Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Anand SivasubramaniamDistinguished Professor of Computer Science & Engineering, Penn State UniversityVerified email at cse.psu.edu
- Di WangMicrosoftVerified email at microsoft.com
- Bhuvan UrgaonkarProfessor, Penn StateVerified email at cse.psu.edu
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- Yulong ZhangGoogleVerified email at google.com
- Hui XueUniversity of Illinois at Urbana ChampaignVerified email at uiuc.edu
- Hosam K. FathyProfessor of Mechanical Engineering, University of MarylandVerified email at umd.edu
- Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
- Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu
- Sriram GovindanMicrosoft CorporationVerified email at microsoft.com
- Aman KansalMicrosoft ResearchVerified email at microsoft.com
- Dinghao WuPennsylvania State UniversityVerified email at psu.edu
- Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
- Min ZhengThe Chinese University of Hong KongVerified email at cse.cuhk.edu.hk
- Heqing HuangAffiliate Professor UCAS;Watson and AI Lab