Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
John YenProfessor of Data Sciences, The Pennsylvania State UniversityVerified email at psu.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
TAO LINGoogleVerified email at google.com
Awny AlnusairAssociate Professor at Indiana UniversityVerified email at iu.edu
Hong LiuIndiana University KokomoVerified email at iu.edu
Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Hasan CamBest BuyVerified email at bestbuy.com
Sheikh Rabiul IslamRutgers University - CamdenVerified email at rutgers.edu
Bo ChenAssociate Professor of Computer Science, Michigan Technological UniversityVerified email at mtu.edu
Christopher GarneauU.S. Army DEVCOM Analysis CenterVerified email at army.mil
Mingyi ZhaoNotionVerified email at makenotion.com
Atif AlamriProfessor, King Saud UniversityVerified email at ksu.edu.sa
Majdi RawashdehPrincess Sumaya University for TechnologyVerified email at psut.edu.jo
M. Shamim HossainProfessor, Highly Cited Researcher, King Saud UniversityVerified email at ksu.edu.sa
Jun YaoUniversity of Texas at ArlingtonVerified email at mavs.uta.edu
Jun XuAssistant Professor at The University of UtahVerified email at cs.utah.edu
Neela SawantResearch Scientist at Amazon.com (Past: Yahoo! R&D India, Penn State University, IIT Bombay)Verified email at amazon.com
Nicklaus A. GiacobeCollege of Information Sciences and Technology,The Pennsylvania State UniversityVerified email at ist.psu.edu
Alex MartakisGraduate Student, University of California - San DiegoVerified email at ucsd.edu
J.B. (Joo Baek) KimUniversity of TampaVerified email at ut.edu