Get my own profile
Public access
View all58 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Wenjing LouW. C. English Endowed Professor, IEEE Fellow, Virginia Tech, USAVerified email at vt.edu
Thomas HouBradley Distinguished Professor, IEEE Fellow, Virginia Tech, USAVerified email at vt.edu
Yang XiaoUniversity of KentuckyVerified email at uky.edu
Kun SunGeorge Mason UniversityVerified email at gmu.edu
Zhiyuan YuWashington University in St. LouisVerified email at wustl.edu
Yevgeniy VorobeychikWashington University in Saint LouisVerified email at wustl.edu
Jinwen WangWashington University in St. LouisVerified email at wustl.edu
Chaowei XiaoUniversity of Wisconsin - MadisonVerified email at umich.edu
Qiben YanComputer Science and Engineering, Michigan State UniversityVerified email at msu.edu
Han LiuPhD in Computer Science, Washington University in St. LouisVerified email at wustl.edu
Wenhai SunPurdue UniversityVerified email at purdue.edu
Liang TongSenior Researcher, Stellar Cyber, Inc.Verified email at stellarcyber.ai
Deborah ShandsSRI InternationalVerified email at acm.org
Le GuanSchool of Computing at the University of GeorgiaVerified email at uga.edu
Xuan ZhangAssociate Professor, Northeastern UniversityVerified email at northeastern.edu
Bo LiUniversity of Illinois at Urbana–ChampaignVerified email at illinois.edu
Xuxian JiangPeckShield Inc.Verified email at peckshield.com