Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Jinho HwangFacebookVerified email at fb.com
- Maja VukovicIBM T.J. Watson Research CenterVerified email at us.ibm.com
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- C Lee GilesPennsylvania State UniversityVerified email at psu.edu
- Prasenjit MitraVisiting Professor, L3S Research Ctr., Leibniz Universitat Hannover & Prof. of IST, Penn State Univ.Verified email at psu.edu
- Min LiSenior Software Engineer-Virtualization, FireEyeVerified email at vcu.edu
- Yulong ZhangGoogleVerified email at google.com
- Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu
- Jill JermynColumbia UniversityVerified email at cs.columbia.edu
- Haining WangProfessor of ECE, Virginia TechVerified email at vt.edu
- hai huangIBM ResearchVerified email at us.ibm.com
- Liangcai GaoPeking UniversityVerified email at pku.edu.cn
- Michael NiddIBM ResearchVerified email at zurich.ibm.com
- Nikos AnerousisIBM TJ Watson Research CenterVerified email at us.ibm.com
- Alex Hai WangApple, Hitachi, Verisign, Penn StateVerified email at apple.com
- Lakshminarayanan(LN) Renganaraya...AdobeVerified email at adobe.com
- Ea-Ee JanIBMVerified email at us.ibm.com
- James Z. WangDistinguished Professor, Informatics, Data Sciences, and HCI, Penn StateVerified email at ist.psu.edu
- Yoon-Chan JhiDirector of Software Security in Technology Research at Samsung SDS, Seoul, KoreaVerified email at samsung.com
- Xiaoqi JiaInstitute of Information Engineering, CASVerified email at iie.ac.cn