Crea il mio profilo
Accesso pubblico
Visualizza tutto108 articoli
29 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Sencun ZhuPennsylvania State UniversityEmail verificata su cse.psu.edu
- Dinghao WuPennsylvania State UniversityEmail verificata su psu.edu
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationEmail verificata su gmu.edu
- John YenProfessor of Data Sciences, The Pennsylvania State UniversityEmail verificata su psu.edu
- Bo LuoProfessor, The University of KansasEmail verificata su ku.edu
- Minghui ZhuAssociate Professor, Electrical Engineering and Computer Science, Pennsylvania State UniversityEmail verificata su psu.edu
- Yoon-Chan JhiDirector of Software Security in Technology Research at Samsung SDS, Seoul, KoreaEmail verificata su samsung.com
- Jun XuAssistant Professor at The University of UtahEmail verificata su cs.utah.edu
- Fengjun LiUniversity of KansasEmail verificata su ku.edu
- Xiaoqi JiaInstitute of Information Engineering, CASEmail verificata su iie.ac.cn
- Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesEmail verificata su iie.ac.cn
- Shengzhi ZhangBoston University MET CollegeEmail verificata su bu.edu
- Dongwon LeeProfessor, The Pennsylvania State UniversityEmail verificata su psu.edu
- xinyu xingNorthwestern UniversityEmail verificata su northwestern.edu
- Qiang ZengGeorge Mason UniversityEmail verificata su gmu.edu
- Chao-Hsien Chu 朱昭贤Professor of Information Sciences and Technology, Pennsylvania State UniversityEmail verificata su ist.psu.edu
- Jiang MingTulane UniversityEmail verificata su tulane.edu
- Ping ChenPenn State UniversityEmail verificata su ist.psu.edu
- Chen ZhongThe University of TampaEmail verificata su ut.edu
- Wang-Chien LeePennsylvania State UniversityEmail verificata su cse.psu.edu
Segui
Peng Liu
Raymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State University
Email verificata su ist.psu.edu - Home page