Get my own profile
Public access
View all75 articles
37 articles
available
not available
Based on funding mandates
Co-authors
XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at iu.edu
Shengzhi ZhangBoston University MET CollegeVerified email at bu.edu
Guozhu MengAssociate Professor with Chinese Academy of SciencesVerified email at iie.ac.cn
Ruigang LiangInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Yue ZhaoUniversity of Chinese Academy of SciencesVerified email at iie.ac.cn
Yeonjoon LeeAssistant Professor of College of Computing, Hanyang UniversityVerified email at hanyang.ac.kr
Nan ZhangFacebook Inc.Verified email at indiana.edu
Xuejing YuanSchool of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876Verified email at bupt.edu.cn
Peizhuo LvInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Haixu TangProfessor, Indiana UniversityVerified email at indiana.edu
Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Yuxuan ChenShandong UniversityVerified email at sdu.edu.cn
Yi ChenAssistant Professor, The University of Hong KongVerified email at hku.hk
Jinwen HeInstitute of Information Engineering,Chinese Academy of SciencesVerified email at iie.ac.cn
Jin Li 李进Professor @Guangzhou UniversityVerified email at gzhu.edu.cn
Peiyuan ZongInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Tongxin LiPeking UniversityVerified email at pku.edu.cn
Yunhui LongUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Xiaojing LiaoIndiana University BloomingtonVerified email at indiana.edu