Get my own profile
Public access
View all71 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Jiang MingTulane UniversityVerified email at tulane.edu
Shuai WangThe Hong Kong University of Science and TechnologyVerified email at cse.ust.hk
Pei WangGoogleVerified email at google.com
Sencun ZhuPennsylvania State UniversityVerified email at psu.edu
Xiao LiuResearch Scientist @ FacebookVerified email at fb.com
Yufei JiangMicrosoft, Ph.D. from Pennsylvania State UniversityVerified email at microsoft.com
Lingwei ChenWright State UniversityVerified email at wright.edu
John YenProfessor of Data Sciences, The Pennsylvania State UniversityVerified email at psu.edu
Dongpeng XuUniversity of New HampshireVerified email at unh.edu
Xiaoting LiSamsung Ads | Visa Research | Penn State UniversityVerified email at visa.com
Rupesh PrajapatiPennsylvania State UniversityVerified email at psu.edu
Lannan Lisa LuoDepartment of Computer Science, George Mason UniversityVerified email at gmu.edu
Prasenjit MitraGuest Professor, Leibniz University Hannover & Research Consultant (external) QCRIVerified email at psu.edu
Li WangNortheastern Illinois UniversityVerified email at neiu.edu
Qinkun BaoThe Apache Software Foundation, GoogleVerified email at google.com
Lu LinAssistant Professor of Information Science and Technology, Penn State UniversityVerified email at psu.edu
Danfeng ZhangDuke UniversityVerified email at duke.edu
Cornelia CarageaUniversity of Illinois at ChicagoVerified email at uic.edu
Shaz QadeerMicrosoftVerified email at microsoft.com