Get my own profile
Public access
View all7 articles
9 articles
available
not available
Based on funding mandates
Co-authors
Haining WangProfessor of ECE, Virginia TechVerified email at vt.edu
kangkook JeeAssistant professor, University of Texas at DallasVerified email at utdallas.edu
Junghwan "John" RheeAssociate Professor, University of Central OklahomaVerified email at uco.edu
Mengjun XieUniversity of Tennessee at ChattanoogaVerified email at utc.edu
Xusheng XiaoAssistant Professor, Case Western Reserve UniversityVerified email at case.edu
Zhang XuCollege of william and maryVerified email at email.wm.edu
Long LuAssociate Professor of Computer Science, Northeastern UniversityVerified email at northeastern.edu
Steven GianvecchioMITREVerified email at mitre.org
Wenke LeeProfessor of Computer Science at Georgia TechVerified email at cc.gatech.edu
Kangjie LuAssistant Professor, University of MinnesotaVerified email at umn.edu
Jianjun HuangSchool of Information, Renmin University of ChinaVerified email at ruc.edu.cn
Vasileios P. KemerlisAssistant Professor, Brown UniversityVerified email at cs.brown.edu
Xiangyu ZhangProfessor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
Bo ZongSalesforce.comVerified email at salesforce.com
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Zhenyu Wu
Verified email at nec-labs.com - Homepage