Get my own profile
Public access
View all41 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Dinghao WuPennsylvania State UniversityVerified email at psu.edu
- Dongpeng XuUniversity of New HampshireVerified email at unh.edu
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- Sencun ZhuPennsylvania State UniversityVerified email at psu.edu
- Yufei JiangMicrosoft, Ph.D. from Pennsylvania State UniversityVerified email at microsoft.com
- Jun WangPalo Alto Networks, Inc.Verified email at paloaltonetworks.com
- Bing MaoComputer Science, Nanjing UniversityVerified email at nju.edu.cn
- Lei ZhaoSchool of Cyber Science and Engineering, Wuhan UniversityVerified email at whu.edu.cn
- Matthew WrightProfessor and Chair of Cybersecurity, Rochester Institute of TechnologyVerified email at rit.edu
- Zhi XinPh.D. of Computer Science, Nanjing UniversityVerified email at nju.edu.cn
- Shuai WangThe Hong Kong University of Science and TechnologyVerified email at cse.ust.hk
- Le GuanUniversity of GeorgiaVerified email at uga.edu
- Armon BartonAssistant Professor, Naval Postgraduate SchoolVerified email at nps.edu
- Mohsen ImaniAnomali Inc.Verified email at mavs.uta.edu
- Hui XuAssociate Professor, Fudan UniversityVerified email at fudan.edu.cn
- Michael R. LyuProfessor of Computer Science & Engineering, The Chinese University of Hong KongVerified email at cse.cuhk.edu.hk
- Pei WangGoogleVerified email at google.com
- Heng YinProfessor of Computer Science, UC RiversideVerified email at cs.ucr.edu
- Mohsin JunaidUT ArlingtonVerified email at mavs.uta.edu
- Ting ChenProfessor, UESTCVerified email at uestc.edu.cn