Get my own profile
Public access
View all7 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jinho HwangFacebookVerified email at fb.com
Maja VukovicIBM T.J. Watson Research CenterVerified email at us.ibm.com
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
C Lee GilesPennsylvania State UniversityVerified email at psu.edu
Prasenjit MitraVisiting Professor, L3S Research Ctr., Leibniz Universitat Hannover & Prof. of IST, Penn State Univ.Verified email at psu.edu
Min LiSenior Software Engineer-Virtualization, FireEyeVerified email at vcu.edu
Yulong ZhangGoogleVerified email at google.com
Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu
Haining WangProfessor of ECE, Virginia TechVerified email at vt.edu
hai huangIBM ResearchVerified email at us.ibm.com
Jill JermynColumbia UniversityVerified email at cs.columbia.edu
Liangcai GaoPeking UniversityVerified email at pku.edu.cn
Michael NiddIBM ResearchVerified email at zurich.ibm.com
Nikos AnerousisIBM TJ Watson Research CenterVerified email at us.ibm.com
Alex Hai WangApple, Hitachi, Verisign, Penn StateVerified email at apple.com
Lakshminarayanan(LN) Renganaraya...AdobeVerified email at adobe.com
Ea-Ee JanIBMVerified email at us.ibm.com
James Z. WangDistinguished Professor, Informatics, Data Sciences, and HCI, Penn StateVerified email at ist.psu.edu
Yoon-Chan JhiDirector of Software Security in Samsung SDS Research Center, Seoul, KoreaVerified email at samsung.com
Xiaoqi JiaInstitute of Information Engineering, CASVerified email at iie.ac.cn