Get my own profile
Public access
View all66 articles
32 articles
available
not available
Based on funding mandates
Co-authors
- XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at iu.edu
- Guozhu MengAssociate Professor with Chinese Academy of SciencesVerified email at iie.ac.cn
- Shengzhi ZhangBoston University MET CollegeVerified email at bu.edu
- Ruigang LiangInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- Yue ZhaoUniversity of Chinese Academy of SciencesVerified email at iie.ac.cn
- Yeonjoon LeeAssistant Professor of College of Computing, Hanyang UniversityVerified email at hanyang.ac.kr
- Nan ZhangFacebook Inc.Verified email at indiana.edu
- Xuejing YuanSchool of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876Verified email at bupt.edu.cn
- Haixu TangProfessor, Indiana UniversityVerified email at indiana.edu
- Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Yuxuan ChenShandong UniversityVerified email at sdu.edu.cn
- Yi ChenAssistant Professor, The University of Hong KongVerified email at hku.hk
- Peizhuo LvInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
- Jinwen HeInstitute of Information Engineering,Chinese Academy of SciencesVerified email at iie.ac.cn
- Jin Li 李进Professor @Guangzhou UniversityVerified email at gzhu.edu.cn
- Peiyuan ZongInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
- Tongxin LiPeking UniversityVerified email at pku.edu.cn
- Yunhui LongUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Xiaojing LiaoIndiana University BloomingtonVerified email at indiana.edu