Get my own profile
Co-authors
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Jinho HwangFacebookVerified email at fb.com
Maja VukovicIBM T.J. Watson Research CenterVerified email at us.ibm.com
C Lee GilesPennsylvania State UniversityVerified email at psu.edu
Prasenjit MitraProfessor of Information Sciences and Technology, The Pennsylvania State UniversityVerified email at psu.edu
Min LiSenior Software Engineer-Virtualization, FireEyeVerified email at vcu.edu
Yulong ZhangGoogleVerified email at google.com
Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu
Haining WangProfessor of ECE, Virginia TechVerified email at vt.edu
hai huangIBM ResearchVerified email at us.ibm.com
Jill JermynColumbia UniversityVerified email at cs.columbia.edu
Liangcai GaoPeking UniversityVerified email at pku.edu.cn
Nikos AnerousisIBM TJ Watson Research CenterVerified email at us.ibm.com
Michael NiddIBM ResearchVerified email at zurich.ibm.com
Lakshminarayanan(LN) Renganaraya...AdobeVerified email at workday.com
Ea-Ee JanIBMVerified email at us.ibm.com
James Z. WangProfessor, Informatics, Data Sciences, and Human-Centered Design and Development programsVerified email at ist.psu.edu
Isaac CouncillOscar HealthVerified email at hioscar.com
Salvatore StolfoProfessor of Computer Science, Columbia UniversityVerified email at columbia.edu
Yoon-Chan JhiLeader of SW Security Lab in Samsung SDS Research Center, Seoul, KoreaVerified email at samsung.com
Kun Bai
Tencent
Verified email at tencent.com