Get my own profile
Public access
View all40 articles
8 articles
available
not available
Based on funding mandates
Co-authors
Fengjun LiUniversity of KansasVerified email at ku.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Jingqiang LinProfessor, University of Science and Technology of ChinaVerified email at ustc.edu.cn
Dongwon LeeProfessor, The Pennsylvania State UniversityVerified email at psu.edu
Abdulmalik HumayedJazan UniversityVerified email at jazanu.edu.sa
Le GuanSchool of Computing at the University of GeorgiaVerified email at uga.edu
Yuhao YangMicrosoft | University of KansasVerified email at microsoft.com
Wang-Chien LeePennsylvania State UniversityVerified email at cse.psu.edu
Xuewen ChenAIWAYSVerified email at ai-ways.com
Sana AwanUniversity of KansasVerified email at ku.edu
Chao-Hsien Chu 朱昭贤Professor of Information Sciences and Technology, Pennsylvania State UniversityVerified email at ist.psu.edu
Qiaozhi (Betty) WangApple, University of KansasVerified email at ku.edu
Guanghui WangAssociate Professor of Computer Science, Toronto Metropolitan UniversityVerified email at torontomu.ca
Shu HuangMicrosoftVerified email at microsoft.com
Jun (Luke) HuanAWS AI LabsVerified email at amazon.com
Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTVerified email at tudelft.nl
Xiaoou TangThe Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
Zeyan LiuUniversity of KansasVerified email at ku.edu
Chao LanUniversity of OklahomaVerified email at ou.edu
Mei LiuAssociate Professor, University of FloridaVerified email at ufl.edu