Get my own profile
Public access
View all40 articles
9 articles
available
not available
Based on funding mandates
Co-authors
- Guohong CaoProfessor, the Pennsylvania State UniversityVerified email at cse.psu.edu
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
- Sanjeev SetiaDepartment of Computer Science, George Mason UniversityVerified email at gmu.edu
- Dinghao WuPennsylvania State UniversityVerified email at psu.edu
- Yoon-Chan JhiDirector of Software Security in Technology Research at Samsung SDS, Seoul, KoreaVerified email at samsung.com
- Thomas La PortaPenn State UniversityVerified email at cse.psu.edu
- Daojing HeSchool of Computer Science and Engineering, South China University of TechnologyVerified email at scut.edu.cn
- Yu ChenProfessor at Dept. of Electrical & Computer Engr, Binghamton University, SUNYVerified email at binghamton.edu
- Heng XuProfessor of Management, Warrington College of Business, University of FloridaVerified email at ufl.edu
- Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
- Peng NingGoogleVerified email at google.com
- Wensheng ZhangAssociate Professor of Computer Science, Iowa State UniversityVerified email at iastate.edu
- Qinghua LiProfessor, University of ArkansasVerified email at uark.edu
- Wei XUPalo Alto NetworksVerified email at paloaltonetworks.com
- Yilu ZhouAssociate Professor of Business, Fordham UniversityVerified email at fordham.edu
- Alem H Fitwi (PhD)Meta(Facebook)Verified email at fb.com
- Lannan Lisa LuoDepartment of Computer Science, George Mason UniversityVerified email at gmu.edu
- Jiang MingTulane UniversityVerified email at tulane.edu
- Jiqiang LiuProfessor of Computer ScienceVerified email at bjtu.edu.cn