Get my own profile
Public access
View all102 articles
29 articles
available
not available
Based on funding mandates
Co-authors
Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu
Dinghao WuPennsylvania State UniversityVerified email at psu.edu
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
John YenProfessor of Data Sciences, The Pennsylvania State UniversityVerified email at psu.edu
Bo LuoProfessor, The University of KansasVerified email at ku.edu
Minghui ZhuAssociate Professor, Electrical Engineering and Computer Science, Pennsylvania State UniversityVerified email at psu.edu
Yoon-Chan JhiDirector of Software Security in Samsung SDS Research Center, Seoul, KoreaVerified email at samsung.com
Jun XuAssistant Professor at The University of UtahVerified email at cs.utah.edu
Fengjun LiUniversity of KansasVerified email at ku.edu
Xiaoqi JiaInstitute of Information Engineering, CASVerified email at iie.ac.cn
Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Shengzhi ZhangBoston University MET CollegeVerified email at bu.edu
Dongwon LeeProfessor, The Pennsylvania State UniversityVerified email at psu.edu
Heqing HuangIBM Thomas J. Watson Research CenterVerified email at us.ibm.com
xinyu xingNorthwestern UniversityVerified email at northwestern.edu
Chao-Hsien Chu 朱昭贤Professor of Information Sciences and Technology, Pennsylvania State UniversityVerified email at ist.psu.edu
Jiang MingTulane UniversityVerified email at tulane.edu
Ping ChenPenn State UniversityVerified email at ist.psu.edu
Chen ZhongThe University of TampaVerified email at ut.edu
Wang-Chien LeePennsylvania State UniversityVerified email at cse.psu.edu
Follow
Peng Liu
Raymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State University
Verified email at ist.psu.edu - Homepage