Get my own profile
Public access
View all67 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Jiang MingTulane UniversityVerified email at tulane.edu
Shuai WangThe Hong Kong University of Science and TechnologyVerified email at cse.ust.hk
Pei WangGoogleVerified email at google.com
Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu
Xiao LiuResearch Scientist @ FacebookVerified email at fb.com
Yufei JiangMicrosoft, Ph.D. from Pennsylvania State UniversityVerified email at microsoft.com
John YenProfessor of Data Sciences, The Pennsylvania State UniversityVerified email at psu.edu
Dongpeng XuUniversity of New HampshireVerified email at unh.edu
Lingwei ChenWright State UniversityVerified email at wright.edu
Xiaoting LiVisa ResearchVerified email at visa.com
Lannan Lisa LuoDepartment of Computer Science, George Mason UniversityVerified email at gmu.edu
Prasenjit MitraProfessor of IST, Penn State Univ. & Affiliated Prof. L3S Research Ctr., Leibniz University HannoverVerified email at psu.edu
Rupesh PrajapatiPennsylvania State UniversityVerified email at psu.edu
Li WangFontbonne UniversityVerified email at fontbonne.edu
Qinkun BaoThe Apache Software Foundation, GoogleVerified email at google.com
Cornelia CarageaUniversity of Illinois at ChicagoVerified email at uic.edu
Shaz QadeerSoftware Engineer, MetaVerified email at meta.com
Jun WangPalo Alto Networks, Inc.Verified email at paloaltonetworks.com
Danfeng ZhangDuke UniversityVerified email at duke.edu