Get my own profile
Public access
View all15 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Kang ZhaoLeonard A. Hadley Professor, University of IowaVerified email at uiowa.edu
C Lee GilesPennsylvania State UniversityVerified email at psu.edu
Magy Seif El-NasrUniversity of California at Santa CruzVerified email at ucsc.edu
Baojun QiueBay Inc./Pennsylvania State UniversityVerified email at ebay.com
Dinghao WuPennsylvania State UniversityVerified email at psu.edu
Hyun-Woo "Anthony" KimThe Pennsylvania State UniversityVerified email at ist.psu.edu
Lotfi A. ZadehProfessor Emeritus, EECS, UC BerkeleyVerified email at eecs.berkeley.edu
Bernard J. (Jim) JansenQatar Computing Research Institute, HBKUVerified email at acm.org
Shenghuo Zhu (朱胜火)AibeeVerified email at aibee.com
Linjun YangMicrosoftVerified email at microsoft.com
Follow