Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
John YenProfessor of Data Sciences, The Pennsylvania State UniversityVerified email at psu.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Hong LiuIndiana University KokomoVerified email at iu.edu
Awny AlnusairAssociate Professor at Indiana UniversityVerified email at iu.edu
TAO LINGoogleVerified email at google.com
Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Hasan CamBest BuyVerified email at bestbuy.com
Sheikh Rabiul IslamRutgers University - CamdenVerified email at rutgers.edu
Mingyi ZhaoNotionVerified email at makenotion.com
Bo ChenAssociate Professor of Computer Science, Michigan Technological UniversityVerified email at mtu.edu
Christopher GarneauU.S. Army DEVCOM Analysis CenterVerified email at army.mil
Atif AlamriProfessor, King Saud UniversityVerified email at ksu.edu.sa
Majdi RawashdehPrincess Sumaya University for Technology && Al Yamamah UniversityVerified email at psut.edu.jo
Jun XuAssistant Professor at The University of UtahVerified email at cs.utah.edu
M. Shamim HossainProfessor, Highly Cited Researcher, King Saud UniversityVerified email at ksu.edu.sa
J.B. (Joo Baek) KimUniversity of TampaVerified email at ut.edu
Jun YaoUniversity of Texas at ArlingtonVerified email at mavs.uta.edu
Alex MartakisGraduate Student, University of California - San DiegoVerified email at ucsd.edu
Neela SawantResearch Scientist at Amazon.com (Past: Yahoo! R&D India, Penn State University, IIT Bombay)Verified email at amazon.com
Nicklaus A. GiacobeCollege of Information Sciences and Technology,The Pennsylvania State UniversityVerified email at ist.psu.edu