.ac.kr
- Taek LeeSun Moon UniversityVerified email at sunmoon.ac.kr
- DongGyun HanRoyal Holloway, University of LondonVerified email at rhul.ac.uk
- Jiho ShinPh.D. student, York UniversityVerified email at yorku.ca
- Junjie WangInstitute of Software, Chinese Academy of SciencesVerified email at iscas.ac.cn
- Mijung KimUNIST, South KoreaVerified email at unist.ac.kr
- Martin SchaefAmazon Web ServicesVerified email at amazon.com
- Pantelis M. Papadopoulos, Ph.DAssociate Professor, Department of Learning, Data Analytics, and Technology, University of TwenteVerified email at utwente.nl
- Andreas PodelskiProfessor of Computer Science, Freiburg UniversityVerified email at informatik.uni-freiburg.de
- Nachiappan NagappanFacebookVerified email at fb.com
- Daniel DietschUniversity FreiburgVerified email at informatik.uni-freiburg.de
- Andreas ZellerFaculty, CISPA Helmholtz Center for Information Security • Professor, Saarland UniversityVerified email at cispa.de
- Tim MenziesNorth Carolina State University, Computer Science, ACM Fellow, IEEE Fellow, ASE FellowVerified email at ncsu.edu