Get my own profile
Public access
View all15 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Wei ZhouHuazhong University of Science and TechnologyVerified email at hust.edu.cn
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- Luyi XingAssociate Professor of Computer Science, Indiana University BloomingtonVerified email at indiana.edu
- XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at indiana.edu
- Le GuanSchool of Computing at the University of GeorgiaVerified email at uga.edu
- Bin YuanAssociate Professor of School of Cyber Science and Engineering, Huazhong University of Science andVerified email at hust.edu.cn
- liu zhelinankai university, chinaVerified email at nankai.edu.cn
- Hai JinHuazhong University of Science and TechnologyVerified email at hust.edu.cn
- Yifan ZhangIndiana University BloomingtonVerified email at iu.edu
- Heqing HUANGCity University of Hong KongVerified email at cityu.edu.hk
- Xiaojie GuoNankai UniversityVerified email at mail.nankai.edu.cn
- Ding Wang(汪 定)College of Cyber Science, Nankai University, Tianjin 300350, ChinaVerified email at nankai.edu.cn