Get my own profile
Public access
View all23 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Bo LuoProfessor, The University of KansasVerified email at ku.edu
Jingqiang LinProfessor, University of Science and Technology of ChinaVerified email at ustc.edu.cn
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Abdulmalik HumayedJazan UniversityVerified email at jazanu.edu.sa
Dongwon LeeProfessor, The Pennsylvania State UniversityVerified email at psu.edu
Lei YangAmazonVerified email at amazon.com
Chao-Hsien Chu 朱昭贤Professor of Information Sciences and Technology, Pennsylvania State UniversityVerified email at ist.psu.edu
Bingyu LiInstitute of Information Engineering, Chinese Academy of SciencesVerified email at buaa.edu.cn
Qiaozhi (Betty) WangApple, University of KansasVerified email at ku.edu
Jia Yu(于佳)Professor of Computer Science, Qingdao UniversityVerified email at qdu.edu.cn
Hanlin ZhangQingdao UniversityVerified email at qdu.edu.cn
Chengliang TianAssociate Prof, Qingdao UniversityVerified email at qdu.edu.cn
Jake Y. Chen, PhDUniversity of Alabama at Birmingham (UAB) School of MedicineVerified email at uab.edu
Yuhao YangMicrosoft | University of KansasVerified email at microsoft.com
Hyunjin SeoOscar Stauffer Professor/Associate Dean, University of Kansas; Center for Digital Inclusion DirectorVerified email at ku.edu
Le GuanDepartment of Computer Science at the University of GeorgiaVerified email at cs.uga.edu
Wang-Chien LeePennsylvania State UniversityVerified email at cse.psu.edu
Prasenjit MitraVisiting Professor, L3S Research Ctr., Leibniz Universitat Hannover & Prof. of IST, Penn State Univ.Verified email at psu.edu
Roseann PlurettiUniversity of KansasVerified email at ku.edu
Wing Shing WongChinese University of Hong KongVerified email at ie.cuhk.edu.hk