Get my own profile
Public access
View all35 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Dinghao WuPennsylvania State UniversityVerified email at psu.edu
Dongpeng XuUniversity of New HampshireVerified email at unh.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu
Yufei JiangMicrosoft, Ph.D. from Pennsylvania State UniversityVerified email at microsoft.com
Jun WangPalo Alto Networks, Inc.Verified email at paloaltonetworks.com
Bing MaoComputer Science, Nanjing UniversityVerified email at nju.edu.cn
Matthew WrightProfessor and Chair of Cybersecurity, Rochester Institute of TechnologyVerified email at rit.edu
Zhi XinPh.D. of Computer Science, Nanjing UniversityVerified email at nju.edu.cn
Lei ZhaoSchool of Cyber Science and Engineering, Wuhan UniversityVerified email at whu.edu.cn
Shuai WangHKUSTVerified email at cse.ust.hk
Armon BartonAssistant Professor, Naval Postgraduate SchoolVerified email at nps.edu
Mohsen ImaniAnomali Inc.Verified email at mavs.uta.edu
Le GuanSchool of Computing at the University of GeorgiaVerified email at uga.edu
Pei WangGoogleVerified email at google.com
Hui XuComputer Science, Fudan UniversityVerified email at fudan.edu.cn
Michael R. LyuProfessor of Computer Science & Engineering, The Chinese University of Hong KongVerified email at cse.cuhk.edu.hk
Heng YinProfessor of Computer Science, UC RiversideVerified email at cs.ucr.edu
Mohsin JunaidUT ArlingtonVerified email at mavs.uta.edu
Ting ChenProfessor, UESTCVerified email at uestc.edu.cn