Get my own profile
Public access
View all22 articles
1 article
available
not available
Based on funding mandates
Co-authors
Dinghao WuPennsylvania State UniversityVerified email at psu.edu
Pei WangGoogleVerified email at google.com
Xiao LiuResearch Scientist @ FacebookVerified email at fb.com
Danfeng ZhangPenn State UniversityVerified email at cse.psu.edu
Yufei JiangMicrosoft, Ph.D. from Pennsylvania State UniversityVerified email at microsoft.com
Jiang MingTulane UniversityVerified email at tulane.edu
Le GuanDepartment of Computer Science at the University of GeorgiaVerified email at cs.uga.edu
Heqing HuangIBM Thomas J. Watson Research CenterVerified email at us.ibm.com
Jun XuAssistant Professor at The University of UtahVerified email at cs.utah.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
xinyu xingNorthwestern UniversityVerified email at northwestern.edu
Jian LiuInstitute of Information Engineering, CASVerified email at iie.ac.cn
Xiapu LuoThe Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk