Get my own profile
Public access
View all20 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Zhiqiang LinDistinguished Professor of Engineering, The Ohio State UniversityVerified email at cse.ohio-state.edu
- Wenrui DiaoProfessor, Shandong UniversityVerified email at sdu.edu.cn
- Kehuan ZhangThe Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
- Haohuang WenThe Ohio State UniversityVerified email at osu.edu
- Yinqian ZhangProfessor, Southern University of Science and TechnologyVerified email at acm.org
- XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at iu.edu
- Wing Cheong LauProfessor, Department of Information Engineering, The Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
- Dong XuanProfessor of Computer Science and Engineering, The Ohio-State UniversityVerified email at cse.ohio-state.edu
- Ness ShroffDepartment of ECE and CSE, The Ohio State UniversityVerified email at osu.edu
- Giancarlo PellegrinoCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Brendan Dolan-GavittNew York UniversityVerified email at nyu.edu
- Alfred ChenAssistant Professor, University of California, IrvineVerified email at uci.edu
- Chaoshun ZuoThe Ohio State University