Get my own profile
Public access
View all13 articles
1 article
available
not available
Based on funding mandates
Co-authors
Shu YinShanghaiTech UniversityVerified email at shanghaitech.edu.cn
Jie WuLaura H. Carnell Professor, Department of Computer and Information Sciences, TempleVerified email at temple.edu
Jiacheng ShangAsistant Professor, Dept. of Computer Science, Montclair State UniversityVerified email at montclair.eduChunming QiaoComputer Science and EngineeringVerified email at buffalo.edu
Guangquan XuTianjin UniversityVerified email at tju.edu.cn
Xi ZhengARC Future Fellow & Associate Professor (Equivalent to US Full Professor), Macquarie UniversityVerified email at mq.edu.au
Bingsheng ZhangZhejiang University, IOHKVerified email at zju.edu.cnHaojin ZhuFIEEE, Distinguished Professor, Shanghai Jiao Tong UniversityVerified email at cs.sjtu.edu.cn
Zhaoyu GaoComputer Science, UMass AmherstVerified email at cs.umass.eduDavid MohaisenProfessor, University of Central FloridaVerified email at ucf.edu
Qian WangIEEE Fellow, School of Cyber Science and Engineering, Wuhan UniversityVerified email at whu.edu.cn
Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
Lu SuAssociate Professor, Purdue UniversityVerified email at purdue.edu
Di MaUniversity of MichiganVerified email at umich.edu
Shaoying LiuProfessor of Software Engineering, East China Normal University, ChinaVerified email at sei.ecnu.edu.cn
Xinwen FuUniversity of Massachusetts LowellVerified email at cs.uml.edu
Zhong Jitianjin universityVerified email at tju.edu.cn
Emmanouil PanaousisProfessor, Centre for Sustainable Cyber Security (CS2), University of GreenwichVerified email at greenwich.ac.uk
Xiaomin ZhuNational University of Defense TechnologyVerified email at nudt.edu.cnJian ZhangThe Hong Kong University of Science and Technology (Guangzhou)Verified email at hkust-gz.edu.cn
Follow
Si Chen
Professor, Department of Computer Science, West Chester University of Pennsylvania
Verified email at wcupa.edu - Homepage