Get my own profile
Public access
View all28 articles
6 articles
available
not available
Based on funding mandates
Co-authors
Guohong CaoProfessor, the Pennsylvania State UniversityVerified email at cse.psu.edu
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Sanjeev SetiaDepartment of Computer Science, George Mason UniversityVerified email at gmu.edu
Dinghao WuPennsylvania State UniversityVerified email at psu.edu
Yoon-Chan JhiLeader of SW Security Lab in Samsung SDS Research Center, Seoul, KoreaVerified email at samsung.com
Heqing HuangIBM Thomas J. Watson Research CenterVerified email at us.ibm.com
Thomas La PortaPenn State UniversityVerified email at cse.psu.edu
Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
Heng XuProfessor of Information Technology and Analytics, Kogod School of Business, American UniversityVerified email at american.edu
Peng NingGoogleVerified email at google.com
Qinghua LiAssociate Professor, University of ArkansasVerified email at uark.edu
Wensheng ZhangAssociate Professor of Computer Science, Iowa State UniversityVerified email at iastate.edu
Wei XUPalo Alto NetworksVerified email at paloaltonetworks.com
YING CHENLead Data Scientist, PayPalVerified email at paypal.com
Jiang MingUniversity of Texas at ArlingtonVerified email at uta.edu
Lannan (Lisa) LuoDepartment of Computer Science and Engineering, University of South CarolinaVerified email at cse.sc.edu
Wei GaoAssociate Professor, University of PittsburghVerified email at pitt.edu
Patrick TraynorUniversity of FloridaVerified email at cise.ufl.edu
Xiaoqi JiaInstitute of Information Engineering, CASVerified email at iie.ac.cn
