Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
John YenProfessor of Data Sciences, The Pennsylvania State UniversityVerified email at psu.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Hong LiuIndiana University KokomoVerified email at iu.edu
Awny AlnusairProfessor at Indiana UniversityVerified email at iu.edu
TAO LINGoogleVerified email at google.com
Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
J.B. (Joo Baek) KimUniversity of TampaVerified email at ut.edu
Hasan CamBest BuyVerified email at bestbuy.com
Sheikh Rabiul IslamRutgers University - CamdenVerified email at rutgers.edu
Mingyi ZhaoNotionVerified email at makenotion.com
Christopher GarneauU.S. Army DEVCOM Analysis CenterVerified email at army.mil
Atif AlamriProfessor, King Saud UniversityVerified email at ksu.edu.sa
Majdi RawashdehPrincess Sumaya University for Technology && Al Yamamah UniversityVerified email at psut.edu.jo
Jun XuAssistant Professor at The University of UtahVerified email at cs.utah.edu
M. Shamim HossainProfessor, Highly Cited Researcher, King Saud UniversityVerified email at ksu.edu.sa
Jun YaoUniversity of Texas at ArlingtonVerified email at mavs.uta.edu
Neela SawantDolby (Past: Amazon, Yahoo! R&D India, Penn State University, IIT Bombay)Verified email at dolby.com
Nicklaus A. GiacobeCollege of Information Sciences and Technology,The Pennsylvania State UniversityVerified email at ist.psu.edu