Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Anand SivasubramaniamDistinguished Professor of Computer Science & Engineering, Penn State UniversityVerified email at cse.psu.edu
Di WangMicrosoftVerified email at microsoft.com
Bhuvan UrgaonkarProfessor, Penn StateVerified email at cse.psu.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Yulong ZhangGoogleVerified email at google.com
Hui XueUniversity of Illinois at Urbana ChampaignVerified email at uiuc.edu
Hosam K. FathyProfessor of Mechanical Engineering, University of MarylandVerified email at umd.edu
Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Sencun ZhuPennsylvania State UniversityVerified email at psu.edu
Sriram GovindanMicrosoft CorporationVerified email at microsoft.com
Aman KansalMicrosoft ResearchVerified email at microsoft.com
Dinghao WuPennsylvania State UniversityVerified email at psu.edu
Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Min ZhengThe Chinese University of Hong KongVerified email at cse.cuhk.edu.hk
Heqing HuangAffiliate Professor @ UCAS, Bytedance US AI Lab/GenAI Security, TensorSec, IBM Watson, PANW, FireEye