Crea il mio profilo
Coautori
Wen YaoResearcher Scientist, HP LabsEmail verificata su hp.com
Zang LiSr. Researcher, Linkedin IncEmail verificata su linkedin.com
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityEmail verificata su ist.psu.edu
Jungyoon KimKent State UniversityEmail verificata su kent.edu
Ya Zhang(张娅)Shanghai Jiao Tong University(上海交通大学)Email verificata su sjtu.edu.cn
Fengjun LiUniversity of KansasEmail verificata su ku.edu
Dongwon LeeAssociate Professor, The Pennsylvania State UniversityEmail verificata su psu.edu
Shuihua Hanxiamen universityEmail verificata su xmu.edu.cn
Heng XuProfessor of Information Technology and Analytics, Kogod School of Business, American UniversityEmail verificata su american.edu
Yiling ChenHarvard UniversityEmail verificata su seas.harvard.edu
Mithu BhattacharyaAssociate Professor of Decision Sciences, University of Detroit MercyEmail verificata su udmercy.edu
Wang-Chien LeePennsylvania State UniversityEmail verificata su cse.psu.edu
Ding Wang (汪 定)College of Cyber Science, Nankai University, Tianjin 300350, ChinaEmail verificata su pku.edu.cn
Sencun ZhuPennsylvania State UniversityEmail verificata su cse.psu.edu
Dan(a) ZhuIowa State UniversityEmail verificata su iastate.edu
Prasenjit MitraProfessor of Information Sciences and Technology, The Pennsylvania State UniversityEmail verificata su psu.edu
Akhil KumarPenn State UniversityEmail verificata su psu.edu
Thin Yin LeongSingapore University of Social SciencesEmail verificata su suss.edu.sg
Alex Hai WangApple, Hitachi, Verisign, Penn State
Xiaodan WuProfessor of Management Science, Hebei Unviersity of Technology
Chao-Hsien Chu 朱昭贤
Professor of Information Sciences and Technology, Pennsylvania State University
Email verificata su ist.psu.edu - Home page