Get my own profile
Public access
View all36 articles
8 articles
available
not available
Based on funding mandates
Co-authors
Fengjun LiUniversity of KansasVerified email at ku.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Jingqiang LinProfessor, University of Science and Technology of ChinaVerified email at ustc.edu.cn
Dongwon LeeProfessor, The Pennsylvania State UniversityVerified email at psu.edu
Abdulmalik HumayedJazan UniversityVerified email at jazanu.edu.sa
Le GuanSchool of Computing at the University of GeorgiaVerified email at uga.edu
Yuhao YangMicrosoft | University of KansasVerified email at microsoft.com
Wang-Chien LeePennsylvania State UniversityVerified email at cse.psu.edu
Xuewen ChenAIWAYSVerified email at ai-ways.com
Chao-Hsien Chu 朱昭贤Professor of Information Sciences and Technology, Pennsylvania State UniversityVerified email at ist.psu.edu
Qiaozhi (Betty) WangApple, University of KansasVerified email at ku.edu
Sana AwanUniversity of KansasVerified email at ku.edu
Jun (Luke) HuanAWS AI LabsVerified email at amazon.com
Shu HuangMicrosoftVerified email at microsoft.com
Guanghui WangAssociate Professor of Computer Science, Toronto Metropolitan UniversityVerified email at torontomu.ca
Xiaoou TangThe Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
Chao LanUniversity of OklahomaVerified email at ou.edu
Mei LiuAssociate Professor, University of FloridaVerified email at ufl.edu
Xiaoli LiUniversity of KansasVerified email at ku.edu
Linzhi JiangUniversity of SurreyVerified email at surrey.ac.uk