Get my own profile
Public access
View all3 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Wen YaoResearcher Scientist, HP LabsVerified email at hp.com
Zang LiResearch Scientist, Linkedin, DiDi, TencentVerified email at linkedin.com
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Jungyoon KimKent State UniversityVerified email at kent.edu
Ya ZhangShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Heng XuProfessor of Management, Warrington College of Business, University of FloridaVerified email at ufl.edu
Shuihua Hanxiamen universityVerified email at xmu.edu.cn
Fengjun LiUniversity of KansasVerified email at ku.edu
Dongwon LeeProfessor, The Pennsylvania State UniversityVerified email at psu.edu
Yiling ChenHarvard UniversityVerified email at seas.harvard.edu
Mithu BhattacharyaProfessor of Decision Sciences, University of Detroit MercyVerified email at udmercy.edu
Ding Wang(汪 定)College of Cyber Science, Nankai University, Tianjin 300350, ChinaVerified email at nankai.edu.cn
Wang-Chien LeePennsylvania State UniversityVerified email at cse.psu.edu
Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu
Dan ZhuIowa State UniversityVerified email at iastate.edu
Prasenjit MitraVisiting Professor, L3S Research Ctr., Leibniz Universitat Hannover & Prof. of IST, Penn State Univ.Verified email at psu.edu
Akhil KumarPenn State UniversityVerified email at psu.edu
Thin Yin LeongSingapore University of Social SciencesVerified email at suss.edu.sg
Alex Hai WangApple, Hitachi, Verisign, Penn State
Xiaodan WuProfessor of Management Science, Hebei Unviersity of Technology
Follow
Chao-Hsien Chu 朱昭贤
Professor of Information Sciences and Technology, Pennsylvania State University
Verified email at ist.psu.edu - Homepage