Get my own profile
Public access
View all43 articles
8 articles
available
not available
Based on funding mandates
Co-authors
Fengjun LiUniversity of KansasVerified email at ku.edu
Jingqiang LinProfessor, University of Science and Technology of ChinaVerified email at ustc.edu.cn
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Dongwon LeeProfessor, The Pennsylvania State UniversityVerified email at psu.edu
Abdulmalik HumayedJazan UniversityVerified email at jazanu.edu.sa
Le GuanUniversity of GeorgiaVerified email at uga.edu
Yuhao YangMicrosoft | University of KansasVerified email at microsoft.com
Wang-Chien LeePennsylvania State UniversityVerified email at cse.psu.edu
Xuewen ChenAIWAYSVerified email at ai-ways.com
Guanghui WangAssociate Professor, Toronto Metropolitan UniversityVerified email at torontomu.ca
Sana AwanUniversity of KansasVerified email at ku.edu
Chao-Hsien Chu 朱昭贤Professor of Information Sciences and Technology, Pennsylvania State UniversityVerified email at ist.psu.edu
Qiaozhi (Betty) WangApple, University of KansasVerified email at ku.edu
Zeyan LiuUniversity of KansasVerified email at ku.edu
Shu HuangMicrosoftVerified email at microsoft.com
Jun (Luke) HuanAWS AI LabsVerified email at amazon.com
Dr. Kaitai LiangCybersecurity Group, EEMCS, TU DELFTVerified email at tudelft.nl
Xiaoou TangThe Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
Chao LanUniversity of OklahomaVerified email at ou.edu
Mei LiuAssociate Professor, University of FloridaVerified email at ufl.edu