Get my own profile
Public access
View all26 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Wei ChengSenior Research Staff Member, NEC Laboratories America (Ph.D, UNC-Chapel Hill)Verified email at nec-labs.com
Bo ZongSalesforce.comVerified email at salesforce.com
Dongjin SongAssistant Professor, Computer Science and Engineering, University of ConnecticutVerified email at uconn.edu
Zhengzhang ChenSenior Research Scientist, NEC Laboratories AmericaVerified email at ncsu.edu
Dongsheng LuoAssistant Professor, Florida International UniversityVerified email at fiu.edu
Dongkuan (DK) XuAssistant Professor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
Yanchi LiuResearch Staff Member, NEC Labs AmericaVerified email at rutgers.edu
Chuxu ZhangAssistant Professor, Computer Science, Brandeis UniversityVerified email at brandeis.edu
Philip S. YuProfessor of Computer Science, University of Illinons at ChicagoVerified email at cs.uic.edu
Hanghang TongUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Ding LiPeking UniversityVerified email at pku.edu.cn
Shen WangUniversity of Illinois at ChicagoVerified email at uic.edu
Wei WangLeonard Kleinrock Professor in Computer Science, UCLAVerified email at cs.ucla.edu
Nitesh V ChawlaFrank Freimann Professor of Computer Science & Engg., Notre DameVerified email at nd.edu
Yuchen BianAmazon Search A9; Baidu Research USA; The Pennsylvania State UniversityVerified email at amazon.com
Jiaping GuiSenior researcher, Stellar Cyber, Inc.Verified email at stellarcyber.ai
Xiao Liu (刘霄)Biomedical Engineering at Pennsylvania State UniversityVerified email at engr.psu.edu
Xiao YuResearch Manager, Machine Learning & Security, Stellar CyberVerified email at stellarcyber.ai
Hongliang FeiGoogleVerified email at google.com