Get my own profile
Public access
View all27 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Bo LuoProfessor, The University of KansasVerified email at ku.edu
Jingqiang LinProfessor, University of Science and Technology of ChinaVerified email at ustc.edu.cn
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Abdulmalik HumayedJazan UniversityVerified email at jazanu.edu.sa
Lei YangAmazonVerified email at amazon.com
Dongwon LeeProfessor, The Pennsylvania State UniversityVerified email at psu.edu
Chao-Hsien Chu 朱昭贤Professor of Information Sciences and Technology, Pennsylvania State UniversityVerified email at ist.psu.edu
Le GuanUniversity of GeorgiaVerified email at uga.edu
Bingyu LiSchool of Cyber Science and Technology, Beihang UniversityVerified email at buaa.edu.cn
Qiaozhi (Betty) WangApple, University of KansasVerified email at ku.edu
Jia Yu(于佳)Professor of Computer Science, Qingdao UniversityVerified email at qdu.edu.cn
Hanlin ZhangQingdao UniversityVerified email at qdu.edu.cn
Chengliang TianAssociate Prof, Qingdao UniversityVerified email at qdu.edu.cn
Jake Y. Chen, PhD, FACMI, FAIMBEUniversity of Alabama at Birmingham (UAB) School of MedicineVerified email at uab.edu
Yuhao YangMicrosoft | University of KansasVerified email at microsoft.com
Hyunjin SeoOscar Stauffer Professor/Associate Dean, University of Kansas; Center for Digital Inclusion DirectorVerified email at ku.edu
Wang-Chien LeePennsylvania State UniversityVerified email at cse.psu.edu
Prasenjit MitraGuest Professor, Leibniz University Hannover & Research Consultant (external) QCRIVerified email at psu.edu
Roseann PlurettiUniversity of KansasVerified email at ku.edu
Sohaib KianiAssistant Professor, Beloit CollegeVerified email at beloit.edu