Get my own profile
Public access
View all34 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Dinghao WuPennsylvania State UniversityVerified email at psu.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Dongpeng XuUniversity of New HampshireVerified email at unh.edu
Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu
Yufei JiangMicrosoft, Ph.D. from Pennsylvania State UniversityVerified email at microsoft.com
Jun WangPalo Alto Networks, Inc.Verified email at paloaltonetworks.com
Bing MaoComputer Science, Nanjing UniversityVerified email at nju.edu.cn
Zhi XinPh.D. of Computer Science, Nanjing UniversityVerified email at nju.edu.cn
Matthew WrightProfessor and Chair of Cybersecurity, Rochester Institute of TechnologyVerified email at rit.edu
Lei ZhaoSchool of Cyber Science and Engineering, Wuhan UniversityVerified email at whu.edu.cn
Armon BartonAssistant Professor, Naval Postgraduate SchoolVerified email at nps.edu
Mohsen ImaniAnomali Inc.Verified email at mavs.uta.edu
Shuai WangHKUSTVerified email at cse.ust.hk
Pei WangGoogleVerified email at google.com
Hui XuComputer Science, Fudan UniversityVerified email at fudan.edu.cn
Michael R. LyuProfessor of Computer Science & Engineering, The Chinese University of Hong KongVerified email at cse.cuhk.edu.hk
Le GuanDepartment of Computer Science at the University of GeorgiaVerified email at cs.uga.edu
Heng YinProfessor of Computer Science, UC RiversideVerified email at cs.ucr.edu
Mohsin JunaidUT ArlingtonVerified email at mavs.uta.edu
Ting ChenProfessor, UESTCVerified email at uestc.edu.cn