Get my own profile
Public access
View all15 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- Kang ZhaoLeonard A. Hadley Professor, University of IowaVerified email at uiowa.edu
- C Lee GilesPennsylvania State UniversityVerified email at psu.edu
- Magy Seif El-NasrUniversity of California at Santa CruzVerified email at ucsc.edu
- Baojun QiueBay Inc./Pennsylvania State UniversityVerified email at ebay.com
- Dinghao WuPennsylvania State UniversityVerified email at psu.edu
- Hyun-Woo "Anthony" KimThe Pennsylvania State UniversityVerified email at ist.psu.edu
- Lotfi A. ZadehProfessor Emeritus, EECS, UC BerkeleyVerified email at eecs.berkeley.edu
- Bernard J. (Jim) JansenQatar Computing Research Institute, HBKUVerified email at acm.org
- Shenghuo Zhu (朱胜火)AibeeVerified email at aibee.com
- Linjun YangMicrosoftVerified email at microsoft.com
Follow