Get my own profile
Public access
View all90 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Ravi SandhuUniversity of Texas at San AntonioVerified email at utsa.edu
Moti YungDistinguished Research Scientist Google; Adjunct Research Prof. Columbia U.Verified email at cs.columbia.edu
Maochao XuIllinois StateVerified email at ilstu.edu
Wenlian LuProfessor of Mathematics, Fudan UniversityVerified email at fudan.edu.cn
Zhenxin ZhanUniversity of Texas at San AntonioVerified email at my.utsa.edu
Qingji ZhengVerified email at my.utsa.edu
Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
Sencun ZhuPennsylvania State UniversityVerified email at psu.edu
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Sanjeev SetiaDepartment of Computer Science, George Mason UniversityVerified email at gmu.edu
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Jonathan KatzProfessor of Computer Science, University of MarylandVerified email at cs.umd.edu
Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
Alexander KottUS Army Research LaboratoryVerified email at army.mil
Follow
Shouhuai Xu
Gallogly Chair Professor in Cybersecurity, University of Colorado Colorado Springs
Verified email at uccs.edu - Homepage