Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
William G.J. HalfondUniversity of Southern CaliforniaVerified email at usc.edu
kangkook JeeAssistant professor, University of Texas at DallasVerified email at utdallas.edu
Jiaping GuiSenior researcher, Stellar Cyber, Inc.Verified email at stellarcyber.ai
Zhengzhang ChenSenior Research Scientist, NEC Laboratories AmericaVerified email at ncsu.edu
Junghwan "John" RheeAssociate Professor, University of Central OklahomaVerified email at uco.edu
Shuai HaoAT&T Labs - ResearchVerified email at research.att.com
Ramesh GovindanProfessor of Computer Science, University of Southern CaliforniaVerified email at usc.edu
Zhenyu WuNEC Laboratories America Inc.Verified email at nec-labs.com
Mu ZhangAssistant Professor, School of Computing, University of UtahVerified email at cs.utah.edu
Xusheng XiaoAssociate Professor, Arizona State UniversityVerified email at asu.edu
Xiao YuResearch Manager, Machine Learning & Security, Stellar CyberVerified email at stellarcyber.ai
Wajih Ul HassanAssistant Professor, University of VirginiaVerified email at virginia.edu
Prateek MittalProfessor, Princeton UniversityVerified email at princeton.edu
Mian WanUniversity of Southern CaliforniaVerified email at usc.edu
Lu-An TangSenior Researcher, NEC Laboratories AmericaVerified email at nec-labs.com
Jingchao NiAmazon Web Services (Ph.D., Penn State)Verified email at amazon.com
Yingjun LyuApplied Scientist, AWS SecurityVerified email at amazon.com
Shen WangUniversity of Illinois at ChicagoVerified email at uic.edu
Peng GaoAssistant Professor, Department of Computer Science, Virginia TechVerified email at vt.edu
Wei ChengSenior Research Staff Member, NEC Laboratories America (Ph.D, UNC-Chapel Hill)Verified email at nec-labs.com