Get my own profile
Public access
View all31 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Dinghao WuPennsylvania State UniversityVerified email at psu.edu
Pei WangGoogleVerified email at google.com
Xiao LiuResearch Scientist @ FacebookVerified email at fb.com
Xiapu LuoThe Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Danfeng ZhangDuke UniversityVerified email at duke.edu
Yufei JiangMicrosoft, Ph.D. from Pennsylvania State UniversityVerified email at microsoft.com
Jiang MingTulane UniversityVerified email at tulane.edu
Le GuanSchool of Computing at the University of GeorgiaVerified email at uga.edu
Heqing HuangIBM Thomas J. Watson Research CenterVerified email at us.ibm.com
Jun XuAssistant Professor at The University of UtahVerified email at cs.utah.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
xinyu xingNorthwestern UniversityVerified email at northwestern.edu
Jian LiuInstitute of Information Engineering, CASVerified email at iie.ac.cn