Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
- John YenProfessor of Data Sciences, The Pennsylvania State UniversityVerified email at psu.edu
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- Hong LiuIndiana University KokomoVerified email at iu.edu
- Awny AlnusairProfessor at Indiana UniversityVerified email at iu.edu
- TAO LINGoogleVerified email at google.com
- Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
- J.B. (Joo Baek) KimUniversity of TampaVerified email at ut.edu
- Hasan CamBest BuyVerified email at bestbuy.com
- Sheikh Rabiul IslamRutgers University - CamdenVerified email at rutgers.edu
- Mingyi ZhaoNotionVerified email at makenotion.com
- Christopher GarneauU.S. Army DEVCOM Analysis CenterVerified email at army.mil
- Atif AlamriProfessor, King Saud UniversityVerified email at ksu.edu.sa
- Majdi RawashdehPrincess Sumaya University for Technology && Al Yamamah UniversityVerified email at psut.edu.jo
- Jun XuAssistant Professor at The University of UtahVerified email at cs.utah.edu
- M. Shamim HossainProfessor, Highly Cited Researcher, King Saud UniversityVerified email at ksu.edu.sa
- Jun YaoUniversity of Texas at ArlingtonVerified email at mavs.uta.edu
- Alex MartakisGraduate Student, University of California - San DiegoVerified email at ucsd.edu
- Neela SawantDolby (Past: Amazon, Yahoo! R&D India, Penn State University, IIT Bombay)Verified email at dolby.com
- Nicklaus A. GiacobeCollege of Information Sciences and Technology,The Pennsylvania State UniversityVerified email at ist.psu.edu