Get my own profile
Public access
View all113 articles
28 articles
available
not available
Based on funding mandates
Co-authors
- Sencun ZhuPennsylvania State UniversityVerified email at psu.edu
- Dinghao WuPennsylvania State UniversityVerified email at psu.edu
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
- John YenProfessor of Data Sciences, The Pennsylvania State UniversityVerified email at psu.edu
- Bo LuoProfessor, The University of KansasVerified email at ku.edu
- Minghui ZhuProfessor, Electrical Engineering and Computer Science, Pennsylvania State UniversityVerified email at psu.edu
- Yoon-Chan JhiDirector of Software Security in Technology Research at Samsung SDS, Seoul, KoreaVerified email at samsung.com
- Jun XuAssistant Professor at The University of UtahVerified email at cs.utah.edu
- Fengjun LiUniversity of KansasVerified email at ku.edu
- Xiaoqi JiaInstitute of Information Engineering, CASVerified email at iie.ac.cn
- Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
- Shengzhi ZhangBoston University MET CollegeVerified email at bu.edu
- xinyu xingNorthwestern UniversityVerified email at northwestern.edu
- Dongwon LeeProfessor, The Pennsylvania State UniversityVerified email at psu.edu
- Chao-Hsien Chu 朱昭贤Professor of Information Sciences and Technology, Pennsylvania State UniversityVerified email at ist.psu.edu
- Jiang MingTulane UniversityVerified email at tulane.edu
- Ping ChenPenn State UniversityVerified email at ist.psu.edu
- Chen ZhongThe University of TampaVerified email at ut.edu
- Wang-Chien LeePennsylvania State UniversityVerified email at cse.psu.edu
- Mingyi ZhaoNotionVerified email at makenotion.com
Follow
Peng Liu
Raymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State University
Verified email at ist.psu.edu - Homepage