Get my own profile
Public access
View all3 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Wen YaoResearcher Scientist, HP LabsVerified email at hp.com
Zang LiResearcher Scientist, Linkedin IncVerified email at linkedin.com
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Jungyoon KimKent State UniversityVerified email at kent.edu
Ya ZhangShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Shuihua Hanxiamen universityVerified email at xmu.edu.cn
Fengjun LiUniversity of KansasVerified email at ku.edu
Heng XuProfessor of Information Technology and Analytics, Kogod School of Business, American UniversityVerified email at american.edu
Dongwon LeeProfessor, The Pennsylvania State UniversityVerified email at psu.edu
Yiling ChenHarvard UniversityVerified email at seas.harvard.edu
Mithu BhattacharyaAssociate Professor of Decision Sciences, University of Detroit MercyVerified email at udmercy.edu
Ding WangCollege of Cyber Science, Nankai University, Tianjin 300350, ChinaVerified email at nankai.edu.cn
Wang-Chien LeePennsylvania State UniversityVerified email at cse.psu.edu
Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu
Dan ZhuIowa State UniversityVerified email at iastate.edu
Prasenjit MitraVisiting Professor, L3S Research Center, Hannover, Germany & Professor of IST, Penn State UniversityVerified email at psu.edu
Akhil KumarPenn State UniversityVerified email at psu.edu
Thin Yin LeongSingapore University of Social SciencesVerified email at suss.edu.sg
Alex Hai WangApple, Hitachi, Verisign, Penn State
Xiaodan WuProfessor of Management Science, Hebei Unviersity of Technology
Follow
Chao-Hsien Chu 朱昭贤
Professor of Information Sciences and Technology, Pennsylvania State University
Verified email at ist.psu.edu - Homepage