Get my own profile
Public access
View all7 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Jinho HwangMetaVerified email at meta.com
- Maja VukovicIBM T.J. Watson Research CenterVerified email at us.ibm.com
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- C Lee GilesPennsylvania State UniversityVerified email at psu.edu
- Prasenjit MitraProfessor of IST, Penn State Univ. & Affiliated Prof. L3S Research Ctr., Leibniz University HannoverVerified email at psu.edu
- Min LiSenior Software Engineer-Virtualization, FireEyeVerified email at vcu.edu
- Yulong ZhangGoogleVerified email at google.com
- Sencun ZhuPennsylvania State UniversityVerified email at psu.edu
- Jill JermynColumbia UniversityVerified email at cs.columbia.edu
- Haining WangProfessor of ECE, Virginia TechVerified email at vt.edu
- hai huangIBM ResearchVerified email at us.ibm.com
- Liangcai GaoPeking UniversityVerified email at pku.edu.cn
- Michael NiddIBM ResearchVerified email at zurich.ibm.com
- Nikos AnerousisIBM TJ Watson Research CenterVerified email at us.ibm.com
- Alex Hai WangApple, Hitachi, Verisign, Penn StateVerified email at apple.com
- Lakshminarayanan(LN) Renganaraya...AdobeVerified email at adobe.com
- Ea-Ee JanIBMVerified email at us.ibm.com
- James Z. WangDistinguished Professor, Informatics, Data Sciences, and HCI, Penn StateVerified email at ist.psu.edu
- Yoon-Chan JhiDirector of Software Security in Technology Research at Samsung SDS, Seoul, KoreaVerified email at samsung.com
- Xiaoqi JiaInstitute of Information Engineering, CASVerified email at iie.ac.cn