Get my own profile
Public access
View all27 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Bo LuoProfessor, The University of KansasVerified email at ku.edu
- Jingqiang LinProfessor, University of Science and Technology of ChinaVerified email at ustc.edu.cn
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- Abdulmalik HumayedJazan UniversityVerified email at jazanu.edu.sa
- Lei YangAmazonVerified email at amazon.com
- Dongwon LeeProfessor, The Pennsylvania State UniversityVerified email at psu.edu
- Chao-Hsien Chu 朱昭贤Professor of Information Sciences and Technology, Pennsylvania State UniversityVerified email at ist.psu.edu
- Le GuanUniversity of GeorgiaVerified email at uga.edu
- Bingyu LiSchool of Cyber Science and Technology, Beihang UniversityVerified email at buaa.edu.cn
- Qiaozhi (Betty) WangApple, University of KansasVerified email at ku.edu
- Jia Yu(于佳)Professor of Computer Science, Qingdao UniversityVerified email at qdu.edu.cn
- Hanlin ZhangQingdao UniversityVerified email at qdu.edu.cn
- Chengliang TianAssociate Prof, Qingdao UniversityVerified email at qdu.edu.cn
- Jake Y. Chen, PhD, FACMI, FAIMBEUniversity of Alabama at Birmingham (UAB) School of MedicineVerified email at uab.edu
- Yuhao YangMicrosoft | University of KansasVerified email at microsoft.com
- Hyunjin SeoOscar Stauffer Professor/Associate Dean, University of Kansas; Center for Digital Inclusion DirectorVerified email at ku.edu
- Wang-Chien LeePennsylvania State UniversityVerified email at cse.psu.edu
- Prasenjit MitraProfessor of IST, Penn State Univ. & Affiliated Prof. L3S Research Ctr., Leibniz University HannoverVerified email at psu.edu
- Roseann PlurettiUniversity of KansasVerified email at ku.edu
- Sohaib KianiAssistant Professor, Beloit CollegeVerified email at beloit.edu