Get my own profile
Public access
View all24 articles
2 articles
available
not available
Based on funding mandates
Co-authors
William G.J. HalfondUniversity of Southern CaliforniaVerified email at usc.edu
kangkook JeeAssistant professor, University of Texas at DallasVerified email at utdallas.edu
Zhengzhang ChenSenior Researcher, NEC Laboratories AmericaVerified email at nec-labs.com
Jiaping GuiAssistant Professor, Shanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Junghwan "John" RheeAssociate Professor, University of Central OklahomaVerified email at uco.edu
Yao Guo (郭耀)Professor of Computer Science, Peking UniversityVerified email at pku.edu.cn
Shuai HaoAT&T Labs - ResearchVerified email at research.att.com
Xusheng XiaoAssociate Professor, Arizona State UniversityVerified email at asu.edu
Zhenyu WuNEC Laboratories America Inc.Verified email at nec-labs.com
Ramesh GovindanProfessor of Computer Science, University of Southern CaliforniaVerified email at usc.edu
Mu ZhangAssistant Professor, School of Computing, University of UtahVerified email at cs.utah.edu
Xiao YuResearch Manager, Machine Learning & Security, Stellar CyberVerified email at stellarcyber.ai
Wajih Ul HassanAssistant Professor, University of VirginiaVerified email at virginia.edu
Ziqi ZhangPeking UniversityVerified email at pku.edu.cn
Prateek MittalProfessor, Princeton UniversityVerified email at princeton.edu
Lu-An TangSenior Researcher, NEC Laboratories AmericaVerified email at nec-labs.com
Mian WanByteDance Inc.Verified email at usc.edu
Bingyan LiuResearch Associate Professor, Beijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Yingjun LyuApplied Scientist, AWS SecurityVerified email at amazon.com
Wei ChengSenior Research Staff Member, NEC Laboratories America (Ph.D, UNC-Chapel Hill)Verified email at nec-labs.com