Get my own profile
Public access
View all69 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- Jiang MingTulane UniversityVerified email at tulane.edu
- Shuai WangThe Hong Kong University of Science and TechnologyVerified email at cse.ust.hk
- Pei WangGoogleVerified email at google.com
- Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu
- Xiao LiuResearch Scientist @ FacebookVerified email at fb.com
- Yufei JiangMicrosoft, Ph.D. from Pennsylvania State UniversityVerified email at microsoft.com
- John YenProfessor of Data Sciences, The Pennsylvania State UniversityVerified email at psu.edu
- Dongpeng XuUniversity of New HampshireVerified email at unh.edu
- Lingwei ChenWright State UniversityVerified email at wright.edu
- Xiaoting LiVisa ResearchVerified email at visa.com
- Lannan Lisa LuoDepartment of Computer Science, George Mason UniversityVerified email at gmu.edu
- Rupesh PrajapatiPennsylvania State UniversityVerified email at psu.edu
- Prasenjit MitraProfessor of IST, Penn State Univ. & Affiliated Prof. L3S Research Ctr., Leibniz University HannoverVerified email at psu.edu
- Li WangFontbonne UniversityVerified email at fontbonne.edu
- Qinkun BaoThe Apache Software Foundation, GoogleVerified email at google.com
- Cornelia CarageaUniversity of Illinois at ChicagoVerified email at uic.edu
- Shaz QadeerSoftware Engineer, MetaVerified email at meta.com
- Danfeng ZhangDuke UniversityVerified email at duke.edu
- Jun WangPalo Alto Networks, Inc.Verified email at paloaltonetworks.com