Get my own profile
Public access
View all41 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Dinghao WuPennsylvania State UniversityVerified email at psu.edu
Dongpeng XuUniversity of New HampshireVerified email at unh.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Sencun ZhuPennsylvania State UniversityVerified email at psu.edu
Yufei JiangMicrosoft, Ph.D. from Pennsylvania State UniversityVerified email at microsoft.com
Jun WangPalo Alto Networks, Inc.Verified email at paloaltonetworks.com
Bing MaoComputer Science, Nanjing UniversityVerified email at nju.edu.cn
Lei ZhaoSchool of Cyber Science and Engineering, Wuhan UniversityVerified email at whu.edu.cn
Matthew WrightProfessor and Chair of Cybersecurity, Rochester Institute of TechnologyVerified email at rit.edu
Zhi XinPh.D. of Computer Science, Nanjing UniversityVerified email at nju.edu.cn
Shuai WangThe Hong Kong University of Science and TechnologyVerified email at cse.ust.hk
Le GuanUniversity of GeorgiaVerified email at uga.edu
Hui XuAssociate Professor, Fudan UniversityVerified email at fudan.edu.cn
Michael R. LyuProfessor of Computer Science & Engineering, The Chinese University of Hong KongVerified email at cse.cuhk.edu.hk
Armon BartonAssistant Professor, Naval Postgraduate SchoolVerified email at nps.edu
Mohsen ImaniAnomali Inc.Verified email at mavs.uta.edu
Pei WangGoogleVerified email at google.com
Heng YinProfessor of Computer Science, UC RiversideVerified email at cs.ucr.edu
Mohsin JunaidUT ArlingtonVerified email at mavs.uta.edu
Ting ChenProfessor, UESTCVerified email at uestc.edu.cn