Get my own profile
Public access
View all6 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Jinho HwangFacebookVerified email at fb.com
Maja VukovicIBM T.J. Watson Research CenterVerified email at us.ibm.com
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
C Lee GilesPennsylvania State UniversityVerified email at psu.edu
Prasenjit MitraVisiting Professor, L3S Research Center, Hannover, Germany & Professor of IST, Penn State UniversityVerified email at psu.edu
Min LiSenior Software Engineer-Virtualization, FireEyeVerified email at vcu.edu
Yulong ZhangGoogleVerified email at google.com
Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu
Haining WangProfessor of ECE, Virginia TechVerified email at vt.edu
hai huangIBM ResearchVerified email at us.ibm.com
Jill JermynColumbia UniversityVerified email at cs.columbia.edu
Liangcai GaoPeking UniversityVerified email at pku.edu.cn
Michael NiddIBM ResearchVerified email at zurich.ibm.com
Nikos AnerousisIBM TJ Watson Research CenterVerified email at us.ibm.com
Lakshminarayanan(LN) Renganaraya...AdobeVerified email at adobe.com
Ea-Ee JanIBMVerified email at us.ibm.com
James Z. WangDistinguished Professor, Informatics, Data Sciences, and HCI, Penn StateVerified email at ist.psu.edu
Yoon-Chan JhiDirector of Software Security in Samsung SDS Research Center, Seoul, KoreaVerified email at samsung.com
Xiaoqi JiaInstitute of Information Engineering, CASVerified email at iie.ac.cn
Salvatore StolfoProfessor of Computer Science, Columbia UniversityVerified email at columbia.edu