Get my own profile
Public access
View all29 articles
9 articles
available
not available
Based on funding mandates
Co-authors
Ping ChenPenn State UniversityVerified email at ist.psu.edu
Zhi XinPh.D. of Computer Science, Nanjing UniversityVerified email at nju.edu.cn
Jun XuAssistant Professor at The University of UtahVerified email at cs.utah.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Dongliang MuHuazhong University of Science and TechnologyVerified email at hust.edu.cn
xinyu xingNorthwestern UniversityVerified email at northwestern.edu
Zhiqiang LinDistinguished Professor of Engineering, The Ohio State UniversityVerified email at cse.ohio-state.edu
Dongyan XuSamuel Conte Professor of Computer Science and Director of CERIAS, Purdue UniversityVerified email at purdue.edu
Zhilong WangThe Pennsylvania State UniversityVerified email at psu.edu
Alejandro CuevasPh.D. Student, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Dinghao WuPennsylvania State UniversityVerified email at psu.edu
Jiang MingTulane UniversityVerified email at tulane.edu
Gang WangAssociate Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Xuhua DingSingapore Management UniversityVerified email at smu.edu.sg
Jiannong CaoIEEE Fellow; Chair Professor, Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Sencun ZhuPennsylvania State UniversityVerified email at psu.edu