Get my own profile
Public access
View all58 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Jiang MingTulane UniversityVerified email at tulane.edu
Shuai WangHKUSTVerified email at cse.ust.hk
Pei WangGoogleVerified email at google.com
Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu
Xiao LiuResearch Scientist @ FacebookVerified email at fb.com
Yufei JiangMicrosoft, Ph.D. from Pennsylvania State UniversityVerified email at microsoft.com
John YenProfessor of Data Sciences, The Pennsylvania State UniversityVerified email at psu.edu
Dongpeng XuUniversity of New HampshireVerified email at unh.edu
Xiaoting LiVisa Research; Pennsylvania State UniversityVerified email at psu.edu
Lingwei ChenWright State UniversityVerified email at wright.edu
Prasenjit MitraVisiting Professor, L3S Research Center, Leibniz Universitat Hannover, Germany & Professor of ISTVerified email at psu.edu
Lannan Lisa LuoDepartment of Computer Science, George Mason UniversityVerified email at gmu.edu
Li WangThe Pennsylvania State UniversityVerified email at psu.edu
Heqing HuangIBM Thomas J. Watson Research CenterVerified email at us.ibm.com
Qinkun BaoThe Apache Software Foundation, GoogleVerified email at google.com
Cornelia CarageaUniversity of Illinois at ChicagoVerified email at uic.edu
Shaz QadeerResearch Scientist, FacebookVerified email at fb.com
Rupesh PrajapatiPennsylvania State UniversityVerified email at psu.edu
Jun WangPalo Alto Networks, Inc.Verified email at paloaltonetworks.com