Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
Aron LaszkaAssistant Professor, Pennsylvania State UniversityVerified email at psu.edu
Jun XuAssistant Professor at The University of UtahVerified email at cs.utah.edu
Thomas MaillartUniversity of GenevaVerified email at unige.ch
Jorge LoboICREA - Universitat Pompeu FabraVerified email at upf.edu
Minghui ZhuAssociate Professor, Electrical Engineering and Computer Science, Pennsylvania State UniversityVerified email at psu.edu
Pinyao GuoPennsylvania State UniversityVerified email at ist.psu.edu
John ChuangProfessor, UC Berkeley School of InformationVerified email at ischool.berkeley.edu
Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Dinghao WuPennsylvania State UniversityVerified email at psu.edu
Dr. Poonam YadavA/ Professor and Lecturer at University of York / Visiting Researcher at University of CambridgeVerified email at york.ac.uk
Chen ZhongThe University of TampaVerified email at ut.edu
Nicklaus A. GiacobeCollege of Information Sciences and Technology,The Pennsylvania State UniversityVerified email at ist.psu.edu
Neela SawantResearch Scientist at Amazon.com (Past: Yahoo! R&D India, Penn State University, IIT Bombay)Verified email at amazon.com
Fan YeStony Brook UniversityVerified email at stonybrook.edu
Moti YungDistinguished Research Scientist Google; Adjunct Research Prof. Columbia U.Verified email at cs.columbia.edu