Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at iu.edu
Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Nan ZhangFacebook Inc.Verified email at indiana.edu
Soteris DemetriouAssociate Professor, Imperial College LondonVerified email at imperial.ac.uk
Xiaoyong Zhou (周小勇)Google, IncVerified email at indiana.edu
Peng WangIndiana University BloomingtonVerified email at indiana.edu
Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Yi ChenAssistant Professor, The University of Hong KongVerified email at hku.hk
Tongxin LiPeking UniversityVerified email at pku.edu.cn
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Luyi XingAssociate Professor of Computer Science, Indiana University BloomingtonVerified email at indiana.edu
Wei YouRenmin University of ChinaVerified email at ruc.edu.cn
Kan YuanIndiana University Computer Science DepartmentVerified email at indiana.edu
Heqing HuangAffiliate Professor @ UCAS, Bytedance US AI Lab/GenAI Security, TensorSec, IBM Watson, PANW, FireEye
Muhammad NaveedUniversity of Southern CaliforniaVerified email at usc.edu
Follow
Yeonjoon Lee
Assistant Professor of College of Computing, Hanyang University
Verified email at hanyang.ac.kr - Homepage