Get my own profile
Public access
View all53 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Jiang MingUniversity of Texas at ArlingtonVerified email at uta.edu
Shuai WangHKUSTVerified email at cse.ust.hk
Pei WangGoogleVerified email at google.com
Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu
Yufei JiangMicrosoft, Ph.D. from Pennsylvania State UniversityVerified email at microsoft.com
Xiao LiuResearch Scientist @ FacebookVerified email at fb.com
John YenProfessor of Data Sciences, The Pennsylvania State UniversityVerified email at psu.edu
Dongpeng XuUniversity of New HampshireVerified email at unh.edu
Prasenjit MitraVisiting Professor, L3S Research Center, Hannover, Germany & Professor of IST, Penn State UniversityVerified email at psu.edu
Heqing HuangIBM Thomas J. Watson Research CenterVerified email at us.ibm.com
Cornelia CarageaUniversity of Illinois at ChicagoVerified email at uic.edu
Lannan (Lisa) LuoDepartment of Computer Science and Engineering, University of South CarolinaVerified email at cse.sc.edu
Li WangThe Pennsylvania State UniversityVerified email at psu.edu
Shaz QadeerResearch Scientist, FacebookVerified email at fb.com
Lingwei ChenWright State UniversityVerified email at wright.edu
Yoon-Chan JhiDirector of Software Security in Samsung SDS Research Center, Seoul, KoreaVerified email at samsung.com
Jun WangPalo Alto Networks, Inc.Verified email at paloaltonetworks.com
Xiaoting LiPennsylvania State UniversityVerified email at psu.edu
Andrew W. AppelProfessor of Computer Science, Princeton UniversityVerified email at princeton.edu