Get my own profile
Public access
View all42 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Jaideep VaidyaDistinguished Professor, Rutgers UniversityVerified email at business.rutgers.edu
- Haibing LuSanta Clara UniversityVerified email at scu.edu
- Shangyu XieIllinois Institute of TechnologyVerified email at hawk.iit.edu
- Lingyu WangProfessor, NSERC/Ericsson Industrial Research Chair (IRC) in SDN/NFV Security, Concordia UniversityVerified email at ciise.concordia.ca
- Han WangUniversity of KansasVerified email at ku.edu
- Meisam MohammadyAssistant Professor at Iowa State UniversityVerified email at iastate.edu
- Vijayalakshmi AtluriProfessor of Information Systems, Rutgers UniverstiyVerified email at rutgers.edu
- Hanbin HongUniversity of ConnecticutVerified email at uconn.edu
- Rachida DssouliConcordia UniversityVerified email at concordia.ca
- Xuegang BanUniversity of Washington, SeattleVerified email at uw.edu
- Zhongjie BaZhejiang UniversityVerified email at zju.edu.cn
- Binghui WangAssistant Professor, Illinois Institute of TechnologyVerified email at iit.edu
- Anirban BasuHonorary Research Fellow (University of Sussex); Adjunct Professor (OntarioTech University); HitachiVerified email at sussex.ac.uk
- Kai ShuAssistant Professor of Computer Science, Illinois Institute of TechnologyVerified email at iit.edu
- Panagiotis KarrasProfessor, University of CopenhagenVerified email at di.ku.dk
- Li XiongSamuel Dobbs Professor, Computer Science, Biomedical Informatics, Emory UniversityVerified email at emory.edu
- Xiaochen LiZhejiang UniversityVerified email at zju.edu.cn
- Weiran LiuStaff Security Engineer, Alibaba GroupVerified email at alibaba-inc.com
- Xinyu ZhangZhejiang UniversityVerified email at zju.edu.cn
- Yan YanIllinois Institute of TechnologyVerified email at iit.edu