Get my own profile
Public access
View all40 articles
9 articles
available
not available
Based on funding mandates
Co-authors
Guohong CaoProfessor, the Pennsylvania State UniversityVerified email at cse.psu.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Sanjeev SetiaDepartment of Computer Science, George Mason UniversityVerified email at gmu.edu
Dinghao WuPennsylvania State UniversityVerified email at psu.edu
Yoon-Chan JhiDirector of Software Security in Technology Research at Samsung SDS, Seoul, KoreaVerified email at samsung.com
Daojing HeSchool of Computer Science and Engineering, South China University of TechnologyVerified email at scut.edu.cn
Thomas La PortaPenn State UniversityVerified email at cse.psu.edu
Yu ChenProfessor at Dept. of Electrical & Computer Engr, Binghamton University, SUNYVerified email at binghamton.edu
Heng XuProfessor of Management, Warrington College of Business, University of FloridaVerified email at ufl.edu
Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
Peng NingGoogleVerified email at google.com
Wensheng ZhangAssociate Professor of Computer Science, Iowa State UniversityVerified email at iastate.edu
Qinghua LiProfessor, University of ArkansasVerified email at uark.edu
Wei XUPalo Alto NetworksVerified email at paloaltonetworks.com
Yilu ZhouAssociate Professor of Business, Fordham UniversityVerified email at fordham.edu
Alem H Fitwi (PhD)Meta(Facebook)Verified email at fb.com
Lannan Lisa LuoDepartment of Computer Science, George Mason UniversityVerified email at gmu.edu
Jiang MingTulane UniversityVerified email at tulane.edu
Jiqiang LiuProfessor of Computer ScienceVerified email at bjtu.edu.cn