Get my own profile
Public access
View all7 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jinho HwangMetaVerified email at meta.com
Maja VukovicIBM T.J. Watson Research CenterVerified email at us.ibm.com
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
C Lee GilesPennsylvania State UniversityVerified email at psu.edu
Prasenjit MitraGuest Professor, Leibniz University Hannover & Research Consultant (external) QCRIVerified email at psu.edu
Min LiSenior Software Engineer-Virtualization, FireEyeVerified email at vcu.edu
Yulong ZhangGoogleVerified email at google.com
Zhi XunetskopeVerified email at netskope.com
Sencun ZhuPennsylvania State UniversityVerified email at psu.edu
Jill JermynColumbia UniversityVerified email at cs.columbia.edu
Haining WangProfessor of ECE, Virginia TechVerified email at vt.edu
hai huangIBM ResearchVerified email at us.ibm.com
Liangcai GaoPeking UniversityVerified email at pku.edu.cn
Michael NiddIBM ResearchVerified email at zurich.ibm.com
Nikos AnerousisIBM TJ Watson Research CenterVerified email at us.ibm.com
Alex Hai WangApple, Hitachi, Verisign, Penn StateVerified email at apple.com
Lakshminarayanan(LN) Renganaraya...AdobeVerified email at adobe.com
Ea-Ee JanIBMVerified email at us.ibm.com
James Z. WangDistinguished Professor, Informatics, Data Sciences, and HCI, Penn StateVerified email at ist.psu.edu
Yoon-Chan JhiDirector of Software Security in Technology Research at Samsung SDS, Seoul, KoreaVerified email at samsung.com