Get my own profile
Public access
View all12 articles
6 articles
available
not available
Based on funding mandates
Co-authors
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
- Douglas ReevesProfessor of Computer Science, N.C. State UniversityVerified email at ncsu.edu
- Huaiyu DaiProfessor of Electrical and Computer Engineering, NC State UniversityVerified email at ncsu.edu
- Yao LiuProfessor of Computer Science, University of South FloridaVerified email at cse.usf.edu
- Wenliang DuSyracuse UniversityVerified email at ecs.syr.edu
- An LiuGoogleVerified email at google.com
- X. Sean WangSchool of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
- Ahmed M. AzabFacebookVerified email at fb.com
- Wenbo ShenZhejiang UniversityVerified email at zju.edu.cn
- Kun SunGeorge Mason UniversityVerified email at gmu.edu
- cliff wangNCSUVerified email at ncsu.edu
- Ruowen WangGoogle, Samsung Research America, North Carolina State UniversityVerified email at google.com
- Sencun ZhuPennsylvania State UniversityVerified email at psu.edu
- Attila A YavuzAssociate Professor, University of South FloridaVerified email at usf.edu
- Min Yang (杨珉)Professor, School of Computer Science and Technology, Fudan UniversityVerified email at fudan.edu.cn
- Yuan ZhangProfessor, School of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
- Guofei GuProfessor, Department of Computer Science & Engineering, Texas A&M UniversityVerified email at cse.tamu.edu
- Wu ZhouDidi LabsVerified email at didichuxing.com
- Jia MaGoogle IncVerified email at google.com
- William EnckProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu