Get my own profile
Public access
View all30 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Jingqiang LinProfessor, University of Science and Technology of ChinaVerified email at ustc.edu.cn
Wei ZhouHuazhong University of Science and TechnologyVerified email at hust.edu.cn
Bo LuoProfessor, The University of KansasVerified email at ku.edu
xinyu xingNorthwestern UniversityVerified email at northwestern.edu
Fengjun LiUniversity of KansasVerified email at ku.edu
Shengzhi ZhangBoston University MET CollegeVerified email at bu.edu
Xinyang GeMicrosoft ResearchVerified email at microsoft.com
Trent JaegerProfessor of Computer Science and Engineering, UC RiversideVerified email at ucr.edu
Jun XuAssistant Professor at The University of UtahVerified email at cs.utah.edu
Shuai WangThe Hong Kong University of Science and TechnologyVerified email at cse.ust.hk
Heqing HuangAffiliate Professor @ UCAS, Bytedance US AI Lab/GenAI Security, TensorSec, IBM Watson, PANW, FireEye