Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
John YenProfessor of Data Sciences, The Pennsylvania State UniversityVerified email at psu.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
TAO LINGoogleVerified email at google.com
Awny AlnusairAssociate Professor at Indiana UniversityVerified email at iu.edu
Hong LiuIndiana University KokomoVerified email at iu.edu
Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Hasan CamBest BuyVerified email at bestbuy.com
Bo ChenAssociate Professor of Computer Science, Michigan Technological UniversityVerified email at mtu.edu
Sheikh Rabiul IslamUniversity of HartfordVerified email at hartford.edu
Christopher GarneauU.S. Army DEVCOM Analysis CenterVerified email at army.mil
Atif AlamriProfessor, King Saud UniversityVerified email at ksu.edu.sa
Majdi RawashdehPrincess Sumaya University for TechnologyVerified email at psut.edu.jo
M. Shamim HossainProfessor, Highly Cited Researcher, King Saud UniversityVerified email at ksu.edu.sa
Mingyi ZhaoNotionVerified email at makenotion.com
Jun YaoUniversity of Texas at ArlingtonVerified email at mavs.uta.edu
Neela SawantResearch Scientist at Amazon.com (Past: Yahoo! R&D India, Penn State University, IIT Bombay)Verified email at amazon.com
Nicklaus A. GiacobeCollege of Information Sciences and Technology,The Pennsylvania State UniversityVerified email at ist.psu.edu
Alex MartakisGraduate Student, University of California - San DiegoVerified email at ucsd.edu
Jun XuAssistant Professor at The University of UtahVerified email at cs.utah.edu
J.B. (Joo Baek) KimUniversity of TampaVerified email at ut.edu