Get my own profile
Public access
View all113 articles
26 articles
available
not available
Based on funding mandates
Co-authors
Sencun ZhuPennsylvania State UniversityVerified email at psu.edu
Dinghao WuPennsylvania State UniversityVerified email at psu.edu
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
John YenProfessor of Data Sciences, The Pennsylvania State UniversityVerified email at psu.edu
Bo LuoProfessor, The University of KansasVerified email at ku.edu
Minghui ZhuProfessor, Electrical Engineering and Computer Science, Pennsylvania State UniversityVerified email at psu.edu
Yoon-Chan JhiDirector of Software Security in Technology Research at Samsung SDS, Seoul, KoreaVerified email at samsung.com
Jun XuAssistant Professor at The University of UtahVerified email at cs.utah.edu
Fengjun LiUniversity of KansasVerified email at ku.edu
Xiaoqi JiaInstitute of Information Engineering, CASVerified email at iie.ac.cn
Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Shengzhi ZhangBoston University MET CollegeVerified email at bu.edu
xinyu xingNorthwestern UniversityVerified email at northwestern.edu
Dongwon LeeProfessor, The Pennsylvania State UniversityVerified email at psu.edu
Jiang MingTulane UniversityVerified email at tulane.edu
Ping ChenPenn State UniversityVerified email at ist.psu.edu
Chao-Hsien Chu 朱昭贤Professor of Information Sciences and Technology, Pennsylvania State UniversityVerified email at ist.psu.edu
Chen ZhongThe University of TampaVerified email at ut.edu
Wang-Chien LeePennsylvania State UniversityVerified email at cse.psu.edu
Mingyi ZhaoNotionVerified email at makenotion.com
Follow
Peng Liu
Raymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State University
Verified email at ist.psu.edu - Homepage