Get my own profile
Public access
View all44 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Dinghao WuPennsylvania State UniversityVerified email at psu.edu
Dongpeng XuUniversity of New HampshireVerified email at unh.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Sencun ZhuPennsylvania State UniversityVerified email at psu.eduYufei JiangMicrosoft, Ph.D. from Pennsylvania State UniversityVerified email at microsoft.com
Jun WangPalo Alto Networks, Inc.Verified email at paloaltonetworks.com
Bing MaoComputer Science, Nanjing UniversityVerified email at nju.edu.cn
Ting ChenProfessor, UESTCVerified email at uestc.edu.cnLei ZhaoSchool of Cyber Science and Engineering, Wuhan UniversityVerified email at whu.edu.cn
Matthew WrightProfessor and Chair of Cybersecurity, Rochester Institute of TechnologyVerified email at rit.edu
Zhi XinPh.D. of Computer Science, Nanjing UniversityVerified email at nju.edu.cn
Armon BartonAssistant Professor, Naval Postgraduate SchoolVerified email at nps.edu
Mohsen ImaniAnomali Inc.Verified email at anomali.com
Shuai WangThe Hong Kong University of Science and TechnologyVerified email at cse.ust.hk
Le GuanUniversity of GeorgiaVerified email at uga.eduHui XuAssociate Professor, Fudan UniversityVerified email at fudan.edu.cn
Michael R. LyuProfessor of Computer Science & Engineering, The Chinese University of Hong KongVerified email at cse.cuhk.edu.hk
Heng YinProfessor of Computer Science, UC RiversideVerified email at cs.ucr.edu
Pei WangGoogleVerified email at google.com
Mohsin JunaidUT ArlingtonVerified email at mavs.uta.edu