Get my own profile
Co-authors
XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at indiana.edu
Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Xiangyu ZhangProfessor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
Yeonjoon LeeAssistant Professor of College of Computing, Hanyang UniversityVerified email at hanyang.ac.kr
Wei YouRennin University of ChinaVerified email at ruc.edu.cn
Lin TanMary J. Elmore New Frontiers Associate Professor, Computer Science, Purdue UniversityVerified email at purdue.edu
Jianjun HuangSchool of Information, Renmin University of ChinaVerified email at ruc.edu.cn
Nan ZhangFacebook Inc.Verified email at indiana.edu
Heqing HuangIBM Thomas J. Watson Research CenterVerified email at us.ibm.com
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Xiaojing LiaoIndiana University BloomingtonVerified email at indiana.edu
Raheem BeyahMotorola Foundation Professor, Georgia TechVerified email at ece.gatech.edu
Feng QianAssistant Professor at University of Minnesota - Twin CitiesVerified email at umn.edu
Xianghang MiAssistant Professor, SUNY BuffaloVerified email at buffalo.edu
Yi ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Damon McCoyAssociate Professor of Computer Science and Engineering, New York UniversityVerified email at nyu.edu
Sumayah AlrwaisAssistant Professor at King Saud University, Saudi ArabiaVerified email at ksu.edu.sa
Kan YuanIndiana University Computer Science DepartmentVerified email at indiana.edu
Tongxin LiPeking UniversityVerified email at pku.edu.cn
Peiyuan ZongInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Peng Wang
Verified email at indiana.edu - Homepage