Get my own profile
Co-authors
Wen YaoResearcher Scientist, HP LabsVerified email at hp.com
Zang LiSr. Researcher, Linkedin IncVerified email at linkedin.com
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Jungyoon KimKent State UniversityVerified email at kent.edu
Ya Zhang(张娅)Shanghai Jiao Tong University(上海交通大学)Verified email at sjtu.edu.cn
Fengjun LiUniversity of KansasVerified email at ku.edu
Shuihua Hanxiamen universityVerified email at xmu.edu.cn
Dongwon LeeAssociate Professor, The Pennsylvania State UniversityVerified email at psu.edu
Heng XuProfessor of Information Technology and Analytics, Kogod School of Business, American UniversityVerified email at american.edu
Yiling ChenHarvard UniversityVerified email at seas.harvard.edu
Mithu BhattacharyaAssociate Professor of Decision Sciences, University of Detroit MercyVerified email at udmercy.edu
Ding Wang (汪 定)College of Cyber Science, Nankai University, Tianjin 300350, ChinaVerified email at pku.edu.cn
Wang-Chien LeePennsylvania State UniversityVerified email at cse.psu.edu
Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu
Dan(a) ZhuIowa State UniversityVerified email at iastate.edu
Prasenjit MitraProfessor of Information Sciences and Technology, The Pennsylvania State UniversityVerified email at psu.edu
Akhil KumarPenn State UniversityVerified email at psu.edu
Thin Yin LeongSingapore University of Social SciencesVerified email at suss.edu.sg
Alex Hai WangApple, Hitachi, Verisign, Penn State
Xiaodan WuProfessor of Management Science, Hebei Unviersity of Technology
Chao-Hsien Chu 朱昭贤
Professor of Information Sciences and Technology, Pennsylvania State University
Verified email at ist.psu.edu - Homepage