Get my own profile
Public access
View all3 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Wen YaoResearcher Scientist, HP LabsVerified email at hp.com
- Zang LiResearch Scientist, Linkedin, DiDi, TencentVerified email at linkedin.com
- Jungyoon KimKent State UniversityVerified email at kent.edu
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- Ya ZhangShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
- Heng XuProfessor of Management, Warrington College of Business, University of FloridaVerified email at ufl.edu
- Shuihua Hanxiamen universityVerified email at xmu.edu.cn
- Fengjun LiUniversity of KansasVerified email at ku.edu
- Dongwon LeeProfessor, The Pennsylvania State UniversityVerified email at psu.edu
- Yiling ChenHarvard UniversityVerified email at seas.harvard.edu
- Mithu BhattacharyaProfessor of Decision Sciences, University of Detroit MercyVerified email at udmercy.edu
- Ding Wang(汪 定)College of Cyber Science, Nankai University, Tianjin 300350, ChinaVerified email at nankai.edu.cn
- Wang-Chien LeePennsylvania State UniversityVerified email at cse.psu.edu
- Sencun ZhuPennsylvania State UniversityVerified email at psu.edu
- Dan ZhuIowa State UniversityVerified email at iastate.edu
- Akhil KumarPenn State UniversityVerified email at psu.edu
- Prasenjit MitraProfessor of IST, Penn State Univ. & Affiliated Prof. L3S Research Ctr., Leibniz University HannoverVerified email at psu.edu
- Alex Hai WangApple, Hitachi, Verisign, Penn StateVerified email at apple.com
- Thin Yin LeongSingapore University of Social SciencesVerified email at suss.edu.sg
- Xiaodan WuProfessor of Management Science, Hebei Unviersity of Technology
Follow
Chao-Hsien Chu 朱昭贤
Professor of Information Sciences and Technology, Pennsylvania State University
Verified email at ist.psu.edu - Homepage