Get my own profile
Public access
View all40 articles
8 articles
available
not available
Based on funding mandates
Co-authors
- Fengjun LiUniversity of KansasVerified email at ku.edu
- Jingqiang LinProfessor, University of Science and Technology of ChinaVerified email at ustc.edu.cn
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- Dongwon LeeProfessor, The Pennsylvania State UniversityVerified email at psu.edu
- Abdulmalik HumayedJazan UniversityVerified email at jazanu.edu.sa
- Le GuanSchool of Computing at the University of GeorgiaVerified email at uga.edu
- Yuhao YangMicrosoft | University of KansasVerified email at microsoft.com
- Wang-Chien LeePennsylvania State UniversityVerified email at cse.psu.edu
- Xuewen ChenAIWAYSVerified email at ai-ways.com
- Sana AwanUniversity of KansasVerified email at ku.edu
- Chao-Hsien Chu 朱昭贤Professor of Information Sciences and Technology, Pennsylvania State UniversityVerified email at ist.psu.edu
- Qiaozhi (Betty) WangApple, University of KansasVerified email at ku.edu
- Guanghui WangAssociate Professor of Computer Science, Toronto Metropolitan UniversityVerified email at torontomu.ca
- Jun (Luke) HuanAWS AI LabsVerified email at amazon.com
- Shu HuangMicrosoftVerified email at microsoft.com
- Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTVerified email at tudelft.nl
- Zeyan LiuUniversity of KansasVerified email at ku.edu
- Xiaoou TangThe Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
- Chao LanUniversity of OklahomaVerified email at ou.edu
- Mei LiuAssociate Professor, University of FloridaVerified email at ufl.edu