Get my own profile
Public access
View all28 articles
8 articles
available
not available
Based on funding mandates
Co-authors
- Ping ChenPenn State UniversityVerified email at ist.psu.edu
- Zhi XinPh.D. of Computer Science, Nanjing UniversityVerified email at nju.edu.cn
- Jun XuAssistant Professor at The University of UtahVerified email at cs.utah.edu
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- Dongliang MuHuazhong University of Science and TechnologyVerified email at hust.edu.cn
- xinyu xingNorthwestern UniversityVerified email at northwestern.edu
- Zhiqiang LinDistinguished Professor of Engineering, The Ohio State UniversityVerified email at cse.ohio-state.edu
- Dongyan XuSamuel Conte Professor of Computer Science and Director of CERIAS, Purdue UniversityVerified email at purdue.edu
- Zhilong WangThe Pennsylvania State UniversityVerified email at psu.edu
- Dinghao WuPennsylvania State UniversityVerified email at psu.edu
- Alejandro CuevasPh.D. Student, Carnegie Mellon UniversityVerified email at cs.cmu.edu
- Jiang MingTulane UniversityVerified email at tulane.edu
- Gang WangAssociate Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Xuhua DingSingapore Management UniversityVerified email at smu.edu.sg
- Jiannong CaoIEEE Fellow; Chair Professor, Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
- Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu