Get my own profile
Public access
View all10 articles
2 articles
available
not available
Based on funding mandates
Co-authors
XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at iu.edu
Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Xiangyu ZhangSamuel Conte Professor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
Xiaojing LiaoIndiana University BloomingtonVerified email at indiana.edu
Yeonjoon LeeAssistant Professor of College of Computing, Hanyang UniversityVerified email at hanyang.ac.kr
Wei YouRenmin University of ChinaVerified email at ruc.edu.cn
Lin TanMary J. Elmore New Frontiers Professor, Computer Science, Purdue UniversityVerified email at purdue.edu
Jianjun HuangSchool of Information, Renmin University of ChinaVerified email at ruc.edu.cn
Nan ZhangFacebook Inc.Verified email at indiana.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Raheem BeyahDean and Southern Company Chair, Georgia Tech College of EngineeringVerified email at ece.gatech.edu
Feng QianAssociate Professor at University of Southern CaliforniaVerified email at usc.edu
Xianghang MiUSTCVerified email at ustc.edu.cn
Yi ChenAssistant Professor, The University of Hong KongVerified email at hku.hk
Damon McCoyProfessor of Computer Science and Engineering, New York UniversityVerified email at nyu.edu
Sumayah AlrwaisAssistant Professor at King Saud University, Saudi ArabiaVerified email at ksu.edu.sa
Kan YuanIndiana University Computer Science DepartmentVerified email at indiana.edu
Tongxin LiPeking UniversityVerified email at pku.edu.cn
Peiyuan ZongInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Heqing HuangAffiliate Professor @ UCAS, Bytedance US AI Lab/GenAI Security, TensorSec, IBM Watson, PANW, FireEye