Get my own profile
Co-authors
Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Dinghao WuPennsylvania State UniversityVerified email at psu.edu
Bo LuoProfessor, The University of KansasVerified email at ku.edu
John YenUniversity Professor of Information Sciences and Technology, The Pennsylvania State UniversityVerified email at ist.psu.edu
Fengjun LiUniversity of KansasVerified email at ku.edu
Yoon-Chan JhiLeader of SW Security Lab in Samsung SDS Research Center, Seoul, KoreaVerified email at samsung.com
Xiaoqi JiaInstitute of Information Engineering, CASVerified email at iie.ac.cn
Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Minghui ZhuAssociate Professor, Electrical Engineering and Computer Science, Pennsylvania State UniversityVerified email at psu.edu
Jun XuAssistant Professor at Stevens Institute of TechnologyVerified email at stevens.edu
Dongwon LeeAssociate Professor, The Pennsylvania State UniversityVerified email at psu.edu
Chao-Hsien Chu 朱昭贤Professor of Information Sciences and Technology, Pennsylvania State UniversityVerified email at ist.psu.edu
Heqing HuangIBM Thomas J. Watson Research CenterVerified email at us.ibm.com
Shengzhi ZhangBoston University MET CollegeVerified email at bu.edu
Wang-Chien LeePennsylvania State UniversityVerified email at cse.psu.edu
xinyu xingThe Pennsylvania State UniversityVerified email at ist.psu.edu
Mingyi ZhaoSnap Inc.Verified email at snap.com
XI XIONGComputer Science and Engineering, Pennsylvania State UniversityVerified email at cse.psu.edu
Jiang MingUniversity of Texas at ArlingtonVerified email at uta.edu
Peng Liu
Raymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State University
Verified email at ist.psu.edu - Homepage