Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Minghui ZhuProfessor, Electrical Engineering and Computer Science, Pennsylvania State UniversityVerified email at psu.edu
Hunmin KimMercer UniversityVerified email at mercer.edu
Jun XuAssistant Professor at The University of UtahVerified email at cs.utah.edu
Nurali ViraniSenior Scientist - Machine Learning, GE Vernova Advanced ResearchVerified email at ge.com
Mingyi ZhaoNotionVerified email at makenotion.com
Le GuanSchool of Computing at the University of GeorgiaVerified email at uga.edu
Sadegh FarhangPennsylvania State UniversityVerified email at psu.edu
Yu PuPh.D. Student in Pennsylvania State UniversityVerified email at ist.psu.edu
Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
Bo ChenAssociate Professor of Computer Science, Michigan Technological UniversityVerified email at mtu.edu
Ping ChenPenn State UniversityVerified email at ist.psu.edu