Get my own profile
Public access
View all49 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Wenjing LouW. C. English Endowed Professor, IEEE Fellow, Virginia Tech, USAVerified email at vt.edu
- Thomas HouBradley Distinguished Professor, IEEE Fellow, Virginia Tech, USAVerified email at vt.edu
- Yang XiaoUniversity of KentuckyVerified email at uky.edu
- Kun SunGeorge Mason UniversityVerified email at gmu.edu
- Zhiyuan YuWashington University in St. LouisVerified email at wustl.edu
- Yevgeniy VorobeychikWashington University in Saint LouisVerified email at wustl.edu
- Chaowei XiaoUniversity of Wisconsin - MadisonVerified email at umich.edu
- Jinwen WangWashington University in St. LouisVerified email at wustl.edu
- Qiben YanComputer Science and Engineering, Michigan State UniversityVerified email at msu.edu
- Wenhai SunPurdue UniversityVerified email at purdue.edu
- Han LiuPhD in Computer Science, Washington University in St. LouisVerified email at wustl.edu
- Liang TongSenior Researcher, Stellar Cyber, Inc.Verified email at stellarcyber.ai
- Deborah ShandsSRI InternationalVerified email at acm.org
- Le GuanSchool of Computing at the University of GeorgiaVerified email at uga.edu
- Xuan ZhangAssociate Professor, Northeastern UniversityVerified email at northeastern.edu
- Bo LiUniversity of Illinois at Urbana–ChampaignVerified email at illinois.edu
- Xuxian JiangPeckShield Inc.Verified email at peckshield.com